Chapter 1-8 Quiz Cisco-Merged
Chapter 1-8 Quiz Cisco-Merged
Adjacency database
Which of the following OSPF components is responsible for computing the cost of each route?
Dijkstra's algorithm
Which of the following OSPF components is associated with the topology table?
Link-State database
Which of the following OSPF components is associated with the routing table?
Forwarding database
Which of the following OSPF packets contains an abbreviated list of the LSDB of the sending router?
Type 2: DBD packet
Which of the following OSPF packets is used by routers to announce new information?
Which of the following OSPF packets is used by routers to request more information?
Which of the following OSPF packets is responsible for establishing and maintaining adjacency with
other OSPF routers?
Router ID
During this OSPF state on multiaccess networks, the routers elect a Designated Router (DR) and a
Backup Designated Router (BDR).
Two-Way State
During this OSPF state, routers send each other DBD packets.
Exchange State
An OSPF router enters this state when it has received a Hello packet from a neighbor, containing the
sending Router ID.
Init State
During this OSPF state on point-to-point networks, the routers decide which router initiates the
exchange of DBD packets.
ExStart State
Full State
Down State
During this OSPF state, routes are processed using the SPF algorithm.
Loading State
LSU
What does an OSPF area contain?
A router is participating in an OSPFv2 domain. What will always happen if the dead interval expires
before the router receives a hello packet from an adjacent DROTHER OSPF router?
OSPF will remove that neighbor from the router link-state database.
Adjacency database
Link-state database
Dissemination of LSAs
What are two reasons for creating an OSPF network with multiple areas?
To reduce SPF calculations
At which OSPF state are neighbor routers converged and able to exchange routing updates?
Full
The OSPF hello timer has been set to 15 seconds on a router in a point-to-point network. By default,
what is the dead interval on this router?
60 seconds
What happens immediately after two OSPF routers have exchanged hello packets and have formed
a neighbor adjacency?
Arranging routers into areas partitions a large autonomous system in order to lighten the load on
routers.
True or False? In the router ospf process-id command, the process ID value, which can any
number between 1 and 65,535, is globally significant. It must be the same on all routers in the OSPF
area. False
Which of the following is the order of precedence for choosing the router ID?
Router ID
The router-id
Which wildcard mask would be used to advertise the 192.168.5.96/27 network as part of an OSPF
configuration?
0.0.0.31
The following three networks are directly connected to an OSPF router; 192.168.0.0/24,
192.168.1.0/24, and 192.168.2.0/24. Which OSPF network command would advertise only the
192.168.1.0 network to neighbors?
Hello timer
Subnet mask
What are two features of the OSPF routing protocol? (Choose two.)
A router with two LAN interfaces, two WAN interfaces, and one configured loopback interface is
operating with OSPF as its routing protocol. What does the router OSPF process use to assign the
router ID?
Which verification command would identify the specific interfaces on a router that were configured
with the passive-interface command?
Show ip protocols
Which command, if applied on an OSPF router, would give a Gigabit Ethernet interface a lower cost
than a Fast Ethernet interface?
A network administrator has just changed the router ID on a router that is working in an OSPFv2
environment. What should the administrator do to reset the adjacencies and use the new router ID?
Which command can be used to view the OSPF hello and dead time intervals?
Highest priority
Which command could be used on a router to ensure that an OSPF adjacency is formed with
another router?
Show ip ospf neighbor
A router in an OSPF enterprise network has a default static route that has been configured via the
interface that connects to the ISP. Which command would the network administrator apply on this
router so that other routers in the OSPF network will use this default route?
Default-information originate
Which security term is used to describe anything of value to the organization? It includes people,
equipment, resources, and data.
Asset
Which security term is used to describe a weakness in a system, or its design, that could be
exploited by a threat?
Vulnerability
Which security term is used to describe a potential danger to a company’s assets, data, or network
functionality?
Threat
Which security term is used to describe a mechanism that takes advantage of a vulnerability?
Exploit
Which security term is used to describe the counter-measure for a potential threat or risk?
Mitigation
Which security term is used to describe the likelihood of a threat to exploit the vulnerability of an
asset, with the aim of negatively affecting an organization?
Risk
Which type of hacker is described in the scenario: After hacking into ATM machines remotely using
a laptop, I worked with ATM manufacturers to resolve the security vulnerabilities that I discovered.
Gray Hat
Which type of hacker is described in the scenario: From my laptop, I transferred $10 million to my
bank account using victim account numbers and PINs after viewing recordings of victims entering
the numbers.
Black Hat
Which type of hacker is described in the scenario: My job is to identify weaknesses in my company’s
network .
White Hat
Which type of hacker is described in the scenario: I used malware to compromise several corporate
systems to steal credit card information. I then sold that information to the highest bidder.
Black Hat
Which type of hacker is described in the scenario: During my research for security exploits, I
stumbled across a security vulnerability on a corporate network that I am authorized to access.
White Hat
Which type of hacker is described in the scenario It is my job to work with technology companies to
fix a flaw with DNS.
White Hat
Which penetration testing tool uses algorithm schemes to encode the data, which then prevents
access to the data?
Encryption Tools
Which penetration testing tool is used by black hats to reverse engineer binary files when writing
exploits? They are also used by white hats when analyzing malware.
Debuggers
Which penetration testing tool is used to probe and test a firewall’s robustness?
Packet Crafting Tools
Which penetration testing tool is used by white hat hackers to sniff out any trace of evidence existing
in a computer?
Forensic Tools
Which penetration testing tool identifies whether a remote host is susceptible to a security attack?
Which malware executes arbitrary code and installs copies of itself in the memory of the infected
computer? The main purpose of this malware is to automatically replicate from system to system
across the network.
Worm
Which malware is non-self-replicating type of malware? It often contains malicious code that is
designed to look like something else, such as a legitimate application or file. It attacks the device
from within.
Trojan Horse
Which malware is used to gather information about a user and then, without the user's consent,
sends the information to another entity?
Spyware
Which malware typically displays annoying pop-ups to generate revenue for its author?
Adware
Phishing
Which malware is installed on a compromised system and provides privileged access to the threat
actor?
Rootkit
Which malware denies access to the infected computer system and demands payment before the
restriction is removed?
Ransomware
What type of attack is tailgating?
Social Engineering
What type of attack is a password attack?
Access
What type of attack is port scanning?
Reconnaissance
Access
Access
Which attack is being used when threat actors position themselves between a source and
destination to transparently monitor, capture, and control the communication?
MiTM attack
Which attack is being used when threat actors gain access to the physical network, and then use an
MiTM attack to capture and manipulate a legitimate user’s traffic?
Session Hijacking
Which attack is being used when threat actors initiate a simultaneous, coordinated attack from
multiple source machines?
Which attack is being used when threat actors use pings to discover subnets and hosts on a
protected network, to generate flood attacks, and to alter host routing tables?
ICMP attack
Which attack being used is when a threat actor creates packets with false source IP address
information to either hide the identity of the sender, or to pose as another legitimate user?
Which attack uses a four-way exchange to close the connection using a pair of FIN and ACK
segments from each endpoint?
Which attack is being used when the threat actor spoofs the IP address of one host, predicts the
next sequence number, and sends an ACK to the other host?
A program sweeps through all the known ports on a server and sends ICMP echo requests to each
closed port. This causes the server to reply with numerous ICMP port unreachable messages.
Which attack is this?
Which network security device ensures that internal traffic can go out and come back, but external
traffic cannot initiate connections to inside hosts?
ASA Firewall
Which network security device contains a secure database of who is authorized to access and
manage network devices?
AAA Server
Which network security device filters known and suspicious internet malware sites?
ESA/WSA
Which network security device is used to provide secure services with corporate sites and remote
access support for remote users using secure encrypted tunnels?
VPN
Which network security device monitors incoming and outgoing traffic looking for malware, network
attack signatures, and if it recognizes a threat, it can immediately stop it?
IPS
Which encryption method repeats an algorithm process three times and is considered very
trustworthy when implemented using very short key lifetimes?
Triple DES
Which encryption method encrypts plaintext one byte or one bit at a time?
Stream Cipher
Which encryption method uses the same key to encrypt and decrypt data?
Symmetric
Which encryption method is a stream cipher and is used to secure web traffic in SSL and TLS?
Rivest Cipher
The IT department is reporting that a company web server is receiving an abnormally high number of
web page requests from different locations simultaneously. Which type of security attack is
occurring?
DDOS
attempting to write more data to a memory location than that location can
hold
Confidentiality
What type of malware has the primary objective of spreading across the network?
Worm
Integrity
Availability
Confidentiality
Which cyber attack involves a coordinated attack from a botnet of zombie computers?
DDos
What specialized network device is responsible for enforcing access control policies between
networks?
Firewall
Access
Which type of DNS attack involves the cybercriminal compromising a parent domain and creating
multiple subdomains to be used during the attacks?
Shadowing
Which two types of hackers are typically classified as grey hat hackers?
Hackavists
Vulnerability brokers
A cleaner attempts to enter a computer lab but is denied entry by the receptionist because there is
no scheduled cleaning for that day. What type of attack was just prevented?
Social Engineering
If there are no matching ACEs in the ACL, the packet is forwarded because there is an implicit
permit ACE automatically applied to all ACLs.
Which wildcard mask would permit only host 10.10.10.1?
0.0.0.0
Which wildcard mask would permit only hosts from the 10.10.0.0/16 network?
0.0.255.255
Which wildcard mask would permit all hosts from the 192.168.10.0/24 network?
0.0.0.255
How many total ACLs (both IPv4 and IPv6) can be configured on an interface?
4
Which of the following is an ACL best practice?
ACLs number 1 to 99, or 1300 to 1999 are standard ACLs while ACLs number 100 to 199, or 2000
to 2699 are extended ACLs.
No routing table entry exists for the packet destination, but the packet matches a permitted
address in an outbound ACL.
A network administrator configures an ACL with the command R1(config)# access-list 1 permit
172.16.0.0 0.0.15.255. Which two IP addresses will match this ACL statement? (Choose two.)
172.16.0.255
172.16.15.36
Which two statements describe appropriate general guidelines for configuring and applying ACLs?
(Choose two.)
What single access list statement matches all of the following networks?
192.168.16.0
192.168.17.0
192.168.18.0
192.168.19.0
access-list 10 permit 192.168.16.0 0.0.3.255
A network administrator is configuring an ACL to restrict access to certain servers in the data
center. The intent is to apply the ACL to the interface connected to the data center LAN. What
happens if the ACL is incorrectly applied to an interface in the inbound direction instead of the
outbound direction?
The ACL does not perform as designed
Which scenario would cause an ACL misconfiguration and deny all traffic?
Apply an ACL that has all deny ACE statements.
When creating an ACL, which keyword should be used to document and interpret the purpose of
the ACL statement on a Cisco device?
Remark
A college student is studying for the Cisco CCENT certification and is visualizing extended access
lists. Which three keywords could immediately follow the keywords permit or deny as part of an
extended access list? (Choose three.)
Tcp
Udp
Icmp
If the provided ACEs are in the same ACL, which ACE should be listed first in the ACL according to
best practice?
Permit udp 172.16.0.0 0.0.255.255 host 172.16.1.5 eq snmptrap
The computers used by the network administrators for a school are on the 10.7.0.0/27 network.
Which two commands are needed at a minimum to apply an ACL that will ensure that only devices
that are used by the network administrators will be allowed Telnet access to the routers? (Choose
two.)
Access-class 5 in
Access-list 5 permit 10.7.0.0 0.0.0.31
Any device of the 10.1.1.0/24 network(except the 10.1.1.2 device) can telnet to the router that
has the IP address 10.1.1.1 assigned.
Which command will verify the number of packets that are permitted or denied by an ACL that
restricts SSH access?
Show access-lists
Which access list statement permits HTTP traffic that is sourced from host 10.1.129.100 port 4300
and destined to host 192.168.30.10?
Access-list 101 permit tcp 10.1.128.0 0.0.1.255 eq 4300 192.168.30.0 0.0.0.15 eq www
When configuring router security, which statement describes the most effective way to use ACLs to
control Telnet traffic that is destined to the router itself?
The ACL should be applied to all vty lines in the in direction to prevent an unwanted user
from connecting to an unsecured port.
What packets would match the access control list statement that is shown below?
access-list 110 permit tcp 172.16.0.0 0.0.0.255 any eq 22
Consider the access list command applied outbound on a router serial interface.
Consider the following output for an ACL that has been applied to a router via the access-class
in command. What can a network administrator determine from the output that is shown?
Two devices were able to use SSH or Telnet to gain access to the router.
To facilitate the troubleshooting process, which inbound ICMP message should be permitted on an
outside interface?
Echo reply
What two ACEs could be used to deny IP traffic from a single source host 10.1.1.1 to the
192.168.0.0/16 network? (Choose two.)
An administrator has configured an access list on R1 to allow SSH administrative access from host
172.16.1.100. Which command correctly applies the ACL?
R1(config-line)#access-class 1 in
True or False? A side effect of NAT is that it hides the inside local IP address of a host from the
outside network.
True
True or False? With NAT overload, each inside local IP address is translated to a unique inside
global IP address on a one-for-one basis.
False
True or False? The use of NAT makes end-to-end traceability between source and destination
easier.
False
True or False? Tunneling protocols such as IPsec do not work well through NAT.
True
Which two statements accurately describe an advantage or a disadvantage when deploying NAT for
IPv4 in a network? (Choose two.)
What are two tasks to perform when configuring static NAT? (Choose two.)
Create a mapping between the inside local and outside local addresses.
Which two statements accurately describe an advantage or a disadvantage when deploying NAT for
IPv4 in a network? (Choose two.)
NAT provides a solution to slow down the IPV4 address depletion
NAT introduces problems for some applications that require end-to-end connectivity.
What are two tasks to perform when configuring static NAT? (Choose two.)
Create a mapping between the inside local and outside local addresses.
It allows sites to connect IPv6 hosts to an IPv4 network by translating the IPv6 addresses to
IPv4 addresses.
Using NAT terminology, what is the address of the source host on a private network as seen from
inside the network?
Inside local
Any host or user can get a public IPv6 network address because the number of available IPv6
addresses is extremely large.
A company designs its network so that the PCs in the internal network are assigned IP addresses
from DHCP servers, and the packets that are sent to the Internet are translated through a NAT-
enabled router. What type of NAT enables the router to populate the translation table from a pool of
unique public addresses, as the PCs send packets through the router to the Internet?
Dynamic NAT
When dynamic NAT without overloading is being used, what happens if seven users attempt to
access a public server on the Internet when only six addresses are available in the NAT pool?
A company has been assigned the 203.0.113.0/27 block of IP addresses by the ISP. The company
has over 6000 internal devices. What type of NAT would be most appropriate for the employee
workstations of the company?
Which version of NAT allows many hosts inside a private network to simultaneously use a single
inside global address for connecting to the Internet?
PAT
Which two options describe a WAN? (Choose two.)
Logical topology
Which type of WAN network design is the most fault-tolerant?
It describes the electrical, mechanical, and operational components needed to transmit bits.
Point-of-Presence(POP)
Which two devices operate in a similar manner to the voiceband modem but use higher broadband
frequencies and transmission speeds. (Choose two.)
Cable Modem
DSL Modem
Which communication method is used in all WAN connections?
Serial
Which two WAN connectivity options are circuit-switched technologies? (Choose two.)
ISDN
PSTN
Which two WAN connectivity options are packet-switched technologies? (Choose two.)
Ethernet WAN
Frame Relay
Which service provider fiber-optic technology increases the data-carrying capacity using different
wavelengths?
DWDM
Which traditional WAN connectivity option uses T-Carrier or E-Carrier lines?
Leased lines
Which two traditional WAN connectivity options are circuit-switched? (Choose two.)
ISDN
PSTN
Which two traditional WAN connectivity options are packet-switched? (Choose two.)
ATM
Frame Relay
Metro Ethernet
Which is a service provider WAN solution that uses labels to direct the flow of packets through the
provider network?
MPLS
A company is expanding its business to other countries. All branch offices must remain connected to
corporate headquarters at all times. Which network technology is required to support this scenario?
WAN
What is the recommended technology to use over a public WAN infrastructure when a branch office
is connected to the corporate site?
VPN
Which medium do service providers use to transmit data over WAN connections with SONET, SDH,
and DWDM?
Fiber optic
Which statement describes a characteristic of a WAN?
Which type of network would be used by a company to connect locations across the country?
WAN
A small company with 10 employees uses a single LAN to share information between computers.
Which type of connection to the Internet would be appropriate for this company?
Physical layer
Ethernet WAN
An intercity bus company wants to offer constant Internet connectivity to the users traveling on the
buses. Which two types of WAN infrastructure would meet the requirements? (Choose two.)
Public infrastructure
Cellular
An enterprise has four branches. The headquarters needs full connectivity to all branches. The
branches do not need to be connected directly to each other. Which WAN topology is most suitable?
Hub and spoke
What are two common types of circuit-switched WAN technologies? (Choose two.)
PSTN
ISDN
A new corporation needs a data network that must meet certain requirements. The network must
provide a low cost connection to sales people dispersed over a large geographical area. Which two
types of WAN infrastructure would meet the requirements? (Choose two.)
Public infrastructure
Internet
Which VPN benefit allows an enterprise to easily add more users to the network?
Scalability
Which VPN benefit allows an enterprise to increase the bandwidth for remote sites without
necessarily adding more equipment or WAN links?
Cost Savings
Which VPN benefit uses advanced encryption and authentication protocols to protect data from
unauthorized access?
Security
Which type of VPN is used to connect a mobile user?
Remote-access
Which VPN solutions are typically managed by an enterprise? (Choose three)
IPsec
SSL
DMVPN
What type of VPN can be established with a web browser using HTTPS?
Clientless VPN
Carrier protocol
What type of VPN enables an enterprise to rapidly scale secure access across the organization?
DMVPN
What type of VPN enables an enterprise to emulate an Ethernet multiaccess LAN with remote sites?
MPLS VPN
Layer 6
Layer 7
Which IPsec function uses pre-shared passwords, digital certificates, or RSA certificates?
Authentication
True or False: The IPsec framework must be updated each time a new standard is developed.
False
Which choices are available for the IPsec Protocol function in the IPsec framework? (Choose two.)
AH
ESP
Which choices are available for the Confidentiality function in the IPsec framework? (Choose three.)
3DES
AES
SEAL
Which choices are available for the Integrity function in the IPsec framework? (Choose two.)
MD5
SHA
Which choices are available for the Authentication function in the IPsec framework? (Choose two.)
PSK
RSA
It is used to connect individual hosts securely to a company network over the Internet.
It may require VPN client software on hosts.
The use of 3DES within the IPsec framework is an example of which of the five IPsec building
blocks?
Confidentiality
Which type of VPN may require the Cisco VPN Client software?
What are the two fundamental Dynamic Multipoint VPN tunnel types? (Choose two.)
Spoke-to-spoke
Hub-to-spoke
What are two reasons a company would use a VPN? (Choose two.)
To connect remote users to the network
False
Which solution allows workers to telecommute effectively and securely?
Remote-access VPN
Which VPN type is a service provider managed VPN?
AH
What algorithm is used to provide data integrity of a message through the use of a calculated hash
value?
HMAC
Which statement describes the effect of key length in deterring an attacker from hacking through an
encryption key?
Menu
CCNA v7 Course #3 |
45 Comments
NOTE: If you have the new question on this test, please CCNA 1 – v7 CCNA 2 – v7
router ID
hello interval
11. What is the default router priority value for all Cisco
OSPF routers?
0
1
10
255
Ethernet network
when the two adjacent neighbors are in two different
networks
10.0.0.1
10.1.0.1
192.168.1.100
209.165.201.1
21. Refer to the exhibit. If the switch reboots and all routers
have to re-establish OSPF adjacencies, which routers will
become the new DR and BDR?
22. By default, what is the OSPF cost for any link with a
bandwidth of 100 Mb/s or greater?
100000000
10000
1
100
23. Refer to the exhibit. What is the OSPF cost to reach the
router A LAN 172.16.1.0/24 from B?
782
74
128
65
R0-A
ISP, R0-A, R0-B, and R0-C
ISP
R0-B and R0-C
ISP and R0-A
R0-A, R0-B, and R0-C
38. Match the description to the term. (Not all options are
used.)
40. Match the OSPF state with the order in which it occurs.
(Not all options are used.)
42. Which three OSPF states are involved when two routers
are forming an adjacency? (Choose three.)
Exchange
Init
ExStart
Two-way
Loading
Down
0.0.3.255
0.0.0.7
0.0.0.3
0.0.63.255
51. Which step in the link-state routing process is described
by a router flooding link-state and cost information about
each directly connected link?
building the topology table
selecting the router ID
exchanging link-state advertisements
injecting the default route
52. Which step in the link-state routing process is described
by a router sending Hello packets out all of the OSPF-
enabled interfaces?
electing the designated router
establishing neighbor adjacencies
injecting the default route
exchanging link-state advertisements
53. An administrator is configuring single-area OSPF on a
router. One of the networks that must be advertised is
64.100.0.0 255.255.255.0. What wildcard mask would the
administrator use in the OSPF network statement?
0.0.0.31
0.0.0.255
0.0.0.63
0.0.0.127
54. Which step in the link-state routing process is described
by a router inserting best paths into the routing table?
declaring a neighbor to be inaccessible
executing the SPF algorithm
load balancing equal-cost paths
choosing the best route
55. What type of address is 64.101.198.197?
public
private
Related Articles
bullet {{}}
45 COMMENTS
hussain
25 days ago
Reply
View Replies (1)
Nuggets
2 months ago
Reply
View Replies (1)
Rudolf
3 months ago
HQ# resume
HQ# clear ip ospf process
HQ# copy running-config startup-config
HQ# clear ip route *
Reply
Rudolf
3 months ago
Reply
View Replies (2)
Judy
4 months ago
0.0.0.31
0.0.0.255
0.0.0.63
0.0.0.127
Reply
View Replies (1)
Judy
4 months ago
Reply
View Replies (1)
Reply
Mandala
4 months ago
By default, what is the OSPF cost for any link with a bandwidth of 100
Mb/s or greater?
100000000
1
100
10000
Reply
Tiago
4 months ago
Reply
Jonathan Cueva
4 months ago
Reply
Tms
4 months ago
I have question
Which two step in the link-state routing process is described by a router
flooding link-state and cost information about each directly connected link
?
– establish neighbor adjacencies
– exchange link -state advertisements
– electing the designated router
– injecting the default route
Reply
Anon
5 months ago
public
private
Reply
Victor
5 months ago
Reply
Olu
6 months ago
hi, do you advice me to study all the dumps, i.e previous versions and the
recent 200-301 questions when reading for my ccna and how similar to
actual questions. Thanks.
Reply
new question
6 months ago
Reply
Ashes
6 months ago
Reply
daa
6 months ago
Reply
usman
6 months ago
Reply
View Replies (2)
Cake
6 months ago
**New Question**
Match each OSPF packet type to how it is used by a router. (Not all
options are used.)
https://imgur.com/jsq8FrG
**Wrong Answer**
An OSPF router has three directly connected networks; 172.16.0.0/16,
172.16.1.0/16, and 172.16.2.0/16. Which OSPF network command would
advertise only the 172.16.1.0 network to neighbors?
I agree with Mike(1) that it should be 0.0.0.255 but they must have gotten
the subnet mask and wildcard mask mixed up when they put answer in.
(1)https://itexamanswers.net/ccna-3-v7-modules-1-2-ospf-concepts-and-
configuration-exam-answers.html#comment-42876
Reply
View Replies (1)
vishal
6 months ago
new question
Match each OSPF packet type to how it is used by a router. (Not all
options are used.)
Reply
Rob
7 months ago
Does anyone know where to download the PKA file for Q37? Or does
anyone have a screenshot of what the PT Activity is?
Reply
View Replies (2)
Rob
7 months ago
Does any one have the full details for Q33? It appears to be only part of
the Question.
Reply
Bogdan
8 months ago
0.0.3.255
0.0.0.7
0.0.0.3
0.0.63.255
Reply
View Replies (2)
Marius Maripuu
8 months ago
Reply
View Replies (2)
K678
8 months ago
0.0.63.255
0.0.0.63 answer
0.0.0.3
0.0.0.7
Reply
View Replies (1)
scooter
8 months ago
-1
Reply
View Replies (1)
Dave
8 months ago
Some questions you guys missed. There were a decent amount of other
questions not listed but I got those correct.
Which three OSPF states are involved when two routers are forming an
adjacency? (Choose three.)
Init
Two-way
Down
Reply
View Replies (1)
Menu
CCNA v7 Course #3 |
40 Comments
NOTE: If you have the new question on this test, please CCNA 1 – v7 CCNA 2 – v7
11. Refer to the exhibit. Which two ACLs would permit only
the two LAN networks attached to R1 to access the network
that connects to R2 G0/1 interface? (Choose two.)
ACE to be removed.
Copy the ACL into a text editor, remove the ACE, then copy
the ACL back into the router.
Create a new ACL with a different number and apply the new
ACL to the router interface.
Use the no access-list command to remove the entire ACL,
then recreate it without the ACE.
inbound
R2 S0/0/1
R1 Gi0/1.12
outbound
R1 S0/0/0
R2 Gi0/1.20
34. Which set of access control entries would allow all users
on the 192.168.10.0/24 network to access a web server that is
located at 172.17.80.1, but would not allow them to use
Telnet?
access-list 103 deny tcp host 192.168.10.0 any eq 23
information.
They probe a group of machines for open ports to learn which
services are running.
They are maliciously formed code segments used to replace
legitimate applications.
They are infected machines that carry out a DDoS attack.
allow any mask through that meets the criteria. For example,
the permit any command is the same as permit 0.0.0.0
255.255.255.255 command.
56. What does the CLI prompt change to after entering the
command ip access-list standard aaa from global
configuration mode?
Router(config-line)#
Router(config-std-nacl)#
Router(config)#
Router(config-router)#
Router(config-if)#
57. Refer to the exhibit. Many employees are wasting
company time accessing social media on their work
computers. The company wants to stop this access. What is
the best ACL type and placement to use in this situation?
extended ACL outbound on R2 WAN interface towards the
internet
standard ACL outbound on R2 WAN interface towards the
internet
standard ACL outbound on R2 S0/0/0
extended ACLs inbound on R1 G0/0 and G0/1
58. A technician is tasked with using ACLs to secure a
router. When would the technician use the 40 deny host
192.168.23.8 configuration option or command?
to remove all ACLs from the router
to create an entry in a numbered ACL
to apply an ACL to all router interfaces
to secure administrative access to the router
59. What is the best description of Trojan horse malware?
It is malware that can only be distributed over the Internet.
It appears as useful software but hides malicious code.
It is software that causes annoying but not fatal computer
problems.
It is the most easily detected form of malware.
60. What wild card mask will match networks 172.16.0.0
through 172.19.0.0?
0.0.3.255
0.252.255.255
0.3.255.255
0.0.255.255
60. What is the term used to describe gray hat hackers who
publicly protest organizations or governments by posting
articles, videos, leaking sensitive information, and
performing network attacks?
white hat hackers
grey hat hackers
hacktivists
state-sponsored hacker
61. Refer to the exhibit. The company has provided IP
phones to employees on the 192.168.10.0/24 network and the
voice traffic will need priority over data traffic. What is the
best ACL type and placement to use in this situation?
deny FTP access. What is the best ACL type and placement
to use in this situation?
Related Articles
HUAWEI CONNECT
2020 - New Value
Together
Ad
agenda.events.huawei.com
bullet {{}}
40 COMMENTS
hussain
25 days ago
Reply
Mammon
2 months ago
Reply
cisco@gmail.com
3 months ago
Refer to the exhibit. The company CEO demands that one ACL be
created to permit email traffic to the internet and deny FTP access. What
is the best ACL type and placement to use in this situation?
Reply
View Replies (3)
AF
4 months ago
Question:
” A technician is tasked with using ACLs to secure a router. When would
the technician use the remark configuration option or command? “
Answers:
to generate and send an informational message whenever the ACE is
matched
Reply
hanslissi
4 months ago
Reply
Jonathan Cueva
4 months ago
Reply
View Replies (1)
Jonathan Cueva
4 months ago
Reply
Anon
5 months ago
What is the term used to describe a guarantee that the message is not a
forgery and does actually come from whom it states?
mitigation
exploit
data non-repudiation
Reply
View Replies (2)
Sely
5 months ago
Reply
Sely
5 months ago
What is the term used to describe a guarantee that the message is not a
forgery and does actually come from whom it states?
– origin authentication (this is the answer)
-data non-repudiation
-migration
-exploit
Reply
Ashes
6 months ago
Reply
unknown
6 months ago
Early Internet users often engaged in activities that would harm other
users.
Internal threats can cause even greater damage than external threats.
Reply
View Replies (1)
vishal
6 months ago
What is the term used to describe gray hat hackers who publicly protest
organizations or governments by posting articles, videos, leaking sensitive
information, and performing network attacks?
Reply
View Replies (1)
Veelesh
6 months ago
Reply
Anon
6 months ago
Reply
View Replies (1)
Robin
7 months ago
Reply
View Replies (1)
Bogdan
8 months ago
What is the term used to describe gray hat hackers who publicly protest
organizations or governments by posting articles, videos, leaking sensitive
information, and performing network attacks?
script kiddies
hacktivists
Reply
View Replies (2)
Bogdan
8 months ago
What wild card mask will match networks 172.16.0.0 through 172.19.0.0?
0.0.3.255
0.252.255.255
{X} 0.3.255.255
0.0.255.255
Reply
View Replies (2)
rfrco
8 months ago
Reply
View Replies (2)
rfrco
8 months ago
Reply
View Replies (1)
Menu
NOTE: If you have the new question on this test, please CCNA 1 – v7 CCNA 2 – v7
244
10
1
255
192.168.1.5
203.0.113.10
172.16.1.254
172.16.1.10
209.165.200.245
192.0.2.2
inside global
outside global
outside local
inside local
A = 209.165.201.2
A = 10.1.0.13
B = 209.165.201.7
B = 10.0.254.5
B = 209.165.201.1
10.6.15.2
209.165.202.141
198.51.100.3
209.165.200.225
10.10.10.55 209.165.201.4
ERtr(config)# interface gigabitethernet 0/0
ERtr(config-if)# ip nat inside
ERtr(config-if)# interface serial 0/0/0
ERtr(config-if)# ip nat outside
clientless SSL
site-to-site using a preshared key
192.168.0.1
192.168.0.10
209.165.201.1
209.165.200.225
28. Which type of VPN uses the public key infrastructure and
digital certificates?
SSL VPN
GRE over IPsec
IPsec virtual tunnel interface
dynamic multipoint VPN
29. Which two WAN infrastructure services are examples of
private connections? (Choose two.)
cable
DSL
Frame Relay
T1/E1
wireless
SSL VPN
MPLS VPN
IPsec virtual tunnel interface
dynamic multipoint VPN
50. Which two end points can be on the other side of an ASA
site-to-site VPN configured using ASDM? (Choose two.)
DSL switch
ISR router
another ASA
multilayer switch
Frame Relay switch
51. Which protocol creates a virtual point-to-point
connection to tunnel unencrypted traffic between Cisco
routers from a variety of protocols?
IKE
IPsec
OSPF
GRE
52. What is a disadvantage when both sides of a
communication use PAT?
End-to-end IPv4 traceability is lost.
The flexibility of connections to the Internet is reduced.
The security of the communication is negatively impacted.
Host IPv4 addressing is complicated.
53. What two addresses are specified in a static NAT
configuration?
the outside global and the outside local
the inside local and the outside global
the inside global and the outside local
the inside local and the inside global
54. A company is considering updating the campus WAN
connection. Which two WAN options are examples of the
private WAN architecture? (Choose two.)
municipal Wi-Fi
digital subscriber line
leased line
Ethernet WAN
cable
Explain:
In the exhibit, NAT-POOL 2 is bound to ACL 100, but it
should be bound to the configured ACL 1. This will cause
PAT to fail. 100, but it should be bound to the configured
ACL 1. This will cause PAT to fail.
translated
61. Which type of VPN involves passenger, carrier, and
transport protocols?
GRE over IPsec
dynamic multipoint VPN
MPLS VPN
IPsec virtual tunnel interface
62. Match the steps with the actions that are involved when
an internal host with IP address 192.168.10.10 attempts to
send a packet to an external server at the IP address
209.165.200.254 across a router R1 that is running dynamic
NAT. (Not all options are used.)
Related Articles
bullet {{}}
34 COMMENTS
Nick
5 days ago
Reply
Elipipita
1 month ago
Reply
View Replies (1)
Jason
1 month ago
Private.
Public
Reply
View Replies (1)
Alif
3 months ago
*New question
Reply
View Replies (1)
Mifta
3 months ago
public
private
Reply
jkt
3 months ago
public
private
Public ??
Reply
View Replies (1)
Maria
3 months ago
Reply
View Replies (1)
luck
3 months ago
private
public
Reply
View Replies (1)
ReivaxHR
4 months ago
Reply
Guest
4 months ago
Reply
Cheah
4 months ago
Refer to the exhibit. A network administrator is viewing the output from the
command show ip nat translations . Which statement correctly describes
the NAT translation that is occurring on router RT2? The traffic from a
source IPv4 address of 192.168.254.253 is being translated to 192.0.2.88
by means of static NAT. The traffic from a source IPv4 address of
192.168.2.20 is being translated by router RT2 to reach a destination IPv4
address of 192.0.2.254. The traffic from a source IPv4 public address that
originates traffic on the internet would be able to reach private internal
IPv4 addresses. The traffic from… Read more »
Reply
Guest
5 months ago
Which type of VPN uses the public key infrastructure and digital
certificates?
( )IPsec virtual tunnel interface
( )GRE over IPsec
(*)SSL VPN
( )dynamic multipoint VPN
Reply
anon
5 months ago
Reply
New questions
6 months ago
Hello. Sending some missing questions: Match the steps with the actions
that are involved when an internal host with IP address 192.168.10.10
attempts to send a packet to and external server at the IP address
209.165.200.254 across a router R1 that running dynamic NAT. (Not all
options are used.) Screenshot. Please crop it before uploading: Refer to
the exhibit. The PC is sending a packet to the Server on the remote
network. Router R1 is performing NAT overload. From the perspective of
the PC, match the NAT address type with the correct IP address. (Not all
options are used.) Screenshot:… Read more »
Reply
View Replies (1)
Ashes
6 months ago
Reply
Guest
6 months ago
Match the steps with the actions that are involved when an internal host
Reply
Guest
6 months ago
Which type of VPN allows multicast and broadcast traffic over a secure
site-to-site VPN?
() dynamic multipoint VPN
() SSL VPN
() IPsec virtual tunnel interface
(*) GRE over IPsec
Reply
Abdul Razzaq
6 months ago
Reply
Guest
7 months ago
MPLS VPN
Reply
View Replies (1)
Bogdan
8 months ago
Which two end points can be on the other side of an ASA site-to-site VPN
configured using ASDM? (Choose two.)
DSL switch
multilayer switch
Reply
Bogdan
8 months ago
IKE
IPsec
OSPF
(X) GRE
Reply
Bogdan
8 months ago
Reply
View Replies (2)
Bogdan
8 months ago
Reply
Bogdan
8 months ago
municipal Wi-Fi
cable
Reply
CCNA6.COM
Routing and Switching v7.0 Exam Answers
Menu
Facebo
CCNA3
Pintere v6.0 Chapter 5 Exam Answers
CCNA 3 v6.0
11 July, 2017
1 Comment
admin
CCNA 3, Chapter 5, scaling networks, v6.0
WhatsA
Gmail
0
SHARES
EIGRP
OSPF
RIP
the capability to transport data, video, and voice over the same media
a measure of protocol configuration complexity
the amount of time for the routing tables to achieve a consistent state after a topology change*
3. An OSPF enabled router is processing learned routes to select best paths to reach
a destination network. What is the OSPF algorithm evaluating as the metric?
The amount of packet delivery time and slowest bandwidth.
Interior routing protocols are used to route on the Internet. Exterior routing protocols are used inside
organizations.
Exterior routing protocols are used to administer a single autonomous system. Interior routing protocols are
used to administer several domains.
Interior routing protocols are used to communicate within a single autonomous system. Exterior routing
protocols are used to communicate between multiple autonomous systems.*
networks?
RIP
EIGRP
OSPF*
BGP
7. Which two routing protocols are classified as distance vector routing protocols?
(Choose two.)
OSPF
EIGRP*
BGP
IS-IS
RIP*
A network administrator has configured RIPv2 in the given topology. Which path
would a packet take to get from the LAN that is connected to R1 to the LAN that is
connected to R7?
R1–R3–R4–R5–R6–R7
R1–R3–R2–R6–R7
R1–R3–R2–R6–R7
R1–R2–R6–R7*
EIGRP
OSPF
BGP
10. After a network topology change occurs, which distance vector routing protocol
can send an update message directly to a single neighboring router without
unnecessarily notifying other routers?
IS-IS
RIPv2
EIGRP*
OSPF
RIPv1
11. Which feature provides secure routing updates between RIPv2 neighbors?
unicast updates
keepalive messages
adjacency table
RIP
OSPF
BGP
OSPF is used in the network. Which path will be chosen by OSPF to send data
packets from Net A to Net B?
R1, R2, R5, R7
15. What are two features of the OSPF routing protocol? (Choose two.)
automatically summarizes networks at the classful boundaries
16. Which two protocols are link-state routing protocols? (Choose two.)
RIP
OSPF*
EIGRP
BGP
IS-IS*
IGP
17. Which routing protocol uses link-state information to build a map of the
topology for computing the best path to each destination network?
OSPF*
EIGRP
RIP
RIPng
18. Which two requirements are necessary before a router configured with a link-
state routing protocol can build and send its link-state packets? (Choose two.)
The router has determined the costs associated with its active links.*
19. What happens when two link-state routers stop receiving hello packets from
neighbors?
They continue to operate as normal and are able to exchange packets.
20. Which two events will trigger the sending of a link-state packet by a link-state
routing protocol? (Choose two.)
the router update timer expiring
21. What is the first step taken by a newly configured OSPF router in the process of
reaching a state of convergence?
It builds the topological database.
22. Which two components of an LSP enable an OSPF router to determine if the
LSP that is received contains newer information than what is in the current OSPF
router link-state database? (Choose two.)
query
sequence numbers*
acknowledgements
hellos
aging information*
When compared with distance vector routing protocols, OSPF utilizes less memory and less CPU
processing power.*
25. Match the features of link-state routing protocols to their advantages and
disadvantages. (Not all options are used.)
Advantage
event-driven updates
fast convergence
Disadvantage
bandwidth consumption
memory usage
RELATED
CCNA3 v6.0 Final Exam Answers CCNA3 v6.0 Chapter 10 Exam
ONE RESPONSE
MARY MARY 19 MARCH, 2019 Reply
13. A network engineer is researching dynamic routing protocols and how much time it
takes for a network to converge. What does it mean for a router to achieve convergence?
*the amount of time a network administrator needs to configure a routing protocol in a
small- to medium-sized network
*the capability to transport data, video, and voice over the same media
Correct Answer****the amount of time it takes a router to share information, calculate
best paths, and update the routing table***
*the capability to forward traffic between hosts on a local network
ADD A COMMENT
Your email address will not be published. Required fields are marked *
Name
Website
Add Comment
This site uses Akismet to reduce spam. Learn how your comment data is processed.
SEARCH
Search
FIND US ON FACEBOOK
CCNA6
1,523 likes
Like Page
CCNA 1 v7 CCNA 2 v7
CCNA 3 v7
CCNA 1 v7.0Modules 16 – 17
CCNA1 v6 CCNA2 v6
CCNA3 v6 CCNA4 v6
CCNA 1 v6 - Chapter 1
CCNA 1 v6 - Chapter 2
CCNA 1 v6 - Chapter 3
CCNA 1 v6 - Chapter 4
CCNA 1 v6 - Chapter 5
CCNA 1 v6 - Chapter 6
CCNA 1 v6 - Chapter 7
CCNA 1 v6 - Chapter 8
CCNA 1 v6 - Chapter 9
CCNA 1 v6 - Chapter 10
CCNA 1 v6 - Chapter 11
CCNA6.COM
Routing and Switching v7.0 Exam Answers
Menu
Facebo
CCNA3
Pintere v6.0 Chapter 8 Exam Answers
CCNA 3 v6.0
11 July, 2017
No Comments
admin
CCNA 3, Chapter 8, scaling networks, v6.0
WhatsA
Gmail
0
SHARES
link-state database
forwarding database
routing table
link-state database*
routing table
SPF tree
DBD
LSR
LSU*
LSAck
4. What happens immediately after two OSPF routers have exchanged hello packets
and have formed a neighbor adjacency?
They exchange DBD packets in order to advertise parameters such as hello and dead intervals.
a loopback interface that is configured with the highest IP address on the router
the highest active interface that participates in the routing process because of a specifically configured network
statement
6. What are the two purposes of an OSPF router ID? (Choose two.)
to enable the SPF algorithm to determine the lowest cost path to remote networks
7. By default, what is the OSPF cost for any link with a bandwidth of 100 Mb/s or
greater?
1*
100
10000
100000000
8. Which command should be used to check the OSPF process ID, the router ID,
networks the router is advertising, the neighbors the router is receiving updates
from, and the default administrative distance?
show ip protocols*
show ip ospf
9. What are two reasons that will prevent two routers from forming an OSPFv2
adjacency? (Choose two.)
a mismatched Cisco IOS version that is used
one router connecting to a FastEthernet port on the switch and the other connecting to a GigabitEthernet port
10. Which three addresses could be used as the destination address for OSPFv3
messages? (Choose three.)
FE80::1*
FF02::5*
FF02::6*
FF02::A
FF02::1:2
2001:db8:cafe::1
11. A network administrator enters the command ipv6 router ospf 64 in global
configuration mode. What is the result of this command?
The router will be assigned an autonomous system number of 64.
13. Single area OSPFv3 has been enabled on a router via the ipv6 router ospf 20
command. Which command will enable this OSPFv3 process on an interface of that
router?
ipv6 ospf 0 area 0
14. What does a Cisco router use automatically to create link-local addresses on
serial interfaces when OSPFv3 is implemented?
the highest MAC address available on the router, the FE80::/10 prefix, and the EUI-48 process
the MAC address of the serial interface, the FE80::/10 prefix, and the EUI-64 process
an Ethernet interface MAC address available on the router, the FE80::/10 prefix, and the EUI-64
process*
15. Which command will verify that a router that is running OSPFv3 has formed an
adjacency with other routers in its OSPF area?
show running-configuration
16. Which command will provide information specific to OSPFv3 routes in the
routing table?
show ip route ospf
show ip route
17. Match the OSPF state with the order in which it occurs. (Not all options are
used.)
– not scored –
third state -> Two-way state
sixth state -> Loading state
18. Match each OSPF packet type to how it is used by a router. (Not all options are
used.)
compare local topology to that sent by another router = database description packet
20. Match the information to the command that is used to obtain the information.
(Not all options are used.)
23. Open the PT Activity. Perform the tasks in the activity instructions and then
complete the task.
Completion!*
Success!
Converged!
RELATED
CCNA3 v6.0 Chapter 2 Exam CCNA3 v6.0 Final Exam Answers
Answers 100% Option A
ADD A COMMENT
Your email address will not be published. Required fields are marked *
Name
Website
Add Comment
This site uses Akismet to reduce spam. Learn how your comment data is processed.
SEARCH
Search
FIND US ON FACEBOOK
CCNA6
1,523 likes
Like Page
CCNA 1 v7 CCNA 2 v7
CCNA 3 v7
CCNA 1 v7.0Modules 16 – 17
CCNA1 v6 CCNA2 v6
CCNA3 v6 CCNA4 v6
CCNA 1 v6 - Chapter 1
CCNA 1 v6 - Chapter 2
CCNA 1 v6 - Chapter 3
CCNA 1 v6 - Chapter 4
CCNA 1 v6 - Chapter 5
CCNA 1 v6 - Chapter 6
CCNA 1 v6 - Chapter 7
CCNA 1 v6 - Chapter 8
CCNA 1 v6 - Chapter 9
CCNA 1 v6 - Chapter 10
CCNA 1 v6 - Chapter 11
CCNA6.COM
Routing and Switching v7.0 Exam Answers
Menu
Facebo
CCNA3
Pintere v6.0 Chapter 9 Exam Answers
CCNA 3 v6.0
11 July, 2017
No Comments
admin
CCNA 3, Chapter 9, scaling networks, v6.0
WhatsA
Gmail
0
SHARES
1. What are two reasons for creating an OSPF network with multiple areas?
(Choose two.)
to provide areas in the network for routers that are not running OSPF
to simplify configuration
3. Which two statements correctly describe OSPF type 3 LSAs? (Choose two.)
Type 3 LSAs are known as autonomous system external LSA entries.
Type 3 LSAs are used for routes to networks outside the OSPF autonomous system.
4. Which characteristic describes both ABRs and ASBRs that are implemented in a
multiarea OSPF network?
They usually have many local networks attached.
They are required to reload frequently and quickly in order to update the LSDB.
type 2
type 3
type 5*
6. What OSPF LSA type is used to inform routers of the router ID of the DR in each
multiaccess network in an OSPF area?
type 1
type 2*
type 3
type 4
To reach network 172.16.2.0, traffic will travel through the GigabitEthernet0/0 interface.
To reach network 192.168.1.0, traffic will exit via the Serial0/0/0 interface.*
8. What routing table descriptor is used to identify OSPF summary networks that
originate from an ABR?
O
O IA*
O E1
O E2
O E2
O IA*
11. Which three steps in the design and implementation of a multiarea OSPF
network are considered planning steps? (Choose three.)
Verify OSPF.
Configure OSPF.
12. Which two networks are part of the summary route 192.168.32.0/22? (Choose
two.)
192.168.31.0/24
192.168.33.0/24*
192.168.37.0/24
192.168.35.0/24*
192.168.36.0/24
192.168.38.0/24
A network administrator has been asked to summarize the networks shown in the
exhibit as part of a multiarea OSPF implementation. All addresses are using a
subnet mask of 255.255.255.0. What is the correct summarization for these eight
networks?
10.0.4.0 255.255.0.0
10.0.0.0 255.255.240.0*
10.0.4.0 255.255.248.0
10.0.8.0 255.255.248.0
15. The network administrator has been asked to summarize the routes for a new
OSPF area. The networks to be summarized are 172.16.8.0, 172.16.10.0, and
172.16.12.0 with subnet masks of 255.255.255.0 for each network. Which command
should the administrator use to forward the summary route for area 15 into area 0?
area 0 range 172.16.8.0 255.255.255.248
16. Match each type of OSPF router to its description. (Not all options are used.)
a router with all its interfaces in the same area => internal router
a router that has at least one interface that is attached to a non-OSPF network => Autonomous System
Boundary Router
a router with its interfaces attached to multiple areas => Area Border Router
21. Open the PT Activity. Perform the tasks in the activity instructions and then
answer the question.
Why are users in the OSPF network not able to access the Internet?
The default route is not redistributed correctly from router R1 by OSPF.
The OSPF timers that are configured on routers R1, R2, and R3 are not compatible.
22. Open the PT Activity. Perform the tasks in the activity instructions and then
answer the question.
Fill in the blank. Do not use abbreviations.
What is the missing command on router R2 to establish an adjacency between routers R1 and R3? “network
172.16.10.0 0.0.0.255 area 0” .
RELATED
CCNA 3 v6.0 Pretest Exam CCNA3 v6.0 Chapter 6 Exam
Answers 100% Answers
ADD A COMMENT
Your email address will not be published. Required fields are marked *
Name
Website
Add Comment
This site uses Akismet to reduce spam. Learn how your comment data is processed.
SEARCH
Search
FIND US ON FACEBOOK
CCNA6
1,523 likes
Like Page
CCNA 1 v7 CCNA 2 v7
CCNA 3 v7
CCNA 1 v7.0Modules 16 – 17
CCNA1 v6 CCNA2 v6
CCNA3 v6 CCNA4 v6
CCNA 1 v6 - Chapter 1
CCNA 1 v6 - Chapter 2
CCNA 1 v6 - Chapter 3
CCNA 1 v6 - Chapter 4
CCNA 1 v6 - Chapter 5
CCNA 1 v6 - Chapter 6
CCNA 1 v6 - Chapter 7
CCNA 1 v6 - Chapter 8
CCNA 1 v6 - Chapter 9
CCNA 1 v6 - Chapter 10
CCNA 1 v6 - Chapter 11
CCNA6.COM
Routing and Switching v7.0 Exam Answers
Menu
Facebo
CCNA3
Pintere v6.0 Chapter 10 Exam Answers
CCNA 3 v6.0
11 July, 2017
No Comments
admin
CCNA 3, Chapter 10, scaling networks, v6.0
WhatsA
Gmail
0
SHARES
What three conclusions can be drawn from the displayed output? (Choose three.)
The DR can be reached through the GigabitEthernet 0/0 interface.*
The router ID values were not the criteria used to select the DR and the BDR.*
There have been 9 seconds since the last hello packet sent.*
All DROTHER routers will send LSAs to the DR and BDR to multicast 224.0.0.5.
If the DR stops producing Hello packets, a BDR will be elected, and then it promotes itself to assume the role
of DR.
With an election of the DR, the number of adjacencies is reduced from 6 to 3.*
4. Which OSPF feature allows a remote OSPF area to participate in OSPF routing
when it cannot connect directly to OSPF Area 0?
NBMA
DR/BDR
virtual link*
point-to-point connectivity
What are three resulting DR and BDR elections for the given topology? (Choose
three.)
R3 is BDR for segment A.
R3 is DR for segment A.
6. When checking a routing table, a network technician notices the following entry:
The edge of the OSPF area 0 is the interface that is addressed 192.168.16.3.
What two conclusions can be drawn based on the output of the show ipv6 route
command? (Choose two.)
Route 2001:DB8:CAFE:4::/64 is an external route advertised by an ASBR.
Routes 2001:DB8:CAFE:1::/64 and 2001:DB8:CAFE:3::/64 are advertised from the same router.
8. Which command will a network engineer issue to verify the configured hello and
dead timer intervals on a point-to-point WAN link between two routers that are
running OSPFv2?
show ip ospf neighbor
9. A network engineer suspects that OSPFv3 routers are not forming neighbor
adjacencies because there are interface timer mismatches. Which two commands
can be issued on the interface of each OSFPv3 router to resolve all timer
mismatches? (Choose two.)
no ipv6 ospf hello-interval*
ip ospf hello-interval 10
ip ospf dead-interval 40
10. A network engineer has manually configured the hello interval to 15 seconds on
an interface of a router that is running OSPFv2. By default, how will the dead
interval on the interface be affected?
The dead interval will now be 15 seconds.
The dead interval will not change from the default value.
11. Which command can be used to view the OSPF hello and dead time intervals?
show ip protocols
A network administrator is configuring OSPF for R1 and R2, but the adjacency
cannot be established. What is the cause of the issue?
The process ID is misconfigured.
What the amount of time that has elapsed since the router received a hello packet?
40 seconds
10 seconds
4 seconds*
6 seconds
14. Which two parameters must match between neighboring OSPF routers in order
to form an adjacency? (Choose two.)
hello / dead timers*
process ID
router ID
IP address
network types*
cost
A network administrator has configured OSPFv2 on the two Cisco routers but PC1
is unable to connect to PC2. What is the most likely problem?
Interface S0/0 is configured as a passive-interface on router R2.
Interface s0/0 has not been activated for OSPFv2 on router R2.
Interface Fa0/0 has not been activated for OSPFv2 on router R2.*
R1 and R2 are connected to the same LAN segment and are configured to run
OSPFv3. They are not forming a neighbor adjacency. What is the cause of the
problem?
The IPv6 addresses of R1 and R2 are not in the same subnet.
to verify that the router has formed an adjacency with its neighboring routers
Directly connected networks configured on router R1 are not being shared with
neighboring routers through OSPFv3. What is the cause of the issue?
IPv6 OSPF routing is not enabled.
There are no network statements for the routes in the OSPF configuration.
would the administrator use to confirm that OSPFv3 hello and dead intervals are
matching between routers?
show ipv6 ospf interface*
20. What three states are transient OPSF neighbor states that indicate a stable
adjacency is not yet formed between two routers? (Choose three.)
full
exstart*
2way
exchange*
loading*
established
21. Match each OSPF election criterion to its sequential order for the OSPF DR and
BDR election process. (Not all options are used.)
22. Open the PT Activity. Perform the tasks in the activity instructions and then
answer the question.
DR:R6 BDR:R5
DR:R5 BDR:R3
DR:R3 BDR:R6
DR:R4 BDR:R1
DR:R3 BDR:R5*
23. Open the PT Activity. Perform the tasks in the activity instructions and then
answer the question.
Use the ipv6 ospf priority 0 command on the interface g0/0 of RT1.
Use the ipv6 ospf priority 10 command on the interface g0/2 of RT1.*
RELATED
CCNA3 v6.0 Chapter 5 Exam CCNA3 v6.0 Chapter 7 Exam
Answers Answers
ADD A COMMENT
Your email address will not be published. Required fields are marked *
Name
Website
Add Comment
This site uses Akismet to reduce spam. Learn how your comment data is processed.
SEARCH
Search
FIND US ON FACEBOOK
CCNA6
1,523 likes
Like Page
CCNA 1 v7 CCNA 2 v7
CCNA 3 v7
CCNA 1 v7.0Modules 16 – 17
CCNA1 v6 CCNA2 v6
CCNA3 v6 CCNA4 v6
CCNA 1 v6 - Chapter 1
CCNA 1 v6 - Chapter 2
CCNA 1 v6 - Chapter 3
CCNA 1 v6 - Chapter 4
CCNA 1 v6 - Chapter 5
CCNA 1 v6 - Chapter 6
CCNA 1 v6 - Chapter 7
CCNA 1 v6 - Chapter 8
CCNA 1 v6 - Chapter 9
CCNA 1 v6 - Chapter 10
CCNA 1 v6 - Chapter 11