SlideShare ist ein Scribd-Unternehmen logo
1 von 56
Downloaden Sie, um offline zu lesen
9tut ICND1 Practice Questions (v2.00)

EXAM: 640-822                                        Formatted Version By: S Qaisar Shah

File Version: 2.0                                    My Blog : sqaisars.blogspot.com



                    Interconnecting Cisco Networking Devices – Part 1
                                        (640-822)
                               (9tut.net Latest Questions)




Content:
  Exam     A:   LabSim
  Exam     B:   LabSim
  Exam     C:   ARP Testlet
  Exam     D:   Hotspot
  Exam     E:   Operations
  Exam     F:   Subnetting
  Exam     G:   Drag & Drop questions
  Exam     H:   Wireless Questions

The author of these questions is the owner of 9tut.net/9tut.com

Visit www.9tut.net for ICND1 and ICND2 questions, sims and
feedback. Visit www.9tut.com for CCNA questions, sims and
feedback.

Good luck studying, practicing and on the exam.



Sections
1. LabSim
2. ARP Testlet
3. Hotspot
4. Operations
5. Subnetting
6. Drag & Drop questions
7. Wireless Questions
Exam A

 QUESTION 1
                                                                                                          Q A1
 This topology contains 3 routers and 1 switch. Complete the topology.

 Drag the appropriate device icons to the labeled Device.
 Drag the appropriate connections to the locations labeled Connections.
 Drag the appropriate IP addresses to the locations labeled IP address.

 (Hint: use the given host addresses and Main router information)
 To remove a device or connection, drag it away from the topology.

 Use information gathered from the Main router to complete the configuration of any additional
 routers. No passwords are required to access the Main router. The config terminal command has been
 disabled for the HQ router. The router does not require any configuration.

 Configure each additional router with the following:
   Configure the interfaces with the correct IP address and enable the interfaces.
   Set the password to allow console access to consolepw
   Set the password to allow telnet access to telnetpw
   Set the password to allow privilege mode access to privpw

 Note: Because routes are not being added to the configurations, you will not be able to ping
 through the internetwork.
 All devices have cable autosensing capabilities disabled.
 All hosts are PC’s

Click on Exhibit for further information.


                                                                             Formatted Version By: S Qaisar Shah.
Answer:
Section: LabSim

Explanation/Reference:

For the device at the bottom-right box, we notice that it has 2 interfaces Fa0/2 and Fa0/4; moreover the link
connects the PC on the right with the device on the bottom-right is a straight-through link -> it is a switch.

The question stated that this topology contains 3 routers and 1 switch -> two other devices are routers

Place them on appropriate locations as following:
(Host D and host E will be automatically added after placing two routers. Click on them to access
neighboring routers)

Specify appropriate connections between these devices:
   The router on the left is connected with the Main router through FastEthernet interfaces: use a
   crossover cable
   The router on the right is connected with the Main router through Serial interfaces: use a serial cable
   The router on the right and the Switch: use a straight-through cable
   The router on the left and the computer: use a crossover cable

(To remember which type of cable you should use, follow these tips:
   To connect two serial interfaces of 2 routers we use serial cable
   To specify when we use crossover cable or straight-through cable, we should remember:
      Group 1: Router, Host, Server
      Group 2: Hub, Switch
      One device in group 1 + One device in group 2: use straight-through cable
      Two devices in the same group: use crossover cable

For example:
we use straight-through cable to connect switch to router, switch to host, hub to host, hub to server…
and we use crossover cable to connect switch to switch, switch to hub, router to router, host to host… )




Assign appropriate IP addresses for interfaces:

From Main router, use show running-config command:
(Notice that you may see different IP addresses in the real CCNA exam, the ones shown above are just
used for demonstration)

From the output we learned that the ip address of Fa0/0 interface of the Main router is 192.168.152.177/28.

This address belongs to a subnetwork which has:

Increment: 16 (/28 = 255.255.255.240 or 1111 1111.1111 1111.1111 1111.1111 0000)
Network address: 192.168.152.176 (because 176 = 16 * 11 and 176 < 177)
Broadcast address: 192.168.152.191 (because 191 = 176 + 16 – 1)

And we can pick up an ip address from the list that belongs to this subnetwork: 192.168.152.190 and
assign it to the Fa0/0 interface the router on the left

Use the same method for interface Serial0/0 with an ip address of 192.168.152.161

Increment: 16
Network address: 192.168.152.160 (because 160 = 16 * 10 and 160 < 161)
Broadcast address: 192.168.152.175 (because 176 = 160 + 16 – 1)

-> and we choose 192.168.152.174 for Serial0/0 interface of the router on the right

Interface Fa0/1 of the router on the left

IP (of the computer on the left) : 192.168.152.129/28

Increment: 16
Network address: 192.168.152.128 (because 128 = 16 * 8 and 128 < 129)
Broadcast address: 192.168.152.143 (because 143 = 128 + 16 – 1)

-> we choose 192.168.152.142 from the list

Interface Fa0/0 of the router on the right

IP (of the computer on the left) : 192.168.152.225/28

Increment: 16
Network address: 192.168.152.224 (because 224 = 16 * 14 and 224 < 225)
Broadcast address: 192.168.152.239 (because 239 = 224 + 16 – 1)

-> we choose 192.168.152.238 from the list

Let’s have a look at the picture below to summarize:
Configure two routers on the left and right with these commands:

   Router1 = router on the left

Assign appropriate IP addresses to Fa0/0 & Fa0/1 interfaces:

Router1> enable
Router1# configure terminal
Router1(config)# interface fa0/0
Router1(config-if)# ip address 192.168.152.190                     255.255.255.240
Router1(config-if)# no shutdown

Router1(config-if)# interface fa0/1
Router1(config-if)# ip address 192.168.152.142                     255.255.255.240
Router1(config-if)# no shutdown

Set passwords (configure on two routers)

1. Console password:

Router1(config-if)# exit
Router1(config)# line console 0
Router1(config-line)# password consolepw
Router1(config-line)# login
Router1(config-line)# exit

2. Telnet password:

Router1(config)# line         vty 0 4
Router1(config-line)#         password telnetpw
Router1(config-line)#         login
Router1(config-line)#         exit

3. Privilege mode password:

Router1(config)# enable password privpw

4. Save the configuration:

Router1(config)# exit
Router1# copy running-config startup-config


   Configure IP addresses of Router2 (router on the right)

Router2> enable
Router2# configure terminal
Router2(config)# interface fa0/0
Router2(config-if)# ip address 192.168.152.238                 255.255.255.240
Router2(config-if)# no shutdown

Router2(config-if)# interface serial0/0
Router2(config-if)# ip address 192.168.152.174                 255.255.255.240
Router2(config-if)# no shutdown

1. Console password:

Router2(config-if)# exit
Router2(config)# line console 0
Router2(config-line)# password consolepw
Router2(config-line)# login
Router2(config-line)# exit

2. Telnet password:

Router2(config)# line         vty 0 4
Router2(config-line)#         password telnetpw
Router2(config-line)#         login
Router2(config-line)#         exit

3. Privilege mode password:

Router2(config)# enable password privpw

4. Save the configuration:

Router2(config)# exit
Router2# copy running-config startup-config


QUESTION 2
                                                                                                       Q A2
You have been hired by PC Consultants Incorporated to document the layout of the network.

Complete the network topology shown in the graphic by dragging the labels below with the appropriate
router types, interface types and IP addresses to the graphic.
Find the information you need by using the router console attached to the Home router.
                                                                    Click on Exhibit for further information.




Answer:




Section: LabSim

Explanation/Reference:

First we have to find out the types of these routers to place them in correct positions by using show cdp
neighbors command on HOME router:
There are 3 columns we should pay more attention to:

+ Local Intrfce (Local Interface): the interface on the device you are using “show cdp neighbors”
command. In this case it is the interface of HOME router

+ Platform: the platform of neighbor device

+ Port ID: the neighbor device’s port or interface which links to the HOME router

From the exhibit, the “Local Interface”, “Platform” and “Port ID” columns, we can identify where these four
routers should be placed and their corresponding associated ports




Finally, we need to identify the IP addresses of four interfaces on neighboring routers using show running-
config command:

Home# show running-config
!
interface FastEthernet0/0
  ip address 192.168.47.1 255.255.255.0 duplex auto
  speed auto
!
interface FastEthernet0/1
  ip address 192.168.238.1 255.255.255.0 duplex auto
  speed auto
!
interface Serial0/0
  ip address 192.168.235.1 255.255.255.0 duplex auto
!
interface Serial0/1
ip address 192.168.39.1             255.255.255.0 duplex auto

And we can easily assign corresponding ip addresses to four neighbor routers, which are on the same
network with HOME router’s interfaces>




QUESTION 3
                                                                                                          Q A3




Central Florida Widgets recently installed a new router in their Apopka office. Complete the network
installation by performing the initial router configurations and configuring RIPv2 routing using the router
command line interface (CLI) on the Apopka router.

Configure the router per the following requirements:
  Name of the router is Apopka
  Enable-secret password is cisco10
  The password to access user EXEC mode using the console is RouterPass
  The password to allow telnet access to the router is scan90

IPv4 addresses must be configured as follows:
    Ethernet network 209.165.201.0/27 – router has second assignable host address in subnet.
    Serial network is 192.0.2.128/28 – router has last assignable host address in the subnet.
Interfaces should be enabled.

Routing protocol is RIPv2.

(Notice: In the real exam the name, passwords, IP addresses and the positions of the assignable host
addresses might be different)

Case Study Title (Case Study):
1) Name the router:
Router> enable
Router# config terminal
Router(config)# hostname Apopka

2) Enable-secret password (cisco10):
Apopka(config)# enable secret cisco10

3) Set the console password to RouterPass:
Apopka(config)# line console 0
Apopka(config-line)# password RouterPass
Apopka(config-line)# login
Apopka(config-line)# exit

4) Set the Telnet password to scan90:
Apopka(config)# line vty 0 4
Apopka(config-line)# password scan90
Apopka(config-line)# login
Apopka(config-line)# exit

5) Configure Ethernet interface (on the right) of router Apopka:
The subnet mask of the Ethernet network 209.165.201.0 is 27. From this subnet mask, we can find out the
increment by converting it into binary form, that is /27 = 1111 1111.1111 1111.1111 1111.1110 0000. Pay
more attention to the last bit 1 because it tells us the increment, using the formula:
Increment = 2place of the last bit 1 (starts counting from 0,from right to left), in this case increment = 25 =
32. Therefore:

Increment: 32
Network address: 209.165.201.0
Broadcast address: 209.165.201.31 (because 209.165.201.32 is the second subnetwork, so the previous
IP – 209.165.201.31 – is the broadcast address of the first subnet).

-> The second assignable host address of this subnetwork is 209.165.201.2/27

Assign the second assignable host address to Fa0/0 interface of Apopka router:
Apopka(config)# interface Fa0/0
Apopka(config-if)# ip address 209.165.201.2 255.255.255.224
Apopka(config-if)# no shutdown
Apopka(config-if)# exit

6) Configure Serial interface (on the left) of router Apopka:
Using the same method to find out the increment of the Serial network:
Serial network 192.0.2.128/28:
Increment: 16 (/28 = 1111 1111.1111 1111.1111 1111.1111 0000)
Network address: 192.0.2.128 (because 8 * 16 = 128 so 192.0.2.128 is also the network address of this
subnet)
Broadcast address: 192.0.2.143

-> The last assignable host address in this subnet is 192.0.2.142/28.

Assign the last assignable host address to S0/0/0 interface of Apopka router:
Apopka(config)# interface S0/0/0 (or use interface S0/0 if not successful)
Apopka(config-if)# ip address 192.0.2.142 255.255.255.240
Apopka(config-if)# no shutdown
Apopka(config-if)# exit

7) Configure RIP v2 routing protocol:
Apopka(config)# router rip
Apopka(config-router)# version 2
Apopka(config-router)# network 209.165.201.0
Apopka(config-router)# network 192.0.2.128
Apopka(config-router)# end

Save the configuration:
Apopka# copy running-config startup-config

Finally, you should use the ping command to verify all are working properly!

A. The command Apopka(config-line)# login was issued to save the user password in the file
   password.txt

B. The command Apopka(config-line)# login was issued to prompt the user for a password when
   connected

C. The last assignable host address on the 192.168.0.128/28 network is 192.168.0.143

D. The command:
   Apopka(config-router)# network 192.0.2.128
   is equal to the command:
   Apopka(config-router)# network 192.0.2.0


Answer: BD
Section: LabSim

Explanation/Reference:

Visit http://www.9tut.net/icnd1/labsim/ripv2-sim for further explanation.
Exam B

QUESTION 1
                                                                                                    Q B1




What is the subnet broadcast address of the LAN connected to Router1?
                                                                 Click on Exhibit for further information.



Exhibit:




A. 192.168.136.15

B. 192.168.136.31
C. 192.168.136.63

D. 192.168.136.127

E. 255.255.255.255


Answer: A
Section: LabSim

Explanation/Reference:



QUESTION 2
                                                                                            Q B2




What is the bandwidth on the WAN interface of Router1?
                                                         Click on Exhibit for further information.



Exhibit:
A. 16 Kbit/sec

B. 32 Kbit/sec

C. 64 Kbit/sec

D. 128 Kbit/sec

E. 512 Kbit/sec

F. 1544 Kbit/sec


Answer: E
Section: LabSim

Explanation/Reference:



QUESTION 3
                         Q B3
What interfaces on Router1 have not had any configurations applied? (Choose two)
                                                                  Click on Exhibit for further information.



Exhibit:




A. Ethernet 0

B. FastEthenet 0/0
C. FastEthernet 0/1

D. Serial 0

E. Serial 0/0

F. Serial 0/1


Answer: CF
Section: LabSim

Explanation/Reference:



QUESTION 4
                                                                                                     Q B4




Including the address on the Router1 FastEthernet interface, how many hosts can have IP addresses on
the LAN to which Router1 is connected?
                                                                  Click on Exhibit for further information.



Exhibit:
A. 6

B. 14

C. 62

D. 128


Answer: B
Section: LabSim

Explanation/Reference:



QUESTION 5
                         Q B5
The hosts in the LAN are not able to connect to the Internet.

Which commands will correct this issue?

                                                                Click on Exhibit for further information.



Exhibit:




A. Router1(conf)# interface fa0/0
   Router1(conf-if)# no shutdown
B. Router1(conf)# interface fa0/1
   Router1(conf-if)# no shutdown

C. Router1(conf)# interface s0/0
   Router1(conf-if)# no shutdown

D. Router1(conf)# interface s0/1
   Router1(conf-if)# no shutdown

E. Router1(conf)# interface s0/0
   Router1(conf-if)# ip address 10.11.12.13   255.255.255.252

F. Router1(conf)# interface s0/1
   Routerl(conf-if)# ip address 10.11.12.13   255.255.255.252


Answer: C
Section: LabSim

Explanation/Reference:
Exam C

QUESTION 1
                                                                                                    Q C1




In order to begin communicating with the server, host F sends out an ARP request.

How will the devices exhibited in the topology respond to this request?



A. Switch West _1 will reply with the MAC address of the server.

B. Hosts D and E will respond that the destination is not on the local LAN.

C. Router SFX will forward the ARP request to the ILM router.

D. Switch West _1 will block the request since the server is not on the LAN.

E. The ILM router will respond with the IP address of the WWW server.

F. Router SFX will respond with the MAC address of its Fa0/0 interface.


Answer: F
Section: ARP Testlet

Explanation/Reference:

Because the server WWW is on another LAN of host F, host F knows that it has to send its packets to the
default gateway.
Therefore, for the first time, it will send out an ARP broadcast message asking for the MAC address of
router SFX.
Router SFX receives this message and replies with the MAC address of Fa0/0 interface.
Later, when host F wants to send packets to WWW server, it will include the IP address of WWW server
and the MAC address of Fa0/0 interface of SFX router in the “destination IP address” and “destination
MAC address” fields, respectively.


QUESTION 2
                                                                                                    Q C2
The ARP reply has been received by host F, which needs to build the packet.

What information will be placed in the header of the packet that leaves host F if host F is to communicate
with the WWW server? (Choose two)



A. The destination address will be the IP address of interface Fa0/0 of the ILM router.

B. The destination address will be the IP address of the WWW server.

C. The destination address will be the IP address of interface Fa0/0 of router SFX.

D. The source address will be the IP address of host F.

E. The source address will be the IP address of interface Fa0/0 of router SFX.

F. The destination address will be the IP address of interface Fa0/0 of router SFX.


Answer: BD
Section: ARP Testlet

Explanation/Reference:

After receiving ARP reply from SFX router, host F will place these fields in the header of the packets:

   Source addresses: the IP address of host F and the MAC address of host F
   Destination addresses: the IP address of WWW server and the MAC address of SFX router


QUESTION 3
                                                                                                          Q C3
The frame has been received by the ILM router and is to be delivered on the local LAN.

Which two statements describe the addressing of the Ethernet frame that has been created by the ILM
router? (Choose two)



A. The destination address will the be the MAC address of the switch A port attached to the Fa0/0
   interface of the ILM router .

B. The destination address will be the MAC address of the WWW server.

C. The destination address will be the MAC address of the A switch port attached to the WWW server.

D. The source address will be the MAC address of host F.

E. The source address will be the MAC address of interface Fa0/0 of the ILM router.


Answer: BE
Section: ARP Testlet

Explanation/Reference:



QUESTION 4
                                                                                                    Q C4




Host F is displaying two World Wide Web documents from the WWW server in two browser windows at the
same time.

How did the data find its way to the correct browser windows?
A. The IP source addresses of the packets will be used to direct the data to the correct browser window.

B. The browsers track the data by the URL.

C. TCP port numbers are used to direct the data to the correct application window.

D. The OSI application layer tracks the conversations and directs them to the correct browser.


Answer: C
Section: ARP Testlet

Explanation/Reference:

TCP and UDP protocol port numbers are designed to distinguish multiple applications running on a single
device from one another.
In the TCP and UDP header, there are “Source Port” and “Destination Port” fields which are used to
indicate the message sending process and receiving process identities defined.
The combination of the IP address and the port number is called “socket”.
Exam D

QUESTION 1
                                                        Q D1




On which router should a default route be configured?



A. on the ISP router

B. on R1

C. on R2

D. on R3


Answer: B
Section: Hotspot

Explanation/Reference:



QUESTION 2
                                                        Q D2
With all links operational and all routers converged, which of the following describes the messaging
between routers?



A. Hellos are sent every five seconds.

B. Multicasts are sent every 60 seconds.

C. Broadcasts are sent every 30 seconds.

D. No messaging unless the topology changes.


Answer: C
Section: Hotspot

Explanation/Reference:



QUESTION 3
                                                                                                       Q D3
Which of the following describes the route update process if the interface from R4 connected to LAN 4
goes down?



A. No updates occur

B. R4 tells both R1 and R3 the network not accessible. Both R3 and R1 update R2.

C. R4 tells only R1 the network is not accessible. R1 updates R2 and R2 updates R3.

D. R4 tells only R3 the network is not accessible. R3 updates R2 and R2 updates R1.


Answer: B
Section: Hotspot

Explanation/Reference:



QUESTION 4
                                                                                                        Q D4
Why would RIP be used rather than static routes on R1, R2, R3, and R4?



A. RIP creates more accurate than static routes.

B. RIP uses less network resources than do static routes.

C. RIP is supported by more different vendors equipment than static routes.

D. RIP requires less configuration to automatically adjust when links go down than static routes.


Answer: D
Section: Hotspot

Explanation/Reference:



QUESTION 5
                                                                                                    Q D5
On which router should a static route be configured?



A. on the ISP router

B. on R1

C. on R2

D. on R3

E. on R4


Answer: A
Section: Hotspot

Explanation/Reference:

Usually, a static route would be needed on the router which is connected to the ISP router to route to the
Internet.
The ISP router only needs a static route to reach the LANs network.
Exam E

QUESTION 1
                                                                                                     Q E1




The junior network support staff provided the diagram as a recommended configuration for the first phase
of a four-phase network expansion project.
The entire network expansion will have over 1000 users on 14 network segments and has been allocated
this IP address space:

192.168.1.1 through 192.168.5.255
192.168.100.1 through 198.168.100.255

What are three problems with this design? (Choose three)



A. The AREA 1 IP address space is inadequate for the number of users.

B. The AREA 3 IP address space is inadequate for the number of users.

C. AREA 2 could use a mask of /25 to conserve IP address space.

D. The network address space that is provided requires a single network-wide mask.

E. The router-to-router connection is wasting address space.

F. The broadcast domain in AREA 1 is too large for IP to function.


Answer: ACE
Section: Operations

Explanation/Reference:
QUESTION 2
                                                                                                       Q E2




A technician is testing connection problems in the internetwork.

What is the problem indicated by the output from HostA?



A. The routing on Router2 is not functioning properly.

B. An access list is applied to an interface of Router3.

C. The Fa0/24 interface of Switch1 is down.

D. The gateway address of HostA is incorrect or not configured.


Answer: D
Section: Operations

Explanation/Reference:

When trying to ping the IP 192.168.3.254, you received the replies from that IP.
It means that you can reach the Fa0/0 interface of Router1.
But notice that the IP of host A (192.168.3.1/24) and the IP of the Fa0/0 interface of Router 1
(192.168.3.254/24) are on the same network.
So you don’t need a gateway address configured on HostA.
Therefore you can’t conclude the gateway address of HostA was configured correctly.

Lately, you tried to use the tracert command to reach another network (192.168.4.7).
In this case, a gateway address was required for reaching the network of hostB.
But the result told that “Destination host unreachable” – means that Host A can not find a route to Host B
-> The gateway address of Host A was incorrect (something other than 192.168.3.254) or not configured is
a possibility.

A and B are incorrect because if there is a mis-configuration on Router 2 or Router 3 (while Router 1 is
configurated correctly), you will see at least one successful line when using tracert command likes the bold
line below:

      PC> tracert 192.168.4.7
      Tracing route to 192.168.4.7 over a maximum of 30 hops:
      1 62 ms 62 ms 46 ms 192.168.3.254
      2 * * * Request timed out.

C is incorrect because we can ping Router 1 -> port Fa0/24 on Switch 1 was turned on and running
correctly.


QUESTION 3
                                                                                                       Q E3




The internetwork is using subnets of the address 192.168.1.0 with a subset mask of 255.255.255.224.
The routing protocol in use is RIP version 1.

Which address could be assigned to the FastEthernet interface on RouterA?



A. 192.168.1.31

B. 192.168.1.64

C. 192.168.1.127

D. 192.168.1.190

E. 192.168.1.192


Answer: D
Section: Operations

Explanation/Reference:

255.255.255.224 = 1111 1111.1111 1111.1111 1111.1110 0000 (binary form)

Increment: 32

   First subnetwork: 192.168.1.0 -> 192.168.1.31 (A is incorrect because 192.168.1.31 is a broadcast
   address)
   Second subnetwork: 192.168.1.32 -> 192.168.1.63
   Third subnetwork: 192.168.1.64 -> 192.168.1.95 (B is incorrect because 192.168.1.64 is a network
   address)
   Fourth subnetwork: 192.168.1.96 -> 192.168.1.127 (C is incorrect because 192.168.1.127 is a
broadcast address)
   Fifth subnetwork: 192.168.1.128 -> 192.168.1.159
   Sixth subnetwork: 192.168.1.160 -> 192.168.1.191 (D is correct because 192.168.1.190 is the last
   assignable host address of this subnetwork)
   Seventh subnetwork: 192.168.1.192 -> 192.168.1.224 (E is incorrect because 192.168.1.192 is a
   network address)


QUESTION 4
                                                                                                  Q E4




For security reasons, information about RTA, including platform and IP addresses, should not be
accessible from the Internet.
This information should, however, be accessible to devices on the internal networks of RTA.

Which command or series of commands will accomplish these objectives?



A. RTA(config)# no cdp run

B. RTA(config)# no cdp enable

C. RTA(config)# interface s0/0
   RTA(config-if)# no cdp run

D. RTA(config)# interface s0/0
   RTA(config-if)# no cdp enable


Answer: D
Section: Operations

Explanation/Reference:



QUESTION 5
                                                                                                  Q E5
What three things will CORE router do with the data that is received from PC1? (Choose three)



A. The data frames will be forwarded out interface FastEthernet0/1 of CORE router.

B. The data frames will be forwarded out interface FastEthernet1/0 of CORE router.

C. CORE router will replace the destination IP address of the packets with the IP address of PC2.

D. CORE router will place the MAC address of PC2 in the destination MAC address of the frames.

E. CORE router will put the IP address of the forwarding FastEthernet interface in the place of the source
   IP address in the packets.

F. CORE router will put the MAC address of the forwarding FastEthernet interface in the place of the
   source MAC address.


Answer: BDF
Section: Operations

Explanation/Reference:
Exam F

QUESTION 1
                                                                                                        Q F1




The goal of this network design is to provide the most efficient use of IP address space in a network
expansion.
Each circle defines a network segment and the number of users required on that segment.
An IP subnetwork number and default gateway address are shown for each segment.

What are three problems with the network design as shown? (Choose three)



A. Interface fa0/3 has an IP address that overlaps with network 10.1.3.0/30.

B. Interface fa0/1 has an invalid IP address for the subnet on which it resides.

C. Interface fa0/2 has an invalid IP address for the subnet on which it resides.

D. Network 10.1.2.0/25 requires more user address space.

E. Network 10.1.3.128/25 requires more user address space.

F. The IP subnet 10.1.1.0/30 is invalid for a segment with a single server.


Answer: ABD
Section: Subnetting
Explanation/Reference:



QUESTION 2
                                                                                                      Q F2
If an ethernet port on a router was assigned an IP address of 172.16.112.1/20, what is the maximum
number of hosts allowed on this subnet?



A. 1024

B. 2046

C. 4094

D. 4096

E. 8190


Answer: C
Section: Subnetting

Explanation/Reference:



QUESTION 3
                                                                                                      Q F3




The internetwork is using subnets of the address 192.168.1.0 with a subnet mask of 255.255.255.224.
The routing protocol in use is RIP version 2.

Which address could be assigned to the FastEthernet interface on RouterA?



A. 192.168.1.31

B. 192.168.1.64

C. 192.168.1.127

D. 192.168.1.190
E. 192.168.1.192


Answer: D
Section: Subnetting

Explanation/Reference:



QUESTION 4
                                                                                    Q F4




HostA cannot ping HostB.

Assuming routing is properly configured, what could be the cause of this problem?



A. HostA is not on the same subnet as its default gateway.

B. The address of SwitchA is a subnet address.

C. The Fa0/0 interface on RouterA is on a subnet that can’t be used.

D. The serial interfaces of the routers are not on the same subnet.

E. The Fa0/0 interface on RouterB is using a broadcast address.


Answer: D
Section: Subnetting

Explanation/Reference:
Exam G

QUESTION 1
             Q G1




Answer:
Section: Drag & Drop questions

Explanation/Reference:



QUESTION 2
                                 Q G2
Answer:
Section: Drag & Drop questions

Explanation/Reference:



QUESTION 3
                                 Q G3
Answer:
Section: Drag & Drop questions

Explanation/Reference:



QUESTION 4
                                                                                                      Q G4




Answer:




Section: Drag & Drop questions

Explanation/Reference:

First please notice that by saying “replace” we often mean changes to NVRAM and TFTP while saying
“merge” or “add” we mean changes to RAM.
Next we should review the syntax of “copy” command:
Syntax: copy <source> <base config filename> <destination> <destination filename.txt>

1. By default, the flash memory in a router is used to store the Cisco IOS image so the requirement “
   replace the IOS image” means that moving file somewhere to the flash memory.
   In the left columns we only have one choice which has the flash as the destination ->copy tftp flash.

2. Same explanation as above, when saying “backup the current IOS image” the flash takes the role as
   the source ->copy flash tftp.
And “backup” means we should copy it to somewhere like tftp server, CDROM…

 3. The running-config is stored in the RAM so “make a backup copy of configuration in RAM” means
    copy running configuration from RAM to backup server (tftp) -> copy running-config tftp

 4. “copy running-config startup-config” is a very common command so no more explanation needed.

 5. After solving 4 boxes above, we only have two choices left: “copy tftp running-config” & “copy flash
    running-config”.
    The bottom-right box says “merge a backup configuration” so it should be the tftp server and the
    command here is copy tftp running-config.


Q#5 : As a CCNA candidate, you should master the functions of various commands. Look at the
following items, some commands are listed on the left. The related roles are listed on the right in a
wrong sequence. Please match them together. (Not all options are used)




Answer:

1) Router#copy tftp flash: replace the IOS image
2) Router#copy flash tftp: backup the current IOS image
3) Router#copy running-config tftp: make a backup copy of configuration in RAM
4) Router#copy running-config startup-config: make the configuration in RAM the configuration the
router will use on startup
5) Router#copy tftp running-config: merge a backup configuration with the configuration in RAM

Explanation

First please notice that by saying “replace” we often mean changes to NVRAM and TFTP while saying
“merge” or “add” we mean changes to RAM. Next we should review the syntax of “copy” command:

Syntax: copy <source> <base config filename> <destination> <destination filename.txt>

1) By default, the flash memory in a router is used to store the Cisco IOS image so the requirement
“replace the IOS image” means that moving file somewhere to the flash memory. In the left columns we
only have one choice which has the flash as the destination ->copy tftp flash.

2) Same explanation as above, when saying “backup the current IOS image” the flash takes the role as
the source ->copy flash tftp. And “backup” means we should copy it to somewhere like tftp server,
CDROM…

3) The running-config is stored in the RAM so “make a backup copy of configuration in RAM” means copy
running configuration from RAM so backup server (tftp) -> copy running-config tftp
4) “copy running-config startup-config” is a very common command so no more explanation needed.

5) After solving 4 boxes above, we only have two choices left: “copy tftp running-config” & “copy flash
running-config”. The bottom-right box says “merge a backup configuration” so it should be the tftp
server and the command here is copy tftp running-config.
Exam H

 QUESTION 1
                                                                                                        Q H1
 Which wireless LAN design ensures that a mobile wireless user will not lose connectivity when moving
 from one access point to another on the WLAN?



 A. Utilizing MAC address filtering to allow the client MAC address to authenticate with the surrounding APs

 B. Using adapters and access points manufactured by the same company

 C. Overlapping the wireless cell coverage by at least 10%

 D. Configuring all access points to use the same channel


 Answer: C
 Section: Wireless Questions

 Explanation/Reference:

 By using more than one Access Point (AP) we can create overlapping cells to allow roaming in a larger
 area.
 But we have to ensure that two APs must have at least 10% coverage overlap and they use non-
 overlapping channels.


 QUESTION 2
                                                                                                        Q H2
 You need to troubleshoot an interference issue with the wireless LAN.

 Which two devices can interfere with the operation of this network because they operate on similar
 frequencies? (Choose two)



 A. Microwave oven

 B. AM radio

 C. Toaster

 D. Copier

 E. Cordless phone

 F. IP phone

G. Ipod                                                  Formatted Version By: S Qaisar Shah.



 Answer: AE
 Section: Wireless Questions

 Explanation/Reference:

 Microwave oven and cordless phone radiate energy in the 2.4 GHz unlicensed band so they can interfere
with some WLAN standards.
As the result of that, you can’t hear clearly on the phone or can’t surf web.


QUESTION 3                                                                                                Q H3

Which of the following data network would you implement if you wanted a wireless network that had a
relatively high data rate, but was limited to very short distances?



A. Broadband personal comm. Service (PCS)

B. Broadband circuit

C. Infrared

D. Spread spectrum

E. Cable


Answer: C
Section: Wireless Questions

Explanation/Reference:

Infrared typically requires a line-of-sight (your TV remote control, for example) which means that it is limited
to very short distances.
I am not sure if it is considered “relative high data rate” but infrared can transfer up to 4Mpbs.


QUESTION 4
                                                                                                          Q H4
You need to add a wireless access point to a new office.

Which additional configuration step is necessary in order to connect to an access point that has SSID
broadcasting disabled?



A. Configure open authentication on the AP and the client

B. Set the SSID value in the client software to public

C. Set the SSID value on the client to the SSID configured on the AP

D. Configure MAC address filtering to permit the client to connect to the AP


Answer: C
Section: Wireless Questions

Explanation/Reference:

Service Set Identifier (SSID) is the term to identify a WLAN. In most cases SSID is broadcast by the AP,
the user only needs to select that SSID and provides a correct password to access it.
But in some cases for security reason, the SSID can be disabled.
Users can only access to that network if they type both SSID and password correctly.
QUESTION 5
                                                                                                             Q H5
You need to secure a new access point on the a wireless network.

Which two practices help secure the configuration utilities on wireless access points from unauthorized
access? (Choose two)



A. Changing the default SSID value

B. Configuring traffic filtering

C. Changing the mixed mode setting to single mode

D. Configuring a new administrator password

E. Assigning a private IP address to the AP


Answer: AD
Section: Wireless Questions

Explanation/Reference:

To improve security, you should change the default SSID value on your AP.
For example, Linksys routers (which are produced by Cisco) typically have an SSID of “linksys” -> A is
correct.

In an AP we can configure traffic filtering but it is mainly used for filtering which services clients can use, IP
ranges, ports, websites, time access…
It has no effect on securing your AP -> B is not correct.

“Mixed mode” here means we can configure AP to allow clients to use different standard like 802.11b, g or
n.
But setting it to single mode doesn’t have any security protection on it -> C is not correct.

We should also change the administrator password because everyone can access to the admin page of an
AP by open a web browser and type the IP address of that AP (for example: http://192.168.1.1).
Typically, Linksys Wireless routers have a default username/password of “admin/admin” or “admin/[blank]”
which are easily guessed or found out -> D is correct.

We can access the AP by using a private IP address (in the same private network of the AP – 192.168.1.1,
for example) -> E is not correct.


QUESTION 6
                                                                                                             Q H6
You need to determine the proper security settings on a new WLAN-capable office.

Which encryption type would WPA2 use in this office?



A. PSK

B. AES-CCMP
C. PPK via IV

D. TKIP/MIC

E. None of the other alternatives apply


Answer: B
Section: Wireless Questions

Explanation/Reference:

Advanced Encryption Standard (AES) is the cipher system used by RSN.
It is the equivalent of the RC4 algorithm used by WPA.
However the encryption mechanism is much more complex and does not suffer from the problems
associated with WEP. AES is a block cipher, operating on blocks of data 128bits long.

CCMP is the security protocol used by AES.
It is the equivalent of TKIP in WPA.
CCMP computes a Message Integrity Check (MIC) using the well known, and proven, Cipher Block
Chaining Message Authentication Code (CBC-MAC) method.
Changing even one bit in a message produces a totally different result.

The AES-CCMP encryption algorithm used in the 802.11i (WPA2) security protocol.
It uses the AES block cipher, but restricts the key length to 128 bits.
AES-CCMP incorporates two sophisticated cryptographic techniques (counter mode and CBC-MAC) and
adapts them to Ethernet frames to provide a robust security protocol between the mobile client and the
access point.


QUESTION 7
                                                                                                         Q H7
What is one reason why WPA encryption is preferred over WEP in this network?



A. The WPA key values remain the same until the client configuration is changed.

B. The values of WPA keys can change dynamically while the system is used.

C. The access point and the client are manually configured with different WPA key values.

D. A WPA key is longer and requires more special characters than the WEP key.

E. None of the other alternatives apply


Answer: B
Section: Wireless Questions

Explanation/Reference:

Wireless Encryption Protocol (WEP) uses RC4 encryption and a static 64-bit key so it can be easily broken
as only 40-bits are encrypted and 24 bits are clear-text IV(Initialization Vector).
It was later upgraded to 128-bit, but the IV was still clear text meaning it took slightly longer (minutes) to
break-in.

WPA was introduced in 2003 as a replacement for WEP.
WPA uses Temporal Key Integrity Protocol (TKIP) to automatically change the keys.
TKIP still uses RC4; it just improves how it’s done.
QUESTION 8
                                                                                                       Q H8
 In an effort to increase security within the wireless network, WPA is being utilized.

 Which two statements shown below best describe the wireless security standard that is defined by WPA? (
 Choose two)



 A. It requires use of an open authentication method

 B. It specifies use of a static encryption key that must be changed frequently to enhance security

 C. It includes authentication by PSK

 D. It specifies the use of dynamic encryption keys that change each time a client establishes a connection

 E. It requires that all access points and wireless devices use the same encryption key

 F. WPA works only with Cisco access points


Answer: CD                                                      Formatted Version By: S Qaisar Shah.
 Section: Wireless Questions

 Explanation/Reference:



 QUESTION 9
                                                                                                       Q H9
 You need to configure a new wireless access point for your network.

 What are three basic parameters to configure an AP? (Choose three)



 A. Authentication method

 B. RTS/CTS

 C. RF channel

 D. SSID


 Answer: ACD
 Section: Wireless Questions

 Explanation/Reference:
QUESTION 10
                                                                                                    Q H10
You have finished physically installing an access point on the ceiling at a newly opened office.

At a minimum, which parameter must you configure on the access point in order to allow wireless clients to
operate on it?



A. SSID

B. AES

C. TKIP

D. PSK

E. None of the other alternatives apply


Answer: A
Section: Wireless Questions

Explanation/Reference:



QUESTION 11
                                                                                                    Q H11
What two facts can be determined from the diagram of the WLAN shown above? (Choose two)



A. Access points in each cell must be configured to use channel 1

B. The network diagram represents an extended service set (ESS)

C. The two APs should be configured to operate on different channels

D. The area of overlap of the two cells represents a basic service set (BSS)

E. The area of overlap must be less than 10% of the area to ensure connectivity

F. There are too many hosts on this WLAN


Answer: BC
Section: Wireless Questions

Explanation/Reference:



QUESTION 12
                                                                                                     Q H12
A single 802.11g access point has been configured and installed in the center of a square shaped office.
A few wireless users are experiencing slow performance and drops while most users are operating at peak
efficiency.

From the list below, what are three likely causes of this problem? (Choose three)



A. Null SSID
B. Mismatched TKIP encryption

C. Cordless phones

D. Antenna type or direction

E. Mismatched SSID

F. Metal file cabinets


Answer: CDF
Section: Wireless Questions

Explanation/Reference:

802.11g operates in 2.4 GHz ISM band. Some popular devices and technologies can interfere 802.11g
signal:
   Newer cordless phones
   Bluetooth
   Microwaves
   Metal surface (can cause interference)
   Antenna (can reduce wireless signal)


QUESTION 13
                                                                                               Q H13
Three access points have been installed and configured to cover a small remote office.

What term defines the wireless topology?



A. SSID

B. BSS

C. ESS

D. IBSS

E. ASS


Answer: C
Section: Wireless Questions

Explanation/Reference:



QUESTION 14
                                                                                               Q H14
Two workers have established wireless communication directly between their wireless laptops.

What type of wireless topology has been created by these employees?
A.   ESS

B. IBSS

C. SSID

D. BSS


Answer: B
Section: Wireless Questions

Explanation/Reference:

Independent Basic Service Set – IBSS (ad hoc mode) does not use an AP.
It allows two devices to communicate directly.

Basic Service Set (BSS) is a single wireless LAN created with an AP and all devices that associate with
that AP.

Extended Service Set (ESS) consists of multiple APs, allowing roaming in a larger coverage area.


QUESTION 15
                                                                                                    Q H15
802.1b is being utilized in the wireless network.

Which spread spectrum technology does the 802.1b standard define for operation in this network?



A. FHSS

B. IR

C. DSSS and FHSS

D. DSSS

E. IR, FHSS and DSSS


Answer: D
Section: Wireless Questions

Explanation/Reference:

Frequency Hopping Spread Spectrum (FHSS) uses all frequencies in the band, hopping to different ones.
By using slightly different frequencies for consecutive transmissions, a device can hopefully avoid
interference from other devices that use the same unlicensed band, succeeding at sending data at some
frequencies.

Direct Sequence Spread Spectrum (DSSS) followed as the next general class of encoding type for WLANs.
Designed for use in the 2.4 GHz unlicensed band, DSSS uses one of several separate channels or
frequencies.

The original 802.11 WLAN standards used FHSS, but the current standards (802.11a, 802.11b, and
802.11g) do not.
802.1b uses DSSS while 802.1a & 802.1g use Orthogonal Frequency Division Multiplexing (OFDM).
(Reference: ICND1 Official Exam Certification Guide)



QUESTION 16
                                                                                                 Q H16
Which IEEE standard is used to define Wi-Fi?



A. IEEE 802.3

B. IEEE 802.5

C. IEEE 802.11h

D. IEEE 802.11c

E. IEEE 802.11


Answer: E
Section: Wireless Questions

Explanation/Reference:



QUESTION 17
                                                                                                 Q H17
An office is using an IEEE 802.11b wireless LAN.

What is the maximum data rate specified for this WLAN?



A. 11 mbps

B. 100 mbps

C. 54 mbps

D. 10 mbps

E. 1000 mbps
                                                                     Formatted Version By: S Qaisar Shah.
F. 16 mbps


Answer: A
Section: Wireless Questions

Explanation/Reference:

The maximum data rate for popular WLAN standards are listed below:
   IEEE 802.11a: 54 Mbps in the 5.7 GHz ISM band
   IEEE 802.11b: 11 Mbps in the 2.4 GHz ISM band
   IEEE 802.11g: 54 Mbps in the 2.4 GHz ISM band

Weitere ähnliche Inhalte

Was ist angesagt?

Cpu presentation
Cpu presentationCpu presentation
Cpu presentationHarry Singh
 
Computer Generations
Computer GenerationsComputer Generations
Computer GenerationsGaurav Gulati
 
Installing driver
Installing driverInstalling driver
Installing driverOnline
 
BIOS basic input output system
BIOS basic input output systemBIOS basic input output system
BIOS basic input output systemVipul Buchade
 
Computer Troubleshooting
Computer TroubleshootingComputer Troubleshooting
Computer TroubleshootingLisa Hartman
 
The Components of The System Unit
The Components of The System UnitThe Components of The System Unit
The Components of The System UnitSamudin Kassan
 
How CPU’s and Memory Work
How CPU’s and Memory WorkHow CPU’s and Memory Work
How CPU’s and Memory WorkJonathan Reid
 
Advanced PC Maintenance and Troubleshooting
Advanced PC Maintenance and TroubleshootingAdvanced PC Maintenance and Troubleshooting
Advanced PC Maintenance and TroubleshootingNatan Mesfin
 
Input output ports and connectors
Input output ports and connectorsInput output ports and connectors
Input output ports and connectorsbhardwaj1992
 
BIOS PRESENTATION
BIOS PRESENTATIONBIOS PRESENTATION
BIOS PRESENTATIONRajput98k
 
Herramientas de diagnostico
Herramientas de diagnosticoHerramientas de diagnostico
Herramientas de diagnosticoEQUIPO # 11
 
Pc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshootingPc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshootingTech Day Camp
 
Windows installation
Windows installationWindows installation
Windows installationZeeshan_5858
 
Basics of the Computer System
Basics of the Computer SystemBasics of the Computer System
Basics of the Computer SystemAhsan Rahim
 
How to configure a router
How to configure a router How to configure a router
How to configure a router IT Tech
 

Was ist angesagt? (20)

Cpu presentation
Cpu presentationCpu presentation
Cpu presentation
 
Computer Generations
Computer GenerationsComputer Generations
Computer Generations
 
Installing driver
Installing driverInstalling driver
Installing driver
 
Assembling the computer
Assembling the computerAssembling the computer
Assembling the computer
 
BIOS basic input output system
BIOS basic input output systemBIOS basic input output system
BIOS basic input output system
 
Computer Troubleshooting
Computer TroubleshootingComputer Troubleshooting
Computer Troubleshooting
 
The Components of The System Unit
The Components of The System UnitThe Components of The System Unit
The Components of The System Unit
 
Bios configuration management
Bios configuration managementBios configuration management
Bios configuration management
 
How CPU’s and Memory Work
How CPU’s and Memory WorkHow CPU’s and Memory Work
How CPU’s and Memory Work
 
Advanced PC Maintenance and Troubleshooting
Advanced PC Maintenance and TroubleshootingAdvanced PC Maintenance and Troubleshooting
Advanced PC Maintenance and Troubleshooting
 
Bios
BiosBios
Bios
 
Input output ports and connectors
Input output ports and connectorsInput output ports and connectors
Input output ports and connectors
 
BIOS PRESENTATION
BIOS PRESENTATIONBIOS PRESENTATION
BIOS PRESENTATION
 
Bios
BiosBios
Bios
 
Herramientas de diagnostico
Herramientas de diagnosticoHerramientas de diagnostico
Herramientas de diagnostico
 
Pc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshootingPc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshooting
 
Windows installation
Windows installationWindows installation
Windows installation
 
Basics of the Computer System
Basics of the Computer SystemBasics of the Computer System
Basics of the Computer System
 
Bootable Usb
Bootable UsbBootable Usb
Bootable Usb
 
How to configure a router
How to configure a router How to configure a router
How to configure a router
 

Andere mochten auch

VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network) Netwax Lab
 
OSPF Route Filtering
OSPF Route FilteringOSPF Route Filtering
OSPF Route FilteringNetwax Lab
 
STP Protection
STP ProtectionSTP Protection
STP ProtectionNetwax Lab
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless TechnologyNetwax Lab
 
Networking Devices
Networking DevicesNetworking Devices
Networking DevicesNetwax Lab
 
Introduction of Networking
Introduction of NetworkingIntroduction of Networking
Introduction of NetworkingNetwax Lab
 
OSPF (open shortest path first) part ii
OSPF (open shortest path first) part  iiOSPF (open shortest path first) part  ii
OSPF (open shortest path first) part iiNetwax Lab
 
Eincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiEincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiNetwax Lab
 
VRF Configuration
VRF ConfigurationVRF Configuration
VRF ConfigurationNetwax Lab
 
OSPF (open shortest path first) part iii
OSPF (open shortest path first) part  iiiOSPF (open shortest path first) part  iii
OSPF (open shortest path first) part iiiNetwax Lab
 
Routed Protocol
Routed ProtocolRouted Protocol
Routed ProtocolNetwax Lab
 
VLAN (virtual local area network)
VLAN (virtual local area network)VLAN (virtual local area network)
VLAN (virtual local area network)Netwax Lab
 
Why We Need IPv6
Why We Need IPv6Why We Need IPv6
Why We Need IPv6Netwax Lab
 
Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Netwax Lab
 

Andere mochten auch (20)

VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
TCP Intercept
TCP InterceptTCP Intercept
TCP Intercept
 
OSPF Route Filtering
OSPF Route FilteringOSPF Route Filtering
OSPF Route Filtering
 
STP Protection
STP ProtectionSTP Protection
STP Protection
 
IP Address
IP AddressIP Address
IP Address
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Introduction of Networking
Introduction of NetworkingIntroduction of Networking
Introduction of Networking
 
OSPF (open shortest path first) part ii
OSPF (open shortest path first) part  iiOSPF (open shortest path first) part  ii
OSPF (open shortest path first) part ii
 
Nxll24 i pv6
Nxll24 i pv6Nxll24 i pv6
Nxll24 i pv6
 
Eincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiEincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iii
 
Nxll23 i pv6
Nxll23 i pv6Nxll23 i pv6
Nxll23 i pv6
 
VRF Configuration
VRF ConfigurationVRF Configuration
VRF Configuration
 
SSL Web VPN
SSL Web VPNSSL Web VPN
SSL Web VPN
 
OSPF (open shortest path first) part iii
OSPF (open shortest path first) part  iiiOSPF (open shortest path first) part  iii
OSPF (open shortest path first) part iii
 
Routed Protocol
Routed ProtocolRouted Protocol
Routed Protocol
 
VLAN (virtual local area network)
VLAN (virtual local area network)VLAN (virtual local area network)
VLAN (virtual local area network)
 
Why We Need IPv6
Why We Need IPv6Why We Need IPv6
Why We Need IPv6
 
Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 

Ähnlich wie 119163798 icnd1-practice-questions-9tut

CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAMCMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAMHamesKellor
 
Labpractice1 configuringbasicroutingandswitchingwithanswer-121214084802-phpapp02
Labpractice1 configuringbasicroutingandswitchingwithanswer-121214084802-phpapp02Labpractice1 configuringbasicroutingandswitchingwithanswer-121214084802-phpapp02
Labpractice1 configuringbasicroutingandswitchingwithanswer-121214084802-phpapp02Abhilash Kuniyil
 
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docxAll contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docxgalerussel59292
 
Lab practice 1 configuring basic routing and switching (with answer)
Lab practice 1   configuring basic routing and switching (with answer) Lab practice 1   configuring basic routing and switching (with answer)
Lab practice 1 configuring basic routing and switching (with answer) Arz Sy
 
Intro to router_config
Intro to router_configIntro to router_config
Intro to router_configarjuntrk
 
Packet tracer practical guide
Packet tracer practical guidePacket tracer practical guide
Packet tracer practical guideNishant Gandhi
 
acn-practical_manual-19-20-1 final.pdf
acn-practical_manual-19-20-1 final.pdfacn-practical_manual-19-20-1 final.pdf
acn-practical_manual-19-20-1 final.pdfQual4
 
Voice Primer Lab.pdf
Voice Primer Lab.pdfVoice Primer Lab.pdf
Voice Primer Lab.pdfacaldere
 
Saad baig practical file
Saad baig practical fileSaad baig practical file
Saad baig practical fileSaadBaig33
 
Practice exam #2
Practice exam #2Practice exam #2
Practice exam #2Kris Mofu
 
Intro to router_config
Intro to router_configIntro to router_config
Intro to router_config97148881557
 
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docx
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docxCCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docx
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docxketurahhazelhurst
 
ITNE2003 -  AssignmentLearning ObjectivesUpon completion of this.docx
ITNE2003 -  AssignmentLearning ObjectivesUpon completion of this.docxITNE2003 -  AssignmentLearning ObjectivesUpon completion of this.docx
ITNE2003 -  AssignmentLearning ObjectivesUpon completion of this.docxsleeperfindley
 
Ccna 1 final exam answer v5
Ccna 1 final exam answer v5Ccna 1 final exam answer v5
Ccna 1 final exam answer v5friv4schoolgames
 
ccna project on topic company infrastructure
ccna project on topic company infrastructureccna project on topic company infrastructure
ccna project on topic company infrastructurePrince Gautam
 

Ähnlich wie 119163798 icnd1-practice-questions-9tut (20)

CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAMCMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
 
Labpractice1 configuringbasicroutingandswitchingwithanswer-121214084802-phpapp02
Labpractice1 configuringbasicroutingandswitchingwithanswer-121214084802-phpapp02Labpractice1 configuringbasicroutingandswitchingwithanswer-121214084802-phpapp02
Labpractice1 configuringbasicroutingandswitchingwithanswer-121214084802-phpapp02
 
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docxAll contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
 
Lab practice 1 configuring basic routing and switching (with answer)
Lab practice 1   configuring basic routing and switching (with answer) Lab practice 1   configuring basic routing and switching (with answer)
Lab practice 1 configuring basic routing and switching (with answer)
 
CCNA 1 Final v5.0 2014
CCNA 1 Final  v5.0 2014CCNA 1 Final  v5.0 2014
CCNA 1 Final v5.0 2014
 
Intro to router_config
Intro to router_configIntro to router_config
Intro to router_config
 
Packet tracer practical guide
Packet tracer practical guidePacket tracer practical guide
Packet tracer practical guide
 
acn-practical_manual-19-20-1 final.pdf
acn-practical_manual-19-20-1 final.pdfacn-practical_manual-19-20-1 final.pdf
acn-practical_manual-19-20-1 final.pdf
 
Voice Primer Lab.pdf
Voice Primer Lab.pdfVoice Primer Lab.pdf
Voice Primer Lab.pdf
 
Saad baig practical file
Saad baig practical fileSaad baig practical file
Saad baig practical file
 
Router commands
Router commandsRouter commands
Router commands
 
Practice exam #2
Practice exam #2Practice exam #2
Practice exam #2
 
Intro to router_config
Intro to router_configIntro to router_config
Intro to router_config
 
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docx
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docxCCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docx
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docx
 
ITNE2003 -  AssignmentLearning ObjectivesUpon completion of this.docx
ITNE2003 -  AssignmentLearning ObjectivesUpon completion of this.docxITNE2003 -  AssignmentLearning ObjectivesUpon completion of this.docx
ITNE2003 -  AssignmentLearning ObjectivesUpon completion of this.docx
 
Ccna 1 final exam answer v5
Ccna 1 final exam answer v5Ccna 1 final exam answer v5
Ccna 1 final exam answer v5
 
lab1
lab1lab1
lab1
 
Network
NetworkNetwork
Network
 
ccna project on topic company infrastructure
ccna project on topic company infrastructureccna project on topic company infrastructure
ccna project on topic company infrastructure
 
Nat 03
Nat 03Nat 03
Nat 03
 

Kürzlich hochgeladen

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Kürzlich hochgeladen (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

119163798 icnd1-practice-questions-9tut

  • 1. 9tut ICND1 Practice Questions (v2.00) EXAM: 640-822 Formatted Version By: S Qaisar Shah File Version: 2.0 My Blog : sqaisars.blogspot.com Interconnecting Cisco Networking Devices – Part 1 (640-822) (9tut.net Latest Questions) Content: Exam A: LabSim Exam B: LabSim Exam C: ARP Testlet Exam D: Hotspot Exam E: Operations Exam F: Subnetting Exam G: Drag & Drop questions Exam H: Wireless Questions The author of these questions is the owner of 9tut.net/9tut.com Visit www.9tut.net for ICND1 and ICND2 questions, sims and feedback. Visit www.9tut.com for CCNA questions, sims and feedback. Good luck studying, practicing and on the exam. Sections 1. LabSim 2. ARP Testlet 3. Hotspot 4. Operations 5. Subnetting 6. Drag & Drop questions 7. Wireless Questions
  • 2. Exam A QUESTION 1 Q A1 This topology contains 3 routers and 1 switch. Complete the topology. Drag the appropriate device icons to the labeled Device. Drag the appropriate connections to the locations labeled Connections. Drag the appropriate IP addresses to the locations labeled IP address. (Hint: use the given host addresses and Main router information) To remove a device or connection, drag it away from the topology. Use information gathered from the Main router to complete the configuration of any additional routers. No passwords are required to access the Main router. The config terminal command has been disabled for the HQ router. The router does not require any configuration. Configure each additional router with the following: Configure the interfaces with the correct IP address and enable the interfaces. Set the password to allow console access to consolepw Set the password to allow telnet access to telnetpw Set the password to allow privilege mode access to privpw Note: Because routes are not being added to the configurations, you will not be able to ping through the internetwork. All devices have cable autosensing capabilities disabled. All hosts are PC’s Click on Exhibit for further information. Formatted Version By: S Qaisar Shah.
  • 4. Section: LabSim Explanation/Reference: For the device at the bottom-right box, we notice that it has 2 interfaces Fa0/2 and Fa0/4; moreover the link connects the PC on the right with the device on the bottom-right is a straight-through link -> it is a switch. The question stated that this topology contains 3 routers and 1 switch -> two other devices are routers Place them on appropriate locations as following:
  • 5. (Host D and host E will be automatically added after placing two routers. Click on them to access neighboring routers) Specify appropriate connections between these devices: The router on the left is connected with the Main router through FastEthernet interfaces: use a crossover cable The router on the right is connected with the Main router through Serial interfaces: use a serial cable The router on the right and the Switch: use a straight-through cable The router on the left and the computer: use a crossover cable (To remember which type of cable you should use, follow these tips: To connect two serial interfaces of 2 routers we use serial cable To specify when we use crossover cable or straight-through cable, we should remember: Group 1: Router, Host, Server Group 2: Hub, Switch One device in group 1 + One device in group 2: use straight-through cable Two devices in the same group: use crossover cable For example: we use straight-through cable to connect switch to router, switch to host, hub to host, hub to server… and we use crossover cable to connect switch to switch, switch to hub, router to router, host to host… ) Assign appropriate IP addresses for interfaces: From Main router, use show running-config command:
  • 6. (Notice that you may see different IP addresses in the real CCNA exam, the ones shown above are just used for demonstration) From the output we learned that the ip address of Fa0/0 interface of the Main router is 192.168.152.177/28. This address belongs to a subnetwork which has: Increment: 16 (/28 = 255.255.255.240 or 1111 1111.1111 1111.1111 1111.1111 0000) Network address: 192.168.152.176 (because 176 = 16 * 11 and 176 < 177) Broadcast address: 192.168.152.191 (because 191 = 176 + 16 – 1) And we can pick up an ip address from the list that belongs to this subnetwork: 192.168.152.190 and assign it to the Fa0/0 interface the router on the left Use the same method for interface Serial0/0 with an ip address of 192.168.152.161 Increment: 16 Network address: 192.168.152.160 (because 160 = 16 * 10 and 160 < 161) Broadcast address: 192.168.152.175 (because 176 = 160 + 16 – 1) -> and we choose 192.168.152.174 for Serial0/0 interface of the router on the right Interface Fa0/1 of the router on the left IP (of the computer on the left) : 192.168.152.129/28 Increment: 16 Network address: 192.168.152.128 (because 128 = 16 * 8 and 128 < 129) Broadcast address: 192.168.152.143 (because 143 = 128 + 16 – 1) -> we choose 192.168.152.142 from the list Interface Fa0/0 of the router on the right IP (of the computer on the left) : 192.168.152.225/28 Increment: 16 Network address: 192.168.152.224 (because 224 = 16 * 14 and 224 < 225) Broadcast address: 192.168.152.239 (because 239 = 224 + 16 – 1) -> we choose 192.168.152.238 from the list Let’s have a look at the picture below to summarize:
  • 7. Configure two routers on the left and right with these commands: Router1 = router on the left Assign appropriate IP addresses to Fa0/0 & Fa0/1 interfaces: Router1> enable Router1# configure terminal Router1(config)# interface fa0/0 Router1(config-if)# ip address 192.168.152.190 255.255.255.240 Router1(config-if)# no shutdown Router1(config-if)# interface fa0/1 Router1(config-if)# ip address 192.168.152.142 255.255.255.240 Router1(config-if)# no shutdown Set passwords (configure on two routers) 1. Console password: Router1(config-if)# exit Router1(config)# line console 0 Router1(config-line)# password consolepw
  • 8. Router1(config-line)# login Router1(config-line)# exit 2. Telnet password: Router1(config)# line vty 0 4 Router1(config-line)# password telnetpw Router1(config-line)# login Router1(config-line)# exit 3. Privilege mode password: Router1(config)# enable password privpw 4. Save the configuration: Router1(config)# exit Router1# copy running-config startup-config Configure IP addresses of Router2 (router on the right) Router2> enable Router2# configure terminal Router2(config)# interface fa0/0 Router2(config-if)# ip address 192.168.152.238 255.255.255.240 Router2(config-if)# no shutdown Router2(config-if)# interface serial0/0 Router2(config-if)# ip address 192.168.152.174 255.255.255.240 Router2(config-if)# no shutdown 1. Console password: Router2(config-if)# exit Router2(config)# line console 0 Router2(config-line)# password consolepw Router2(config-line)# login Router2(config-line)# exit 2. Telnet password: Router2(config)# line vty 0 4 Router2(config-line)# password telnetpw Router2(config-line)# login Router2(config-line)# exit 3. Privilege mode password: Router2(config)# enable password privpw 4. Save the configuration: Router2(config)# exit Router2# copy running-config startup-config QUESTION 2 Q A2 You have been hired by PC Consultants Incorporated to document the layout of the network. Complete the network topology shown in the graphic by dragging the labels below with the appropriate router types, interface types and IP addresses to the graphic.
  • 9. Find the information you need by using the router console attached to the Home router. Click on Exhibit for further information. Answer: Section: LabSim Explanation/Reference: First we have to find out the types of these routers to place them in correct positions by using show cdp neighbors command on HOME router:
  • 10. There are 3 columns we should pay more attention to: + Local Intrfce (Local Interface): the interface on the device you are using “show cdp neighbors” command. In this case it is the interface of HOME router + Platform: the platform of neighbor device + Port ID: the neighbor device’s port or interface which links to the HOME router From the exhibit, the “Local Interface”, “Platform” and “Port ID” columns, we can identify where these four routers should be placed and their corresponding associated ports Finally, we need to identify the IP addresses of four interfaces on neighboring routers using show running- config command: Home# show running-config ! interface FastEthernet0/0 ip address 192.168.47.1 255.255.255.0 duplex auto speed auto ! interface FastEthernet0/1 ip address 192.168.238.1 255.255.255.0 duplex auto speed auto ! interface Serial0/0 ip address 192.168.235.1 255.255.255.0 duplex auto ! interface Serial0/1
  • 11. ip address 192.168.39.1 255.255.255.0 duplex auto And we can easily assign corresponding ip addresses to four neighbor routers, which are on the same network with HOME router’s interfaces> QUESTION 3 Q A3 Central Florida Widgets recently installed a new router in their Apopka office. Complete the network installation by performing the initial router configurations and configuring RIPv2 routing using the router command line interface (CLI) on the Apopka router. Configure the router per the following requirements: Name of the router is Apopka Enable-secret password is cisco10 The password to access user EXEC mode using the console is RouterPass The password to allow telnet access to the router is scan90 IPv4 addresses must be configured as follows: Ethernet network 209.165.201.0/27 – router has second assignable host address in subnet. Serial network is 192.0.2.128/28 – router has last assignable host address in the subnet. Interfaces should be enabled. Routing protocol is RIPv2. (Notice: In the real exam the name, passwords, IP addresses and the positions of the assignable host addresses might be different) Case Study Title (Case Study):
  • 12. 1) Name the router: Router> enable Router# config terminal Router(config)# hostname Apopka 2) Enable-secret password (cisco10): Apopka(config)# enable secret cisco10 3) Set the console password to RouterPass: Apopka(config)# line console 0 Apopka(config-line)# password RouterPass Apopka(config-line)# login Apopka(config-line)# exit 4) Set the Telnet password to scan90: Apopka(config)# line vty 0 4 Apopka(config-line)# password scan90 Apopka(config-line)# login Apopka(config-line)# exit 5) Configure Ethernet interface (on the right) of router Apopka: The subnet mask of the Ethernet network 209.165.201.0 is 27. From this subnet mask, we can find out the increment by converting it into binary form, that is /27 = 1111 1111.1111 1111.1111 1111.1110 0000. Pay more attention to the last bit 1 because it tells us the increment, using the formula: Increment = 2place of the last bit 1 (starts counting from 0,from right to left), in this case increment = 25 = 32. Therefore: Increment: 32 Network address: 209.165.201.0 Broadcast address: 209.165.201.31 (because 209.165.201.32 is the second subnetwork, so the previous IP – 209.165.201.31 – is the broadcast address of the first subnet). -> The second assignable host address of this subnetwork is 209.165.201.2/27 Assign the second assignable host address to Fa0/0 interface of Apopka router: Apopka(config)# interface Fa0/0 Apopka(config-if)# ip address 209.165.201.2 255.255.255.224 Apopka(config-if)# no shutdown Apopka(config-if)# exit 6) Configure Serial interface (on the left) of router Apopka: Using the same method to find out the increment of the Serial network: Serial network 192.0.2.128/28: Increment: 16 (/28 = 1111 1111.1111 1111.1111 1111.1111 0000) Network address: 192.0.2.128 (because 8 * 16 = 128 so 192.0.2.128 is also the network address of this subnet) Broadcast address: 192.0.2.143 -> The last assignable host address in this subnet is 192.0.2.142/28. Assign the last assignable host address to S0/0/0 interface of Apopka router: Apopka(config)# interface S0/0/0 (or use interface S0/0 if not successful) Apopka(config-if)# ip address 192.0.2.142 255.255.255.240 Apopka(config-if)# no shutdown Apopka(config-if)# exit 7) Configure RIP v2 routing protocol: Apopka(config)# router rip Apopka(config-router)# version 2 Apopka(config-router)# network 209.165.201.0 Apopka(config-router)# network 192.0.2.128 Apopka(config-router)# end Save the configuration:
  • 13. Apopka# copy running-config startup-config Finally, you should use the ping command to verify all are working properly! A. The command Apopka(config-line)# login was issued to save the user password in the file password.txt B. The command Apopka(config-line)# login was issued to prompt the user for a password when connected C. The last assignable host address on the 192.168.0.128/28 network is 192.168.0.143 D. The command: Apopka(config-router)# network 192.0.2.128 is equal to the command: Apopka(config-router)# network 192.0.2.0 Answer: BD Section: LabSim Explanation/Reference: Visit http://www.9tut.net/icnd1/labsim/ripv2-sim for further explanation.
  • 14. Exam B QUESTION 1 Q B1 What is the subnet broadcast address of the LAN connected to Router1? Click on Exhibit for further information. Exhibit: A. 192.168.136.15 B. 192.168.136.31
  • 15. C. 192.168.136.63 D. 192.168.136.127 E. 255.255.255.255 Answer: A Section: LabSim Explanation/Reference: QUESTION 2 Q B2 What is the bandwidth on the WAN interface of Router1? Click on Exhibit for further information. Exhibit:
  • 16. A. 16 Kbit/sec B. 32 Kbit/sec C. 64 Kbit/sec D. 128 Kbit/sec E. 512 Kbit/sec F. 1544 Kbit/sec Answer: E Section: LabSim Explanation/Reference: QUESTION 3 Q B3
  • 17. What interfaces on Router1 have not had any configurations applied? (Choose two) Click on Exhibit for further information. Exhibit: A. Ethernet 0 B. FastEthenet 0/0
  • 18. C. FastEthernet 0/1 D. Serial 0 E. Serial 0/0 F. Serial 0/1 Answer: CF Section: LabSim Explanation/Reference: QUESTION 4 Q B4 Including the address on the Router1 FastEthernet interface, how many hosts can have IP addresses on the LAN to which Router1 is connected? Click on Exhibit for further information. Exhibit:
  • 19. A. 6 B. 14 C. 62 D. 128 Answer: B Section: LabSim Explanation/Reference: QUESTION 5 Q B5
  • 20. The hosts in the LAN are not able to connect to the Internet. Which commands will correct this issue? Click on Exhibit for further information. Exhibit: A. Router1(conf)# interface fa0/0 Router1(conf-if)# no shutdown
  • 21. B. Router1(conf)# interface fa0/1 Router1(conf-if)# no shutdown C. Router1(conf)# interface s0/0 Router1(conf-if)# no shutdown D. Router1(conf)# interface s0/1 Router1(conf-if)# no shutdown E. Router1(conf)# interface s0/0 Router1(conf-if)# ip address 10.11.12.13 255.255.255.252 F. Router1(conf)# interface s0/1 Routerl(conf-if)# ip address 10.11.12.13 255.255.255.252 Answer: C Section: LabSim Explanation/Reference:
  • 22. Exam C QUESTION 1 Q C1 In order to begin communicating with the server, host F sends out an ARP request. How will the devices exhibited in the topology respond to this request? A. Switch West _1 will reply with the MAC address of the server. B. Hosts D and E will respond that the destination is not on the local LAN. C. Router SFX will forward the ARP request to the ILM router. D. Switch West _1 will block the request since the server is not on the LAN. E. The ILM router will respond with the IP address of the WWW server. F. Router SFX will respond with the MAC address of its Fa0/0 interface. Answer: F Section: ARP Testlet Explanation/Reference: Because the server WWW is on another LAN of host F, host F knows that it has to send its packets to the default gateway. Therefore, for the first time, it will send out an ARP broadcast message asking for the MAC address of router SFX. Router SFX receives this message and replies with the MAC address of Fa0/0 interface. Later, when host F wants to send packets to WWW server, it will include the IP address of WWW server and the MAC address of Fa0/0 interface of SFX router in the “destination IP address” and “destination MAC address” fields, respectively. QUESTION 2 Q C2
  • 23. The ARP reply has been received by host F, which needs to build the packet. What information will be placed in the header of the packet that leaves host F if host F is to communicate with the WWW server? (Choose two) A. The destination address will be the IP address of interface Fa0/0 of the ILM router. B. The destination address will be the IP address of the WWW server. C. The destination address will be the IP address of interface Fa0/0 of router SFX. D. The source address will be the IP address of host F. E. The source address will be the IP address of interface Fa0/0 of router SFX. F. The destination address will be the IP address of interface Fa0/0 of router SFX. Answer: BD Section: ARP Testlet Explanation/Reference: After receiving ARP reply from SFX router, host F will place these fields in the header of the packets: Source addresses: the IP address of host F and the MAC address of host F Destination addresses: the IP address of WWW server and the MAC address of SFX router QUESTION 3 Q C3
  • 24. The frame has been received by the ILM router and is to be delivered on the local LAN. Which two statements describe the addressing of the Ethernet frame that has been created by the ILM router? (Choose two) A. The destination address will the be the MAC address of the switch A port attached to the Fa0/0 interface of the ILM router . B. The destination address will be the MAC address of the WWW server. C. The destination address will be the MAC address of the A switch port attached to the WWW server. D. The source address will be the MAC address of host F. E. The source address will be the MAC address of interface Fa0/0 of the ILM router. Answer: BE Section: ARP Testlet Explanation/Reference: QUESTION 4 Q C4 Host F is displaying two World Wide Web documents from the WWW server in two browser windows at the same time. How did the data find its way to the correct browser windows?
  • 25. A. The IP source addresses of the packets will be used to direct the data to the correct browser window. B. The browsers track the data by the URL. C. TCP port numbers are used to direct the data to the correct application window. D. The OSI application layer tracks the conversations and directs them to the correct browser. Answer: C Section: ARP Testlet Explanation/Reference: TCP and UDP protocol port numbers are designed to distinguish multiple applications running on a single device from one another. In the TCP and UDP header, there are “Source Port” and “Destination Port” fields which are used to indicate the message sending process and receiving process identities defined. The combination of the IP address and the port number is called “socket”.
  • 26. Exam D QUESTION 1 Q D1 On which router should a default route be configured? A. on the ISP router B. on R1 C. on R2 D. on R3 Answer: B Section: Hotspot Explanation/Reference: QUESTION 2 Q D2
  • 27. With all links operational and all routers converged, which of the following describes the messaging between routers? A. Hellos are sent every five seconds. B. Multicasts are sent every 60 seconds. C. Broadcasts are sent every 30 seconds. D. No messaging unless the topology changes. Answer: C Section: Hotspot Explanation/Reference: QUESTION 3 Q D3
  • 28. Which of the following describes the route update process if the interface from R4 connected to LAN 4 goes down? A. No updates occur B. R4 tells both R1 and R3 the network not accessible. Both R3 and R1 update R2. C. R4 tells only R1 the network is not accessible. R1 updates R2 and R2 updates R3. D. R4 tells only R3 the network is not accessible. R3 updates R2 and R2 updates R1. Answer: B Section: Hotspot Explanation/Reference: QUESTION 4 Q D4
  • 29. Why would RIP be used rather than static routes on R1, R2, R3, and R4? A. RIP creates more accurate than static routes. B. RIP uses less network resources than do static routes. C. RIP is supported by more different vendors equipment than static routes. D. RIP requires less configuration to automatically adjust when links go down than static routes. Answer: D Section: Hotspot Explanation/Reference: QUESTION 5 Q D5
  • 30. On which router should a static route be configured? A. on the ISP router B. on R1 C. on R2 D. on R3 E. on R4 Answer: A Section: Hotspot Explanation/Reference: Usually, a static route would be needed on the router which is connected to the ISP router to route to the Internet. The ISP router only needs a static route to reach the LANs network.
  • 31. Exam E QUESTION 1 Q E1 The junior network support staff provided the diagram as a recommended configuration for the first phase of a four-phase network expansion project. The entire network expansion will have over 1000 users on 14 network segments and has been allocated this IP address space: 192.168.1.1 through 192.168.5.255 192.168.100.1 through 198.168.100.255 What are three problems with this design? (Choose three) A. The AREA 1 IP address space is inadequate for the number of users. B. The AREA 3 IP address space is inadequate for the number of users. C. AREA 2 could use a mask of /25 to conserve IP address space. D. The network address space that is provided requires a single network-wide mask. E. The router-to-router connection is wasting address space. F. The broadcast domain in AREA 1 is too large for IP to function. Answer: ACE Section: Operations Explanation/Reference:
  • 32. QUESTION 2 Q E2 A technician is testing connection problems in the internetwork. What is the problem indicated by the output from HostA? A. The routing on Router2 is not functioning properly. B. An access list is applied to an interface of Router3. C. The Fa0/24 interface of Switch1 is down. D. The gateway address of HostA is incorrect or not configured. Answer: D Section: Operations Explanation/Reference: When trying to ping the IP 192.168.3.254, you received the replies from that IP. It means that you can reach the Fa0/0 interface of Router1. But notice that the IP of host A (192.168.3.1/24) and the IP of the Fa0/0 interface of Router 1 (192.168.3.254/24) are on the same network. So you don’t need a gateway address configured on HostA. Therefore you can’t conclude the gateway address of HostA was configured correctly. Lately, you tried to use the tracert command to reach another network (192.168.4.7). In this case, a gateway address was required for reaching the network of hostB. But the result told that “Destination host unreachable” – means that Host A can not find a route to Host B -> The gateway address of Host A was incorrect (something other than 192.168.3.254) or not configured is a possibility. A and B are incorrect because if there is a mis-configuration on Router 2 or Router 3 (while Router 1 is
  • 33. configurated correctly), you will see at least one successful line when using tracert command likes the bold line below: PC> tracert 192.168.4.7 Tracing route to 192.168.4.7 over a maximum of 30 hops: 1 62 ms 62 ms 46 ms 192.168.3.254 2 * * * Request timed out. C is incorrect because we can ping Router 1 -> port Fa0/24 on Switch 1 was turned on and running correctly. QUESTION 3 Q E3 The internetwork is using subnets of the address 192.168.1.0 with a subset mask of 255.255.255.224. The routing protocol in use is RIP version 1. Which address could be assigned to the FastEthernet interface on RouterA? A. 192.168.1.31 B. 192.168.1.64 C. 192.168.1.127 D. 192.168.1.190 E. 192.168.1.192 Answer: D Section: Operations Explanation/Reference: 255.255.255.224 = 1111 1111.1111 1111.1111 1111.1110 0000 (binary form) Increment: 32 First subnetwork: 192.168.1.0 -> 192.168.1.31 (A is incorrect because 192.168.1.31 is a broadcast address) Second subnetwork: 192.168.1.32 -> 192.168.1.63 Third subnetwork: 192.168.1.64 -> 192.168.1.95 (B is incorrect because 192.168.1.64 is a network address) Fourth subnetwork: 192.168.1.96 -> 192.168.1.127 (C is incorrect because 192.168.1.127 is a
  • 34. broadcast address) Fifth subnetwork: 192.168.1.128 -> 192.168.1.159 Sixth subnetwork: 192.168.1.160 -> 192.168.1.191 (D is correct because 192.168.1.190 is the last assignable host address of this subnetwork) Seventh subnetwork: 192.168.1.192 -> 192.168.1.224 (E is incorrect because 192.168.1.192 is a network address) QUESTION 4 Q E4 For security reasons, information about RTA, including platform and IP addresses, should not be accessible from the Internet. This information should, however, be accessible to devices on the internal networks of RTA. Which command or series of commands will accomplish these objectives? A. RTA(config)# no cdp run B. RTA(config)# no cdp enable C. RTA(config)# interface s0/0 RTA(config-if)# no cdp run D. RTA(config)# interface s0/0 RTA(config-if)# no cdp enable Answer: D Section: Operations Explanation/Reference: QUESTION 5 Q E5
  • 35. What three things will CORE router do with the data that is received from PC1? (Choose three) A. The data frames will be forwarded out interface FastEthernet0/1 of CORE router. B. The data frames will be forwarded out interface FastEthernet1/0 of CORE router. C. CORE router will replace the destination IP address of the packets with the IP address of PC2. D. CORE router will place the MAC address of PC2 in the destination MAC address of the frames. E. CORE router will put the IP address of the forwarding FastEthernet interface in the place of the source IP address in the packets. F. CORE router will put the MAC address of the forwarding FastEthernet interface in the place of the source MAC address. Answer: BDF Section: Operations Explanation/Reference:
  • 36. Exam F QUESTION 1 Q F1 The goal of this network design is to provide the most efficient use of IP address space in a network expansion. Each circle defines a network segment and the number of users required on that segment. An IP subnetwork number and default gateway address are shown for each segment. What are three problems with the network design as shown? (Choose three) A. Interface fa0/3 has an IP address that overlaps with network 10.1.3.0/30. B. Interface fa0/1 has an invalid IP address for the subnet on which it resides. C. Interface fa0/2 has an invalid IP address for the subnet on which it resides. D. Network 10.1.2.0/25 requires more user address space. E. Network 10.1.3.128/25 requires more user address space. F. The IP subnet 10.1.1.0/30 is invalid for a segment with a single server. Answer: ABD Section: Subnetting
  • 37. Explanation/Reference: QUESTION 2 Q F2 If an ethernet port on a router was assigned an IP address of 172.16.112.1/20, what is the maximum number of hosts allowed on this subnet? A. 1024 B. 2046 C. 4094 D. 4096 E. 8190 Answer: C Section: Subnetting Explanation/Reference: QUESTION 3 Q F3 The internetwork is using subnets of the address 192.168.1.0 with a subnet mask of 255.255.255.224. The routing protocol in use is RIP version 2. Which address could be assigned to the FastEthernet interface on RouterA? A. 192.168.1.31 B. 192.168.1.64 C. 192.168.1.127 D. 192.168.1.190
  • 38. E. 192.168.1.192 Answer: D Section: Subnetting Explanation/Reference: QUESTION 4 Q F4 HostA cannot ping HostB. Assuming routing is properly configured, what could be the cause of this problem? A. HostA is not on the same subnet as its default gateway. B. The address of SwitchA is a subnet address. C. The Fa0/0 interface on RouterA is on a subnet that can’t be used. D. The serial interfaces of the routers are not on the same subnet. E. The Fa0/0 interface on RouterB is using a broadcast address. Answer: D Section: Subnetting Explanation/Reference:
  • 39. Exam G QUESTION 1 Q G1 Answer:
  • 40. Section: Drag & Drop questions Explanation/Reference: QUESTION 2 Q G2
  • 42. Section: Drag & Drop questions Explanation/Reference: QUESTION 3 Q G3
  • 44. Section: Drag & Drop questions Explanation/Reference: QUESTION 4 Q G4 Answer: Section: Drag & Drop questions Explanation/Reference: First please notice that by saying “replace” we often mean changes to NVRAM and TFTP while saying “merge” or “add” we mean changes to RAM. Next we should review the syntax of “copy” command: Syntax: copy <source> <base config filename> <destination> <destination filename.txt> 1. By default, the flash memory in a router is used to store the Cisco IOS image so the requirement “ replace the IOS image” means that moving file somewhere to the flash memory. In the left columns we only have one choice which has the flash as the destination ->copy tftp flash. 2. Same explanation as above, when saying “backup the current IOS image” the flash takes the role as the source ->copy flash tftp.
  • 45. And “backup” means we should copy it to somewhere like tftp server, CDROM… 3. The running-config is stored in the RAM so “make a backup copy of configuration in RAM” means copy running configuration from RAM to backup server (tftp) -> copy running-config tftp 4. “copy running-config startup-config” is a very common command so no more explanation needed. 5. After solving 4 boxes above, we only have two choices left: “copy tftp running-config” & “copy flash running-config”. The bottom-right box says “merge a backup configuration” so it should be the tftp server and the command here is copy tftp running-config. Q#5 : As a CCNA candidate, you should master the functions of various commands. Look at the following items, some commands are listed on the left. The related roles are listed on the right in a wrong sequence. Please match them together. (Not all options are used) Answer: 1) Router#copy tftp flash: replace the IOS image 2) Router#copy flash tftp: backup the current IOS image 3) Router#copy running-config tftp: make a backup copy of configuration in RAM 4) Router#copy running-config startup-config: make the configuration in RAM the configuration the router will use on startup 5) Router#copy tftp running-config: merge a backup configuration with the configuration in RAM Explanation First please notice that by saying “replace” we often mean changes to NVRAM and TFTP while saying “merge” or “add” we mean changes to RAM. Next we should review the syntax of “copy” command: Syntax: copy <source> <base config filename> <destination> <destination filename.txt> 1) By default, the flash memory in a router is used to store the Cisco IOS image so the requirement “replace the IOS image” means that moving file somewhere to the flash memory. In the left columns we only have one choice which has the flash as the destination ->copy tftp flash. 2) Same explanation as above, when saying “backup the current IOS image” the flash takes the role as the source ->copy flash tftp. And “backup” means we should copy it to somewhere like tftp server, CDROM… 3) The running-config is stored in the RAM so “make a backup copy of configuration in RAM” means copy running configuration from RAM so backup server (tftp) -> copy running-config tftp
  • 46. 4) “copy running-config startup-config” is a very common command so no more explanation needed. 5) After solving 4 boxes above, we only have two choices left: “copy tftp running-config” & “copy flash running-config”. The bottom-right box says “merge a backup configuration” so it should be the tftp server and the command here is copy tftp running-config.
  • 47. Exam H QUESTION 1 Q H1 Which wireless LAN design ensures that a mobile wireless user will not lose connectivity when moving from one access point to another on the WLAN? A. Utilizing MAC address filtering to allow the client MAC address to authenticate with the surrounding APs B. Using adapters and access points manufactured by the same company C. Overlapping the wireless cell coverage by at least 10% D. Configuring all access points to use the same channel Answer: C Section: Wireless Questions Explanation/Reference: By using more than one Access Point (AP) we can create overlapping cells to allow roaming in a larger area. But we have to ensure that two APs must have at least 10% coverage overlap and they use non- overlapping channels. QUESTION 2 Q H2 You need to troubleshoot an interference issue with the wireless LAN. Which two devices can interfere with the operation of this network because they operate on similar frequencies? (Choose two) A. Microwave oven B. AM radio C. Toaster D. Copier E. Cordless phone F. IP phone G. Ipod Formatted Version By: S Qaisar Shah. Answer: AE Section: Wireless Questions Explanation/Reference: Microwave oven and cordless phone radiate energy in the 2.4 GHz unlicensed band so they can interfere
  • 48. with some WLAN standards. As the result of that, you can’t hear clearly on the phone or can’t surf web. QUESTION 3 Q H3 Which of the following data network would you implement if you wanted a wireless network that had a relatively high data rate, but was limited to very short distances? A. Broadband personal comm. Service (PCS) B. Broadband circuit C. Infrared D. Spread spectrum E. Cable Answer: C Section: Wireless Questions Explanation/Reference: Infrared typically requires a line-of-sight (your TV remote control, for example) which means that it is limited to very short distances. I am not sure if it is considered “relative high data rate” but infrared can transfer up to 4Mpbs. QUESTION 4 Q H4 You need to add a wireless access point to a new office. Which additional configuration step is necessary in order to connect to an access point that has SSID broadcasting disabled? A. Configure open authentication on the AP and the client B. Set the SSID value in the client software to public C. Set the SSID value on the client to the SSID configured on the AP D. Configure MAC address filtering to permit the client to connect to the AP Answer: C Section: Wireless Questions Explanation/Reference: Service Set Identifier (SSID) is the term to identify a WLAN. In most cases SSID is broadcast by the AP, the user only needs to select that SSID and provides a correct password to access it. But in some cases for security reason, the SSID can be disabled. Users can only access to that network if they type both SSID and password correctly.
  • 49. QUESTION 5 Q H5 You need to secure a new access point on the a wireless network. Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two) A. Changing the default SSID value B. Configuring traffic filtering C. Changing the mixed mode setting to single mode D. Configuring a new administrator password E. Assigning a private IP address to the AP Answer: AD Section: Wireless Questions Explanation/Reference: To improve security, you should change the default SSID value on your AP. For example, Linksys routers (which are produced by Cisco) typically have an SSID of “linksys” -> A is correct. In an AP we can configure traffic filtering but it is mainly used for filtering which services clients can use, IP ranges, ports, websites, time access… It has no effect on securing your AP -> B is not correct. “Mixed mode” here means we can configure AP to allow clients to use different standard like 802.11b, g or n. But setting it to single mode doesn’t have any security protection on it -> C is not correct. We should also change the administrator password because everyone can access to the admin page of an AP by open a web browser and type the IP address of that AP (for example: http://192.168.1.1). Typically, Linksys Wireless routers have a default username/password of “admin/admin” or “admin/[blank]” which are easily guessed or found out -> D is correct. We can access the AP by using a private IP address (in the same private network of the AP – 192.168.1.1, for example) -> E is not correct. QUESTION 6 Q H6 You need to determine the proper security settings on a new WLAN-capable office. Which encryption type would WPA2 use in this office? A. PSK B. AES-CCMP
  • 50. C. PPK via IV D. TKIP/MIC E. None of the other alternatives apply Answer: B Section: Wireless Questions Explanation/Reference: Advanced Encryption Standard (AES) is the cipher system used by RSN. It is the equivalent of the RC4 algorithm used by WPA. However the encryption mechanism is much more complex and does not suffer from the problems associated with WEP. AES is a block cipher, operating on blocks of data 128bits long. CCMP is the security protocol used by AES. It is the equivalent of TKIP in WPA. CCMP computes a Message Integrity Check (MIC) using the well known, and proven, Cipher Block Chaining Message Authentication Code (CBC-MAC) method. Changing even one bit in a message produces a totally different result. The AES-CCMP encryption algorithm used in the 802.11i (WPA2) security protocol. It uses the AES block cipher, but restricts the key length to 128 bits. AES-CCMP incorporates two sophisticated cryptographic techniques (counter mode and CBC-MAC) and adapts them to Ethernet frames to provide a robust security protocol between the mobile client and the access point. QUESTION 7 Q H7 What is one reason why WPA encryption is preferred over WEP in this network? A. The WPA key values remain the same until the client configuration is changed. B. The values of WPA keys can change dynamically while the system is used. C. The access point and the client are manually configured with different WPA key values. D. A WPA key is longer and requires more special characters than the WEP key. E. None of the other alternatives apply Answer: B Section: Wireless Questions Explanation/Reference: Wireless Encryption Protocol (WEP) uses RC4 encryption and a static 64-bit key so it can be easily broken as only 40-bits are encrypted and 24 bits are clear-text IV(Initialization Vector). It was later upgraded to 128-bit, but the IV was still clear text meaning it took slightly longer (minutes) to break-in. WPA was introduced in 2003 as a replacement for WEP. WPA uses Temporal Key Integrity Protocol (TKIP) to automatically change the keys. TKIP still uses RC4; it just improves how it’s done.
  • 51. QUESTION 8 Q H8 In an effort to increase security within the wireless network, WPA is being utilized. Which two statements shown below best describe the wireless security standard that is defined by WPA? ( Choose two) A. It requires use of an open authentication method B. It specifies use of a static encryption key that must be changed frequently to enhance security C. It includes authentication by PSK D. It specifies the use of dynamic encryption keys that change each time a client establishes a connection E. It requires that all access points and wireless devices use the same encryption key F. WPA works only with Cisco access points Answer: CD Formatted Version By: S Qaisar Shah. Section: Wireless Questions Explanation/Reference: QUESTION 9 Q H9 You need to configure a new wireless access point for your network. What are three basic parameters to configure an AP? (Choose three) A. Authentication method B. RTS/CTS C. RF channel D. SSID Answer: ACD Section: Wireless Questions Explanation/Reference:
  • 52. QUESTION 10 Q H10 You have finished physically installing an access point on the ceiling at a newly opened office. At a minimum, which parameter must you configure on the access point in order to allow wireless clients to operate on it? A. SSID B. AES C. TKIP D. PSK E. None of the other alternatives apply Answer: A Section: Wireless Questions Explanation/Reference: QUESTION 11 Q H11
  • 53. What two facts can be determined from the diagram of the WLAN shown above? (Choose two) A. Access points in each cell must be configured to use channel 1 B. The network diagram represents an extended service set (ESS) C. The two APs should be configured to operate on different channels D. The area of overlap of the two cells represents a basic service set (BSS) E. The area of overlap must be less than 10% of the area to ensure connectivity F. There are too many hosts on this WLAN Answer: BC Section: Wireless Questions Explanation/Reference: QUESTION 12 Q H12 A single 802.11g access point has been configured and installed in the center of a square shaped office. A few wireless users are experiencing slow performance and drops while most users are operating at peak efficiency. From the list below, what are three likely causes of this problem? (Choose three) A. Null SSID
  • 54. B. Mismatched TKIP encryption C. Cordless phones D. Antenna type or direction E. Mismatched SSID F. Metal file cabinets Answer: CDF Section: Wireless Questions Explanation/Reference: 802.11g operates in 2.4 GHz ISM band. Some popular devices and technologies can interfere 802.11g signal: Newer cordless phones Bluetooth Microwaves Metal surface (can cause interference) Antenna (can reduce wireless signal) QUESTION 13 Q H13 Three access points have been installed and configured to cover a small remote office. What term defines the wireless topology? A. SSID B. BSS C. ESS D. IBSS E. ASS Answer: C Section: Wireless Questions Explanation/Reference: QUESTION 14 Q H14 Two workers have established wireless communication directly between their wireless laptops. What type of wireless topology has been created by these employees?
  • 55. A. ESS B. IBSS C. SSID D. BSS Answer: B Section: Wireless Questions Explanation/Reference: Independent Basic Service Set – IBSS (ad hoc mode) does not use an AP. It allows two devices to communicate directly. Basic Service Set (BSS) is a single wireless LAN created with an AP and all devices that associate with that AP. Extended Service Set (ESS) consists of multiple APs, allowing roaming in a larger coverage area. QUESTION 15 Q H15 802.1b is being utilized in the wireless network. Which spread spectrum technology does the 802.1b standard define for operation in this network? A. FHSS B. IR C. DSSS and FHSS D. DSSS E. IR, FHSS and DSSS Answer: D Section: Wireless Questions Explanation/Reference: Frequency Hopping Spread Spectrum (FHSS) uses all frequencies in the band, hopping to different ones. By using slightly different frequencies for consecutive transmissions, a device can hopefully avoid interference from other devices that use the same unlicensed band, succeeding at sending data at some frequencies. Direct Sequence Spread Spectrum (DSSS) followed as the next general class of encoding type for WLANs. Designed for use in the 2.4 GHz unlicensed band, DSSS uses one of several separate channels or frequencies. The original 802.11 WLAN standards used FHSS, but the current standards (802.11a, 802.11b, and 802.11g) do not. 802.1b uses DSSS while 802.1a & 802.1g use Orthogonal Frequency Division Multiplexing (OFDM).
  • 56. (Reference: ICND1 Official Exam Certification Guide) QUESTION 16 Q H16 Which IEEE standard is used to define Wi-Fi? A. IEEE 802.3 B. IEEE 802.5 C. IEEE 802.11h D. IEEE 802.11c E. IEEE 802.11 Answer: E Section: Wireless Questions Explanation/Reference: QUESTION 17 Q H17 An office is using an IEEE 802.11b wireless LAN. What is the maximum data rate specified for this WLAN? A. 11 mbps B. 100 mbps C. 54 mbps D. 10 mbps E. 1000 mbps Formatted Version By: S Qaisar Shah. F. 16 mbps Answer: A Section: Wireless Questions Explanation/Reference: The maximum data rate for popular WLAN standards are listed below: IEEE 802.11a: 54 Mbps in the 5.7 GHz ISM band IEEE 802.11b: 11 Mbps in the 2.4 GHz ISM band IEEE 802.11g: 54 Mbps in the 2.4 GHz ISM band