How will SwitchB handle the frame it just received?
A. It will forward the frame out all ports
B. It will forward the frame out FastEthernet0/4 only
C. It will drop the frame
D. It will record the source MAC address
E. It will forward the frame out FastEthernet0/10 only
Correct Answer: E
Explanation:
SwitchB will forward the frame out FastEthernet0/10 only. The MAC address table indicates that the switch has the destination MAC address in its table and the destination is located on switch port FastEthernet 0/10, therefore it will switch the frame to that interface.
It will not forward the frame out all ports. It will only do that when it receives a frame for which it knows no destination and then it will forward it out all ports except the one on which it arrived. For example if it were sending a frame to 00c0.5658.d26e, which is nowhere to be found in the table and the frame arrived on port FastEthernet0/10 it would send the frame to very port except FastEthernet0/10.
It will not forward the frame out FastEthernet0/4. The MAC address located on that port is 00c0.57ce.ce33, which means that is the port on which the frame arrived.
It will not drop the frame. It will not drop the frame when it has the destination in its MAC table.
It will record the source MAC address. That address is already present in the table.
Which of the following features is used with the ip nat inside command to translate multiple devices in the internal network to the single address in the IP address pool?
A. static
B. override
C. overload
D. dynamic
Correct Answer: C
Explanation:
The overload keyword, when specified with the ip nat inside command, translates multiple devices in the internal network to a single address in the IP address pool. For example:
ip nat pool test 172.28.15.1 172.28.15.1 prefix 24
In this example, the NAT pool named “test” only has a range of one address. Another variation of this command is as follows:
ip nat inside source list 3 interface serial 0 overload
This command configures NAT to overload on the address assigned to the serial 0 interface.
When this variation is used, the command uses a list named 3 to determine the addresses in the pool
With static NAT, translation mappings are created statically and are placed in the translation tables regardless of whether there is traffic flowing.
With dynamic NAT, the translation mappings table is populated as the required traffic flows through NAT-enabled devices.
Override is not a valid NAT option. There is no such option.
Which feature enables a host to obtain an IP address from a DHCP server on another subnet?
A. DHCP relay agent
B. DHCP BOOTP agent
C. DHCP relay protocol
D. DHCP BOOTP relay
Correct Answer: A
Explanation:
A Dynamic Host Configuration Protocol (DHCP) relay agent enables hosts to obtain IP addresses from a DHCP server on another subnet. Hosts use DHCPDISCOVER broadcast messages to locate the DHCP server because they don’t know the location of the DHCP server. Because routers are designed to filter broadcasts, the DHCPDISCOVER packet would be dropped unless the router is configured to forward such packets. Enabling a DHCP relay agent on a Cisco router allows it to receive certain types of broadcasts and forward them to special helper addresses.
The following sequence describes an IP address relay process:
– The DHCP client broadcasts a DHCP request on the network.
– The DHCP request is intercepted by the DHCP relay agent, which inserts the relay agent information option (option 82) in the packet.
– The DHCP relay agent forwards the DHCP packet to the DHCP server.
– The DHCP server uses the suboptions of option 82 in the packet, assigns IP addresses and other configuration parameters, and forwards the packet to the client.
– The relay agent again intercepts the packet and strips off the option 82 information before sending it to the client.
The ip helper-address interface configuration command enables a DHCP relay agent on a Cisco router.
DHCP is an enhancement over Bootstrap Protocol (BOOTP) and is used to automate the distribution of IP address to clients from a central server. The BOOTP protocol was also used distribute IP addresses, but was inflexible to changes in the network. DHCP offers three advantages that also address the inflexibility of the BOOTP protocol:
– Automatic allocation of permanent IP addresses
– Automatic allocation of time bound (leased) IP addresses
– Ability to assign static IP address or define a pool of reserved IP address
When a DHCP relay is unnecessary, the following steps describe the address allocation process:
– The client device broadcasts a DHCPDISCOVER broadcast message to locate a DHCP server.
– The DHCP server replies with a DHCPOFFER unicast message containing configuration parameters, such as an IP address, a MAC address, a domain name, and a lease for the IP address for the client device.
– The client sends back a DHCPREQUEST broadcast, which is a formal request for the offered IP address to the DHCP server.
– The DHCP server replies back to client device with DHCPACK unicast message, acknowledging the allocation of the IP address to this client device.
While DHCP is very useful in reducing the administrative burden of issuing IP configurations in a large network, Cisco best practices call for using static IP addressing in a small (6 or fewer hosts) network.
All other options are invalid devices or features.
In the given exhibit, which combination shows the components of a bridge ID used for Spanning Tree Protocol (STP)?
A. 1
B. 2
C. 3
D. 4
Correct Answer: C
Explanation:
The bridge ID, also known as the switch ID, is used to elect the root bridge in a redundant network topology. The bridge ID has two components:
– Switch’s priority number: Configured as 32768 on Cisco switches by default
– Switch’s Media Access Control (MAC) address: The burnt-in hardware address of the network interface card (NIC)
The switch with the lowest bridge ID is elected as the root bridge. If the same priority number is configured on two or more switches in the network, the switch with the lowest MAC address will become the root.
Bridge Protocol Data Units (BPDUs) communicate the details of the switch with the lowest bridge ID in the network. The election process for the root bridge takes place every time there is a topology change in the network. A topology change may occur due to the failure of a root bridge or the addition of a new switch in the network. The root bridge originates BPDUs every two seconds, which are propagated by other switches throughout the network. BPDUs are used as keepalives between switches. If a switch stops receiving BPDUs from a neighboring switch for ten intervals (20 seconds), it will assume a designated role for the network segment.
The combinations of the remaining options are incorrect because Virtual LAN (VLAN) numbers and serial numbers are not components of a bridge ID. Objective:
Which of the following commands configures an SNMP host to authenticate a user by username and send clear text notifications, the receipt of which will be acknowledged by the receiver?
A. Router(config)# snmp-server host 192.168.5.5 informs version 3 noauth public
B. Router(config)# snmp-server host 192.168.5.5 traps version 3 auth public
C. Router(config)# snmp-server host 192.168.5.5 informs version 2c public
D. Router(config)# snmp-server host 192.168.5.5 informs version 3 authpriv public
Correct Answer: A
Explanation:
The command snmp-server host 192.168.5.5 informs version 3 noauth CISCO will configure the host to authenticate a user by username and send clear text notifications. The receiver will then acknowledge receipt of the notification. The keyword informs indicates that an inform message type will be used. Unlike a trap, an inform message is acknowledged by the receiver.
The version 3 keyword indicates that version 3 is in use, which is the ONLY version that supports authentication and encryption. Finally, the noauth keyword specifies authentication by username only and no encryption.
The command snmp-server host 192.168.5.5 traps version 3 auth public configures the host to send traps rather than informs.
The command snmp-server host 192.168.5.5 informs version 2c public specifies version 2c, which only support community string-based authentication.
The command snmp-server host 192.168.5.5 informs version 3 authpriv public specifies the keyword authpriv, which indicates encryption will be used and authentication based on HMAC-MD5 or HMAC-SHA algorithms.
A newly implemented IP-based video conferencing application is causing the network to slow down. Which OSI layer needs to be addressed to resolve the problem?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
G. Layer 7
Correct Answer: A
Explanation:
You need to address Open System Interconnect (OSI) Layer 1, the Physical layer, to resolve the problem. IP-based video conferencing applications are bandwidth- intensive and may cause the network to slow down unless there is enough bandwidth to ensure proper network operation. To resolve bandwidth problems, you may need to switch to a higher capacity network backbone, which may require a change of cabling or media types, such as fiber optics. Cabling and network media types are defined at OSI Layer 1.
The seven layers of the OSI model are as follows, in descending order from Layer 7 to Layer 1:
– Application: Interacts directly with the application. It provides application services, such as e-mail and File Transfer Protocol (FTP).
– Presentation: Enables coding and conversion functions for application layer data. The Presentation layer converts data into a format that is acceptable by the application layer. The formatting and encryption of data is done at this layer.
– Session: Creates, manages, and terminates sessions between communicating nodes. The session layer handles the service requests and responses that take place between different hosts.
– Transport: Delivers data sequentially and without errors. This layer manages data transmission between devices, a process known as flow control. The Transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).
– Network: Defines the network address or the Internet Protocol (IP) address, which is then used by the routers to forward the packets.
– Data Link: Ensures the reliable delivery of data to the physical address of the destination.
– Physical layer: This layer includes the physical equipment involved in the data transfer, such as the cables and switches. It also include fiber optic, wireless, and Ethernet.
Which of the following commands could you use to verify the type of serial cable you are connected to (DCE or DTE)?
A. show interfaces
B. show controllers
C. show ip interface
D. show interface dce
E. show interface switchport
Correct Answer: B
Explanation:
The show controllers command provides hardware-related information used to troubleshoot and diagnose issues with Cisco router interfaces. The output of the command is as follows:
routerA# show controllers serial 0
HD unit 1, idb = 0x1C44E8, driver structure at 0x1CBAC8 buffer size 1524 HD unit 1
V.35 DTE cable, clock rate 64000
The show interfaces, show ip interface, and show interface switchport commands do not display any hardware-related information, such as connected cable types.
The show interface dce command is incorrect because this is not a valid Cisco IOS command.
You are the network administrator for your company. You have been assigned the task of configuring an appropriate IP addressing scheme in the network.
Assuming that the network address is 192.16.100.0/28, what will be the number of hosts per network in this scenario?
A. 2
B. 6
C. 14
D. 30
Correct Answer: C
Explanation:
In this scenario, there will be 14 hosts per network. The formula for calculating the number of hosts on a subnet is 2^n – 2, where n is the number of host bits in the summary mask. The n can be calculated by subtracting host bits from the total number of bits in a subnet mask (32). In this case, n would be 32 – 28 = 4.
The 192.16.100.0/28 network address would not have 30 hosts per network. The 192.16.100.0/27 network address would actually yield 30 hosts per network. In this case, n would be 32 – 27 = 5, so the number of host bits in the subnet mask would be 32 – 2, which is equal to 30.
The 192.16.100.0/28 network address would not have 6 hosts per network. The 192.16.100.0/29 network address would yield 6 hosts per network. In this case, n would be 32 – 29 = 3, so the number of host bits in the subnet mask would be 8 – 2, which is equal to 6.
The 192.16.100.0/28 network address would not have 2 hosts per network. The 192.16.100.0/30 network address would yield 2 hosts per network. In this case, n would be 32 – 30 = 2, so the number of host bits in the subnet mask would be 4 – 2, which is equal to 2.
You manage the EIGRP subnet in your organization. You have enabled EIGRP for IPv6 on all the routers in the EIGRP AS 260 using the following commands on all the routers:
During verification, you discover that EIGRP for IPv6 is not running on the routers. Which of the following should be done to fix the issue?
A. The ipv6 address command should be executed in interface configuration mode.
B. The ipv6 address command should be executed in router configuration mode.
C. The eigrp router-id command should be executed in interface configuration mode.
D. The eigrp router-id command should be executed in router configuration mode.
Correct Answer: D
Explanation:
The eigrp router-id command should be executed in router configuration mode to fix the issue. This command specifies a fixed router IPv4 address to the router. If this command is missing or incorrectly configured on the router, EIGRP for IPv6 will not run properly.
Another command that you should perform so that EIGRP for IPv6 runs on the routers is the no shutdown command. You should execute this command in interface configuration mode. The no shutdown command is necessary because all the interfaces with EIGRP for IPv6 enabled on them are in a shutdown state by default.
The two options stating that the ipv6 address command should be executed on the routers are incorrect. EIGRP for IPv6 can be configured on router interfaces without explicitly specifying a global unicast IPv6 address. If you specify the ipv6 enable command, as in this scenario, then the IPv6 address command is not required.
The option stating that the eigrp router-id command should be executed in interface configuration mode is incorrect. This command should be executed in router configuration mode instead of interface or global configuration modes.
You have multiple departments sharing a common network. You are concerned about network traffic from one department reaching another department. What would be a solution for isolating the departments? (Choose all that apply.)
A. Configure separate VLANs for each department.
B. Assign a unique VTP domain for each department.
C. Put each department in a separate collision domain.
D. Configure trunk links between departmental switches.
E. Configure separate subnets for each department
Correct Answer: A, E
Explanation:
You could either configure separate VLANs for each department or configure separate subnets for each department. Either approach has the effect of restricting each department’s traffic to its local subnet or VLAN, unless you configure and allow inter-VLAN routing.
VLANs logically divide a switched network into multiple independent broadcast domains. Broadcast traffic within one VLAN will never be sent to hosts in other VLANs. In this respect, VLANs operate exactly as subnets do. The only way for hosts in different VLANs to communicate is through a router or multilayer switch configured to perform inter-VLAN routing between the VLANs.
The VLAN Trunking Protocol (VTP) is used to synchronize VLAN databases across multiple switches, and is not a method for isolating departmental traffic.
Collision domains cannot be used to isolate traffic between departments. Multiple departments cannot share a collision domain when using switches. Every port on a switch is a separate collision domain, which allows the switch to forward more than one frame at a time. This also reduces collisions, since each host is therefore in a separate collision domain. The switch processes data based only on MAC addresses, and has no knowledge of which host is in which IP subnet or department.
Trunk links are used to connect switches to other switches and to routers for the purpose of carrying traffic from multiple VLANs, and are not a method of isolating traffic between different departments.