1.
What is the adminitrative distance of EBGP route?
Correct Answer
C. 20
Explanation
The administrative distance of a route is a measure of its trustworthiness or reliability. A lower administrative distance indicates a more preferred route. In this case, the correct answer is 20, which means that EBGP (External Border Gateway Protocol) routes have an administrative distance of 20. This suggests that EBGP routes are considered very reliable and trustworthy, making them a preferred choice for routing decisions.
2.
What methods can be used to overcome IBGP full mesh requirement?(Choose Two)
Correct Answer(s)
A. Route Reflector
B. Conferedation
Explanation
Route reflectors and confederations are two methods that can be used to overcome the IBGP full mesh requirement.
1. Route reflectors: In a full mesh IBGP network, every router needs to establish a direct BGP session with every other router. This can become impractical and difficult to manage in large networks. Route reflectors address this issue by allowing routers to establish a BGP session with a selected set of route reflectors instead of every router in the network. The route reflectors then reflect the BGP updates to other routers, reducing the number of required BGP sessions.
2. Confederations: Similar to route reflectors, confederations also aim to reduce the number of required BGP sessions in large networks. In a confederation, the network is divided into smaller sub-autonomous systems, and each sub-autonomous system has its own internal BGP (IBGP) mesh. The sub-autonomous systems then establish external BGP (EBGP) sessions with routers in other sub-autonomous systems, reducing the overall number of required IBGP sessions.
3.
When redistributing rip into OSPF what routes get redistributed into OSPF(choose all that apply)
Correct Answer(s)
A. Rip routes
B. Directly connected interfaces running rip
Explanation
When redistributing RIP into OSPF, the routes that get redistributed into OSPF are RIP routes and directly connected interfaces running RIP. RIP routes are the routes learned through the RIP routing protocol, while directly connected interfaces running RIP are the interfaces that are directly connected to the router and are running the RIP protocol. The other options, static routes, floating routes, and null routes, are not included in the redistribution process.
4.
What type of LSA's are blocked in the totally stubby area? (choose all that apply)
Correct Answer(s)
C. LSA3
E. LSA5
Explanation
In a totally stubby area, only LSA1 and LSA2 are allowed to propagate, while LSA3, LSA4, and LSA5 are blocked. LSA3 is a summary LSA generated by an ABR to advertise routes from outside the autonomous system (AS). LSA5 is an external LSA generated by an ASBR to advertise routes from other AS. Since a totally stubby area is designed to reduce the size of the routing table and limit external routes, LSA3 and LSA5 are blocked to prevent unnecessary routing information from entering the area.
5.
How can summarization be done in OSPF? (choose all that apply)
Correct Answer(s)
A. Area range
C. Summary address
Explanation
Summarization in OSPF can be achieved through the use of "area range" and "summary address". The "area range" command allows the aggregation of multiple subnets into a single summary route within an OSPF area. This helps in reducing the size of the routing table and improving network efficiency. Similarly, the "summary address" command can be used to summarize routes at the boundary between OSPF areas, allowing for efficient routing and reducing the number of entries in the routing table.
6.
In frame relay what OSPF network type requires a neighbor statement?(choose all that apply)
Correct Answer(s)
C. Broadcast
D. Non-broadcast
Explanation
The OSPF network types that require a neighbor statement in frame relay are broadcast and non-broadcast. In a broadcast network, OSPF routers can dynamically discover their neighbors without explicitly configuring them. However, in a non-broadcast network, such as frame relay, OSPF routers cannot automatically discover their neighbors. Therefore, a neighbor statement must be configured to establish adjacency between OSPF routers in both broadcast and non-broadcast networks.
7.
MQC is a combination of which queuing mechanisms?(choose 2)
Correct Answer(s)
A. CBWFQ
B. PQ
Explanation
MQC (Modular QoS CLI) is a feature in Cisco IOS that allows for the configuration of quality of service (QoS) parameters on a network device. CBWFQ (Class-Based Weighted Fair Queuing) and PQ (Priority Queuing) are both queuing mechanisms that can be used with MQC. CBWFQ allows for the allocation of bandwidth to different traffic classes based on defined policies, while PQ gives priority to certain traffic classes over others. Therefore, CBWFQ and PQ are the two queuing mechanisms that can be combined with MQC. The other options, Custom Queue, FIFO, and In/out, are not specific queuing mechanisms and are not compatible with MQC.
8.
In MCQ how much bandwidth % can you reserve on an interface?
Correct Answer
C. 75
Explanation
The correct answer is 75. In networking, bandwidth refers to the amount of data that can be transmitted over a network connection in a given time. Reserving bandwidth on an interface allows for prioritization of certain types of traffic, ensuring that they have sufficient bandwidth to function properly. In this case, the correct answer suggests that you can reserve up to 75% of the available bandwidth on an interface.
9.
EIGRP Query can be stopped from propagating using?(choose 2)
Correct Answer(s)
A. Stub area
C. Summarization
Explanation
EIGRP queries can be stopped from propagating using two methods: stub area and summarization. In a stub area, routers do not advertise external routes, which prevents EIGRP queries from being sent outside the area. Summarization involves aggregating multiple routes into a single route, reducing the number of queries that need to be sent. Passive interface, shutdown, and different domain are not valid methods for stopping EIGRP queries from propagating.
10.
Which protocols have a default metric of infinity when other protocols are redistributed into them? (choose 2)
Correct Answer(s)
C. RIP
E. EIGRP
Explanation
RIP and EIGRP have a default metric of infinity when other protocols are redistributed into them. RIP (Routing Information Protocol) uses a hop count as its metric, and a hop count of 16 is considered infinity. EIGRP (Enhanced Interior Gateway Routing Protocol) uses a metric called "feasible distance," and a feasible distance of 4294967295 is considered infinity. Therefore, when other protocols are redistributed into RIP or EIGRP, their metrics are set to infinity.
11.
What are RFC 1918 addresses?
Correct Answer
A. Private address space
Explanation
RFC 1918 addresses refer to a range of IP addresses that are reserved for private use within a network. These addresses are not routable on the internet and are commonly used for internal networks, such as those found in homes, offices, or organizations. They are designed to provide a limited number of unique IP addresses that can be used within a private network without conflicting with public IP addresses. This helps to ensure the security and integrity of private networks by keeping them separate from the public internet.
12.
What command must be typed in OSPF to make a loopback appear with its correct mask?
Correct Answer
A. Ip ospf network point-to-point
Explanation
The correct answer is "ip ospf network point-to-point". This command must be typed in OSPF to make a loopback appear with its correct mask. This command configures the OSPF network type as point-to-point, which is necessary for loopback interfaces to function properly in OSPF.
13.
In BGP when filtering inbound What is the order of filtering?
Correct Answer
A. Route-map, filter-list,distribute-list
Explanation
The correct order of filtering in BGP when filtering inbound is route-map, filter-list, distribute-list. This means that the route-map is applied first to filter the incoming routes, followed by the filter-list and then the distribute-list.
14.
What does regular expression _40_ in BGP AS-path access-list mean?
Correct Answer
A. Passing through AS 40
Explanation
The regular expression _40_ in BGP AS-path access-list means that the route is passing through AS 40. This means that the AS-path of the route contains AS 40 as one of the intermediate ASes that the route traverses.
15.
(*.G) is the characteristic of which Mutlticast Mode?
Correct Answer
D. Sparse
Explanation
The correct answer is sparse. Sparse mode is a multicast mode that is used when there are only a few receivers interested in receiving the multicast traffic. In this mode, multicast routers do not forward multicast traffic unless explicitly requested by a receiver. This helps to conserve network bandwidth by only sending traffic to those receivers that have explicitly requested it.
16.
What are the extended VLANs?
Correct Answer
A. Vlans greater than 1005
Explanation
Extended VLANs refer to VLANs that have a VLAN ID greater than 1005. In traditional VLAN implementations, VLAN IDs range from 1 to 1005, with VLANs 1 and 1002-1005 being reserved for specific purposes. However, in some newer implementations, VLAN IDs can exceed 1005, allowing for a larger number of VLANs to be created and used in the network.
17.
Links with speeds lower than what value require fragmentation and interleaving?
Correct Answer
D. 768K
Explanation
Links with speeds lower than 768K require fragmentation and interleaving. This means that if the link speed is 768K or higher, fragmentation and interleaving are not necessary.
18.
What is the significance of the same cluster-id in BGP cluster?
Correct Answer
A. It prevents routes coming from one route reflector from entering the routing table of another RR in the same cluster
Explanation
The significance of having the same cluster-id in BGP cluster is that it prevents routes coming from one route reflector from entering the routing table of another route reflector in the same cluster. This helps to avoid routing loops and ensures that the routes are properly distributed within the cluster without redundancy.
19.
In a RR senario a non client will not advertise to which bgp peer?
Correct Answer
C. Non-client
Explanation
In a route-reflector (RR) scenario, a non-client will not advertise to the route-reflector peer. This is because a non-client does not have the capability to reflect routes to other peers. Only RR clients, which are configured with the "route-reflector-client" command, can advertise routes to the route-reflector peer. Therefore, the non-client will not advertise to the route-reflector peer.
20.
Which protocols are affected by the rule of split horizon? choose 2
Correct Answer(s)
C. Rip
E. Eigrp
Explanation
The protocols that are affected by the rule of split horizon are RIP and EIGRP. Split horizon is a technique used in routing protocols to prevent routing loops by not advertising routes back out of the same interface they were learned from. In the case of RIP and EIGRP, both protocols implement split horizon to avoid routing loops and ensure efficient routing within a network.
21.
How can you contain a smurf attack?
Correct Answer
B. Car
Explanation
A smurf attack is a type of Distributed Denial of Service (DDoS) attack where the attacker floods a target network with a large volume of ICMP echo request packets, using spoofed IP addresses of the victim. These packets are then broadcasted to a network that amplifies the attack, overwhelming the victim's network and causing it to become inaccessible. To contain a smurf attack, implementing Car (Committed Access Rate) can be effective. Car limits the bandwidth that can be used for certain types of traffic, including ICMP, preventing the attacker from flooding the network with excessive ICMP packets and reducing the impact of the attack.
22.
How can you contain spoofing attacks?
Correct Answer
A. Urpf
Explanation
Urpf (Unicast Reverse Path Forwarding) is a technique used to prevent spoofing attacks. It checks the source IP address of incoming packets against the routing table to ensure that the packet is arriving on the expected interface. If the source IP address does not match the expected interface, the packet is dropped. Urpf helps in verifying the authenticity of the source IP address and prevents attackers from impersonating other systems by spoofing their IP addresses.
23.
How does eigrp do unequal load balancing?
Correct Answer
C. Using variance command
Explanation
EIGRP can achieve unequal load balancing by using the variance command. This command allows the router to consider paths with a metric that is higher than the best path. By setting a variance value, EIGRP will include paths with a metric that is up to that value times higher than the best path. This enables the router to distribute traffic across multiple paths, even if their metrics are not equal. This way, EIGRP can achieve unequal load balancing and optimize network performance.
24.
Which authentication type is supported by BGP?
Correct Answer
E. Md5
Explanation
BGP supports the md5 authentication type. This means that BGP routers can use the md5 algorithm to authenticate the BGP messages exchanged between them. MD5 authentication helps ensure that the BGP messages are not tampered with during transit and that they are coming from trusted sources.
25.
What are E1 routes in OSPF?
Correct Answer
A. More specific cost
Explanation
E1 routes in OSPF refer to external routes with a more specific cost. This means that these routes have a higher level of specificity compared to other routes. In OSPF, routes with higher specificity are preferred over routes with lower specificity. Therefore, when multiple routes are available, OSPF will choose the route with the more specific cost as the preferred route.
26.
What IGMP version supports IGMP leave messages?
Correct Answer
C. V2
Explanation
IGMP (Internet Group Management Protocol) is a communication protocol used by hosts and adjacent routers on an Internet Protocol (IP) network to establish multicast group memberships. IGMP version 2 (V2) supports IGMP leave messages. These messages are sent by a host to inform the router that it no longer wants to receive multicast traffic for a specific group. Therefore, V2 is the correct answer as it specifically supports the IGMP leave messages.
27.
What flag does spare mode use for SPT switch over?
Correct Answer
A. T
Explanation
Spare mode uses the flag "T" for SPT switch over.
28.
In BGP if the next hop is not reachable, what happens to the route?
Correct Answer
A. It is not installed in the routing table and in BGP table it shows up as inaccessable
Explanation
If the next hop is not reachable in BGP, the route is not installed in the routing table and in the BGP table it shows up as inaccessible.
29.
What is the admin distance of external EIGRP routes?
Correct Answer
E. 170
Explanation
The admin distance of external EIGRP routes is 170. Admin distance is a measure of the trustworthiness of a routing protocol, indicating the preference of one routing source over another. In EIGRP, external routes are those learned from other routing protocols. The admin distance of 170 for external EIGRP routes means that these routes are considered less trustworthy compared to internal EIGRP routes, which have an admin distance of 90.
30.
In BGP if the AS filter is _40_ what does it mean?
Correct Answer
C. Passing from AS 40
Explanation
The correct answer is "Passing from AS 40." In BGP, if the AS filter is set to 40, it means that the route is being passed through AS 40. This indicates that the route is being transmitted or forwarded through AS 40 to reach its destination.
31.
(*,G) is the characteristic of which multicast protocol?
Correct Answer
E. Sparse mode
Explanation
The characteristic of (*,G) is associated with the multicast protocol known as "sparse mode". In sparse mode, multicast traffic is only forwarded to specific groups that have requested it, rather than being flooded to all devices on the network. This helps to conserve network bandwidth and resources by only sending traffic where it is needed.
32.
What is the port number for tftp?
Correct Answer
E. 69
Explanation
The correct answer is 69. TFTP (Trivial File Transfer Protocol) is a simple file transfer protocol that operates on UDP port 69. It is commonly used for transferring files between network devices, such as routers and switches, in a network. The other options (87, 80, 23, and 53) are incorrect port numbers and are not associated with TFTP.
33.
What is the name given to the Firewall built into the Cisco IOS?
Correct Answer
C. CBAC
Explanation
CBAC stands for Context-Based Access Control. It is a feature built into the Cisco IOS firewall that provides advanced security capabilities. CBAC allows the firewall to inspect and control traffic based on the context of the connection, including the application layer protocols and state information. It can dynamically open and close ports, keeping track of the state of the connection, and provides protection against various network attacks. CBAC is an important component of network security in Cisco devices and helps to prevent unauthorized access and protect against potential threats.
34.
How can you disable logging on the console of a router?
Correct Answer
D. No logging console
Explanation
To disable logging on the console of a router, the command "no logging console" can be used. This command turns off the logging feature specifically for the console interface. By using this command, log messages will no longer be displayed on the console, providing a more streamlined and less cluttered console interface.
35.
How are required for SSH on a router? choose 3
Correct Answer(s)
A. Hostname
B. Domain-name
E. Generate RSA Public/private Key
Explanation
The question is asking for three requirements for SSH on a router. The first requirement is the hostname, which is the unique name given to the router. The second requirement is the domain-name, which is the name of the domain to which the router belongs. The third requirement is to generate an RSA public/private key, which is used for secure authentication and encryption in SSH. These three requirements are necessary for enabling and configuring SSH on a router.
36.
How can you only enable SSH connection on a Cisco Route for management?
Correct Answer
C. Transport input ssh
Explanation
The correct answer is "transport input ssh." This command allows only SSH connections for management on a Cisco router. By specifying "ssh" as the only transport input method, other methods such as telnet or HTTP are disabled, ensuring that only SSH connections are allowed for remote management of the router.