1.
Which three statements about link-state routing are true? (Choose three)
Correct Answer(s)
D. Updates are sent to a multicast address by default.
E. Routes are updated when a change in topology occurs.
F. OSPF is a link-state protocol.
Explanation
Link-state routing protocols, such as OSPF, use multicast addresses to send updates by default. This allows the updates to be efficiently distributed to multiple routers. Additionally, link-state protocols update the routing table when there is a change in the network's topology. This ensures that routers have the most up-to-date information about the network's connectivity. Finally, OSPF is indeed a link-state routing protocol, making the statement true.
2.
Which three characteristics are representative of a link-state routing protocol? (Choose three)
Correct Answer(s)
A. provides common view of entire topology
C. Calculates shortest path
D. Utilizes event-triggered updates
Explanation
A link-state routing protocol provides a common view of the entire network topology by exchanging routing tables with neighboring routers. It calculates the shortest path to each destination using algorithms such as Dijkstra's algorithm. It also utilizes event-triggered updates, meaning that updates are only sent when there is a change in the network, rather than sending frequent periodic updates. This helps to reduce network traffic and improve efficiency.
3.
What are two drawbacks of implementing a link-state routing protocol? (Choose two)
Correct Answer(s)
C. The requirement for a hierarchical IP addressing scheme for optimal functionality
D. The high demand on router resources to run the link-state routing algorithm
Explanation
Two drawbacks of implementing a link-state routing protocol are the requirement for a hierarchical IP addressing scheme for optimal functionality and the high demand on router resources to run the link-state routing algorithm. A hierarchical IP addressing scheme is necessary to efficiently organize and manage the large number of network addresses in a link-state routing protocol. Additionally, the link-state routing algorithm requires significant computational resources from routers, which can strain their performance and potentially lead to slower network operation.
4.
Refer to the exhibit. Router edge-1 is unable to establish OSPF neighbor adjacency with router ISP-1. Which two configuration changes can you make on edge-1 to allow the two routers to establish adjacency? (Choose two)
Correct Answer(s)
D. Reduce the MTU on edge-1 to 1500.
E. Configure the ip ospf mtu-ignore command on the edge-1 Gi0/0 interface.
Explanation
To establish OSPF neighbor adjacency, the routers need to have matching MTU sizes. In this case, reducing the MTU on edge-1 to 1500 will ensure that it matches with the MTU size of router ISP-1. Additionally, configuring the "ip ospf mtu-ignore" command on the edge-1 Gi0/0 interface will allow OSPF to ignore any MTU mismatches and establish adjacency regardless. These two configuration changes will enable the two routers to establish OSPF neighbor adjacency.
5.
A network administrator is troubleshooting the OSPF configuration of routers R1 and R2. The routers cannot establish an adjacency relationship on their common Ethernet link. The graphic shows the output of the show ip ospf interface e0 command for routers R1 and R2. Based on the information in the graphic, what is the cause of this problem?
Correct Answer
D. The hello and dead timers are not configured properly.
Explanation
The output of the "show ip ospf interface e0" command reveals that the hello and dead timers on both R1 and R2 are mismatched. The hello timer on R1 is set to 10 seconds, while the dead timer is set to 40 seconds. On the other hand, the hello timer on R2 is set to 5 seconds, while the dead timer is set to 20 seconds. This inconsistency in the timers prevents the routers from establishing an adjacency relationship on their common Ethernet link. To resolve this issue, the hello and dead timers should be configured to match on both routers.
6.
What routing protocol use first-hand information?
Correct Answer
A. Link-state
Explanation
Link-state routing protocols use first-hand information to determine the best path for routing. These protocols build and maintain a detailed map of the entire network by exchanging information about network topology with neighboring routers. This allows them to have a comprehensive view of the network and make informed routing decisions based on up-to-date information. Distance-vector and path-vector routing protocols, on the other hand, use information about the distance or path to a destination that is learned from neighboring routers, rather than having a complete knowledge of the network topology. Therefore, link-state is the correct answer as it directly uses first-hand information.
7.
Refer to the exhibit. If R1 sends traffic to 192.168.10.45 the traffic is sent through which interface?
Correct Answer
A. FastEthernet0/1
Explanation
If R1 sends traffic to 192.168.10.45, the traffic is sent through the FastEthernet0/1 interface.
8.
R1 is unable to establish an OSPF neighbor relationship with R3. What are possible reasons for this problem? (Choose two)
Correct Answer(s)
D. The hello and dead interval timers are not set to the same values on R1 and R3.
F. R1 and R3 are configured in different areas.
Explanation
One possible reason for R1 being unable to establish an OSPF neighbor relationship with R3 is that the hello and dead interval timers are not set to the same values on R1 and R3. This means that the routers are not sending and receiving OSPF hello packets at the same frequency, which is required for establishing and maintaining neighbor adjacency. Another possible reason is that R1 and R3 are configured in different areas. OSPF neighbors must be in the same area in order to form a neighbor relationship.
9.
Refer to the exhibit. You have discovered that computers on the 192.168.10.0/24 network can ping their default gateway, but they cannot connect to any resources on a remote network. Which reason for the problem is most likely true?
Correct Answer
A. The 192.168.12.0/24 network is missing from OSPF.
Explanation
The most likely reason for the problem is that the 192.168.12.0/24 network is missing from OSPF. This means that the routers in the OSPF network are not aware of the 192.168.12.0/24 network and therefore cannot route traffic to it. As a result, computers on the 192.168.10.0/24 network can ping their default gateway but cannot connect to any resources on the remote network.
10.
Which parameter or parameters are used to calculate OSPF cost in Cisco routers?
Correct Answer
B. Bandwidth
Explanation
The OSPF cost in Cisco routers is calculated based on the bandwidth parameter. This parameter represents the speed of the link, and a lower bandwidth value indicates a faster link. OSPF uses this cost value to determine the best path for routing packets. The other parameters mentioned, such as delay, MTU, reliability, and load, are not directly used in calculating the OSPF cost in Cisco routers.
11.
What routing protocol use first-hand information from peers?
Correct Answer
A. Link state
Explanation
Link state routing protocols use first-hand information from peers. These protocols exchange information about the network's topology with their neighboring routers, allowing each router to have a complete understanding of the network. This information includes the state of links, such as whether they are up or down, and the cost associated with each link. By using this first-hand information, link state protocols can make more informed routing decisions and calculate the shortest path to a destination.
12.
Which prefix does OSPFv3 use when multiple IPv6 address are configured on a single interface?
Correct Answer
A. All prefix on the interface
Explanation
OSPFv3 uses all the prefixes configured on a single interface. This means that if there are multiple IPv6 addresses configured on the interface, OSPFv3 will use all of them as prefixes for routing. This allows OSPFv3 to advertise all the available IPv6 addresses on the interface to other routers in the network.
13.
After you apply the given configuration to R1, you notice that it failed to enable OSPF. Which action can you take to correct the problem?
Correct Answer
B. Enable IPv6 unicast routing on R1
Explanation
Enabling IPv6 unicast routing on R1 can correct the problem of OSPF not being enabled. By enabling IPv6 unicast routing, R1 will be able to route IPv6 traffic, including OSPF updates. This will allow OSPF to function properly and be enabled on R1.
14.
Refer to the exhibit. If R1 receives a packet destined to 172.16.1.1, to which IP address does it send the packet?
Correct Answer
A. 192.168.14.4
Explanation
R1 will send the packet destined to 172.16.1.1 to the IP address 192.168.14.4.
15.
If two OSPF neighbors have formed complete adjacency and are exchanging link-state advertisements, which state have they reached?
Correct Answer
C. FULL
Explanation
When two OSPF neighbors have formed a complete adjacency and are exchanging link-state advertisements, they have reached the FULL state. In this state, the routers have exchanged their entire link-state databases and are fully synchronized. They have established a reliable and consistent view of the network, allowing them to calculate the shortest path to all destinations using the Dijkstra algorithm.
16.
Which two steps must you perform on each device that is configured for IPv4 routing before you implement OSPFv3? (Choose two)
Correct Answer(s)
C. Configure a router ID
E. Enable IPv6 unicast routing
Explanation
Before implementing OSPFv3 on a device configured for IPv4 routing, two steps must be performed. First, a router ID needs to be configured. The router ID is a unique identifier for the router within the OSPFv3 domain. Second, IPv6 unicast routing needs to be enabled. This allows the device to route IPv6 packets between networks. The other options, such as configuring an autonomous system number or enabling IPv6 on an interface, are not necessary steps for implementing OSPFv3.
17.
Which command must you enter to enable OSPFv2 in an IPv4 network?
Correct Answer
D. Router ospf process-id
Explanation
To enable OSPFv2 in an IPv4 network, you must enter the command "router ospf process-id". This command is used to enable OSPF (Open Shortest Path First) routing protocol on a router and specifies the process ID for OSPF. The process ID is a unique identifier for the OSPF process running on the router. By entering this command with the appropriate process ID, OSPFv2 will be enabled and the router will start participating in OSPF routing.
18.
Why do large OSPF networks use a hierarchical design? (Choose three)
Correct Answer(s)
A. To confine network instability to single areas of the network
C. To speed up convergence
F. To reduce routing overhead
Explanation
Large OSPF networks use a hierarchical design to confine network instability to single areas of the network. By dividing the network into smaller areas, any instability or issues that occur in one area will not affect the entire network, improving overall network stability. Additionally, a hierarchical design helps to speed up convergence by reducing the amount of routing information that needs to be processed and exchanged between routers. This reduces the time it takes for routers to reach a consistent and updated view of the network. Finally, a hierarchical design helps to reduce routing overhead by limiting the amount of routing information that needs to be exchanged between areas, improving network efficiency.
19.
After you apply the give configurations to R1 and R2 you notice that OSPFv3 fails to start. Which reason for the problem is most likely true?
Correct Answer
A. The area numbers on R1 and R2 are mismatched
Explanation
The most likely reason for the OSPFv3 failure is that the area numbers on R1 and R2 are mismatched. OSPFv3 requires that routers within the same OSPFv3 domain have the same area numbers configured in order to establish adjacency and exchange routing information. If the area numbers on R1 and R2 are different, OSPFv3 will not be able to form neighbor relationships and the protocol will fail to start.
20.
When running OSPF, what would cause router A not to form an adjacency with router B?
Correct Answer
B. The values of the dead timers on the routers are different.
Explanation
The values of the dead timers on the routers being different can cause router A not to form an adjacency with router B. Dead timers are used in OSPF to determine when a neighbor is considered unreachable. If the dead timers on the routers are not synchronized, it could lead to inconsistencies in the network and prevent the formation of an adjacency between the routers.
21.
A network administrator is troubleshooting an EIGRP problem on a router and needs to confirm the IP addresses of the devices with which the router has established adjacency. The retransmit interval and the queue counts for the adjacent routers also need to be checked. What command will display the required information?
Correct Answer
A. Router# show ip eigrp neighbors
Explanation
The command "Router# show ip eigrp neighbors" will display the required information, including the IP addresses of the devices with which the router has established adjacency, as well as the retransmit interval and queue counts for the adjacent routers.
22.
Which option describes a difference between EIGRP for IPv4 and IPv6?
Correct Answer
B. Only EIGRP for IPv6 requires a router ID to be configured under the routing process
23.
Which EIGRP for IPv6 command can you enter to view the link-local addresses of the neighbors of a device?
Correct Answer
C. Show ipv6 eigrp neighbors
Explanation
The command "show ipv6 eigrp neighbors" can be entered to view the link-local addresses of the neighbors of a device. This command specifically displays the IPv6 EIGRP neighbors, allowing you to see the link-local addresses of those neighbors.
24.
Which function allows EIGRP peers to receive notice of implementing topology changes?
Correct Answer
C. Goodbye messages
Explanation
Goodbye messages are used in EIGRP to notify peers about the implementation of topology changes. When a router wants to inform its neighbors about a change in the network, it sends a goodbye message to let them know that the previously advertised routes are no longer valid. This allows the peers to update their routing tables accordingly. Therefore, the correct answer is goodbye messages.
25.
What are the address that will show at the “show ip route” if we configure the above statements? (Choose three)
Correct Answer(s)
A. 10.0.0.0
D. 172.15.0.0
E. 192.168.4.0
26.
What does split horizon prevent?
Correct Answer
B. Routing loops, distance vector
Explanation
Split horizon is a technique used in distance vector routing protocols to prevent routing loops. In distance vector routing, each router advertises its routing table to its neighboring routers. Split horizon prevents a router from advertising a route back to the same router it learned the route from. This helps to avoid loops where packets keep circulating between routers without reaching their destination. Therefore, split horizon is used to prevent routing loops in distance vector routing protocols.
27.
What is called when variance with two times of metric?
Correct Answer
A. Unequal cost load balancing
Explanation
Unequal cost load balancing refers to the technique of distributing network traffic across multiple paths with varying costs. In this scenario, the variance with two times of metric implies that the cost of one path is twice the cost of another. This means that the network traffic will be distributed unequally, with more traffic flowing through the path with lower cost and less traffic through the path with higher cost. This helps in optimizing network performance and resource utilization by efficiently utilizing the available paths based on their costs.
28.
Which feature is config by setting a variance that is at least 2 times the metric?
Correct Answer
A. Unequal cost load balancing
Explanation
Unequal cost load balancing is a feature that can be configured by setting a variance that is at least 2 times the metric. This means that the router will consider paths with a metric that is up to 2 times higher than the best path, allowing for load balancing across multiple paths with different costs. By configuring this variance, the router can distribute traffic more evenly across multiple paths, even if they have different costs. This helps to optimize network performance and ensure efficient utilization of available resources.
29.
Refer to the exhibit. Based on the exhibited routing table, how will packets from a host within the 192.168.10.192/26 LAN be forwarded to 192.168.10.1?
Correct Answer
D. The router will forward packets from R3 to R2 to R1 AND from R3 to R1
Explanation
The given routing table shows that there are two possible paths for packets from a host within the 192.168.10.192/26 LAN to reach 192.168.10.1. The first path is from R3 to R2 to R1, and the second path is from R3 to R1. Therefore, the router will forward packets from R3 to R2 to R1 AND from R3 to R1 to ensure that the packets reach their destination.
30.
Which two statements about EIGRP on IPv6 device are true? (Choose two)
Correct Answer(s)
A. It is configured on the interface
E. It supports a shutdown feature
Explanation
EIGRP on an IPv6 device can be configured on the interface level, allowing for specific control and customization on individual interfaces. Additionally, EIGRP on IPv6 devices supports a shutdown feature, which allows for the temporary disabling of EIGRP on specific interfaces or globally.
31.
If R1 is configured as shown, which three addresses will be received by other routers that are running EIGRP on the network? (Choose three)
Correct Answer(s)
B. 10.0.0.0
C. 172.16.0.0
D. 192.168.2.0
32.
Which routing protocols are compatible with stubs? (Choose two)
Correct Answer(s)
A. OSPF
B. EIGRP
Explanation
OSPF and EIGRP are compatible with stubs. OSPF (Open Shortest Path First) is a link-state routing protocol that can be configured to treat certain areas as stubs, meaning they have only one route out. EIGRP (Enhanced Interior Gateway Routing Protocol) is a distance-vector routing protocol that supports stub routing, allowing certain routers to act as stub routers and only advertise default routes. Both OSPF and EIGRP provide efficient and scalable routing solutions for stub networks.
33.
Which command can you enter to verify that a BGP connection to a remote device is established?
Correct Answer
A. Show ip bgp summary
Explanation
The command "show ip bgp summary" can be entered to verify that a BGP connection to a remote device is established. This command will display a summary of BGP information, including the status of BGP neighbors and their connection states. By examining this output, one can determine whether the BGP connection to the remote device is established or not.
34.
Which two components are used to identify a neighbor in a BGP configuration? (Choose two)
Correct Answer(s)
A. Autonomous system number
E. IP address
Explanation
In a BGP configuration, two components are used to identify a neighbor. The first component is the autonomous system number, which is a unique identifier for each autonomous system in the network. The second component is the IP address, which is the address used to establish the connection between the routers. By using these two components, BGP can accurately identify and establish connections with neighboring routers in the network.
35.
Interface fa0/0 ip address 172.16.1.33 255.255.255.224 router bgp XXX neighbor 10.1.5.2 remote as 65001
You need to advertise the network of int fa0/0. Which of the following would you type in the “network” command?
Correct Answer
A. 172.16.1.32 mask 255.255.255.224
Explanation
To advertise the network of interface fa0/0, you would use the "network" command with the IP address and subnet mask of the network. In this case, the correct syntax would be "172.16.1.32 mask 255.255.255.224". This command specifies the network address of 172.16.1.32 and the subnet mask of 255.255.255.224, which represents a network with a range of IP addresses from 172.16.1.32 to 172.16.1.63.
36.
Which two statements about eBGP neighbor relationships are true? (Choose two)
Correct Answer(s)
A. The two devices must reside in different autonomous systems
B. Neighbors must be specifically declared in the configuration of each device
Explanation
The two statements that are true about eBGP neighbor relationships are:
1. The two devices must reside in different autonomous systems: eBGP (external BGP) is used to establish neighbor relationships between routers in different autonomous systems.
2. Neighbors must be specifically declared in the configuration of each device: In order to establish an eBGP neighbor relationship, the IP address or hostname of the neighbor router must be explicitly configured on each device.
37.
Which function of the IP SLAs ICMP jitter operation can you use to determine whether a VoIP issue is caused by excessive end-to-end time?
Correct Answer
A. Round-trip time latency
Explanation
The function of the IP SLAs ICMP jitter operation that can be used to determine whether a VoIP issue is caused by excessive end-to-end time is round-trip time latency. This measure calculates the time it takes for a packet to travel from the source to the destination and back. By analyzing the round-trip time latency, one can identify if there are delays in the network that may be affecting the quality of the VoIP calls.
38.
Which statement about the IP SLAs ICMP Echo operation is true?
Correct Answer
D. It is used to determine the frequency of ICMP packets.
Explanation
The IP SLAs ICMP Echo operation is used to determine the frequency of ICMP packets. This operation allows network administrators to measure network performance by sending ICMP echo requests (ping) to a specified destination. The frequency of these ICMP packets can be configured to monitor network latency and packet loss. By analyzing the response time and success rate of these echo requests, administrators can identify and troubleshoot network issues.
39.
What IP SLA ICMP Echo measures?
Correct Answer
D. End-to-end response time
Explanation
IP SLA ICMP Echo measures the end-to-end response time. This means it measures the time it takes for a packet to travel from the source to the destination and back. By measuring the end-to-end response time, network administrators can assess the performance and latency of the network. This information is crucial for troubleshooting network issues and ensuring optimal network performance.
40.
Which function does IP SLA ICMP ECHO operation perform to assist with troubleshooting?
Correct Answer
C. Hop-by-hop response time
Explanation
The IP SLA ICMP ECHO operation measures the response time of each hop in a network path. By sending ICMP echo requests and measuring the time it takes for the echo replies to be received, it helps troubleshoot network connectivity and identify delays or issues at each hop. This information is useful in identifying network performance problems and optimizing the network for better response times.
41.
Which feature or utility enables a switch or router to monitor network performance and availability using a responder?
Correct Answer
D. IP SLA
Explanation
IP SLA (Internet Protocol Service Level Agreement) is a feature or utility that enables a switch or router to monitor network performance and availability using a responder. It allows network administrators to measure network performance metrics such as delay, jitter, and packet loss. By sending synthetic traffic to a destination and receiving a response from a responder, IP SLA provides valuable insights into network performance and helps in troubleshooting network issues.