1. Trang chủ
  2. » Giáo Dục - Đào Tạo

DeThiCCNA 2

99 36 1

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 99
Dung lượng 659,43 KB

Nội dung

once, is what I always tell my students When answering multiple-choice questions that you’re not sure about, use the process of elimination to get rid of the obviously incorrect answers first Doing this greatly improves your odds if you need to make an educated guess You can no longer move forward and backward through the Cisco exams, so double-check your answer before clicking Next since you can’t change your mind After you complete an exam, you’ll get immediate, online notification of your pass or fail status, a printed examination score report that indicates your pass or fail status, and your exam results by section (The test administrator will give you the printed score report.) Test scores are automatically forwarded to Cisco within five working days after you take the test, so you don’t need to send your score to them If you pass the exam, you’ll receive confirmation from Cisco, typically within two to four weeks, sometimes longer How to Contact the Author You can reach Todd Lammle through his forum at www.lammle.com Assessment Test What protocol does PPP use to identify the Network layer protocol? A NCP B ISDN C HDLC D LCP Each field in an IPv6 address is how many bits long? A B 16 C 32 D 128 The RSTP provides which new port role? A Disabled B Enabled C Discarding D Forwarding What does the command routerA(config)#line cons allow you to perform next? A Set the Telnet password B Shut down the router C Set your console password D Disable console connections How long is an IPv6 address? A 32 bits B 128 bytes C 64 bits D 128 bits What PPP protocol provides for dynamic addressing, authentication, and multilink? A NCP B HDLC C LCP D X.25 What command will display the line, protocol, DLCI, and LMI information of an interface? A sh pvc B show interface C show frame-relay pvc D sho runn Which of the following is the valid host range for the subnet on which the IP address 192.168.168.188 255.255.255.192 resides? A 192.168.168.129–190 B 192.168.168.129–191 C 192.168.168.128–190 D 192.168.168.128–192 What does the passive command provide to the RIP dynamic routing protocol? A Stops an interface from sending or receiving periodic dynamic updates B Stops an interface from sending periodic dynamic updates but not from receiving updates C Stops the router from receiving any dynamic updates D Stops the router from sending any dynamic updates 10 Which protocol does Ping use? A TCP B ARP C ICMP D BootP 11 How many collision domains are created when you segment a network with a 12-port switch? A B C D 12 12 Which of the following commands will allow you to set your Telnet password on a Cisco router? A line telnet B line aux C line vty D line 13 Which router command allows you to view the entire contents of all access lists? A show all access-lists B show access-lists C show ip interface D show interface 14 What does a VLAN do? A Acts as the fastest port to all servers B Provides multiple collision domains on one switch port C Breaks up broadcast domains in a layer switch internetwork D Provides multiple broadcast domains within a single collision domain 15 If you wanted to delete the configuration stored in NVRAM, what would you type? A erase startup B erase nvram C delete D erase nvram running 16 Which protocol is used to send a destination network unknown message back to originating hosts? A TCP B ARP C ICMP D BootP 17 Which class of IP address has the most host addresses available by default? A A B B C C D A and B 18 How often are BPDUs sent from a layer device? A Never B Every seconds C Every 10 minutes D Every 30 seconds 19 Which one of the following is true regarding VLANs? A Two VLANs are configured by default on all Cisco switches B VLANs only work if you have a complete Cisco switched internetwork No off-brand switches are allowed C You should not have more than 10 switches in the same VTP domain D VTP is used to send VLAN information to switches in a configured VTP domain 20 Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz? A A B B C G D N 21 How many broadcast domains are created when you segment a network with a 12-port switch? A B C D 12 22 What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet? A NAT B Static C Dynamic D PAT 23 What protocols are used to configure trunking on a switch? (Choose two.) A VLAN Trunking Protocol B VLAN C 802.1Q D ISL 24 What is a stub network? A A network with more than one exit point B A network with more than one exit and entry point C A network with only one entry and no exit point D A network that has only one entry and exit point 25 Where is a hub specified in the OSI model? A Session layer B Physical layer C Data Link layer D Application layer 26 What are the two main types of access control lists (ACLs)? (Choose two.) A Standard B IEEE C Extended D Specialized 27 To back up an IOS, what command will you use? A backup IOS disk B copy ios tftp C copy tftp flash D copy flash tftp 28 What command is used to create a backup configuration? A copy running backup B copy running-config startup-config C config D wr mem mem 29 What is the main reason the OSI model was created? A To create a layered model larger than the DoD model B So application developers can change only one layer’s protocols at a time C So different networks could communicate D So Cisco could use the model 30 Which protocol does DHCP use at the Transport layer? A IP B TCP C UDP D ARP 31 If your router is facilitating a CSU/DSU, which of the following commands you need to use to provide the router with a 64000bps serial link? A RouterA(config)#bandwidth 64 B RouterA(config-if)#bandwidth 64000 C RouterA(config)#clockrate 64000 D RouterA(config-if)#clock rate 64 E RouterA(config-if)#clock rate 64000 32 Which command is used to determine if an IP access list is enabled on a particular interface? A show access-lists B show interface C show ip interface D show interface access-lists 33 Which command is used to upgrade an IOS on a Cisco router? A copy tftp run B copy tftp start C config D copy net tftp flash 34 The Protocol Data Unit Encapsulation (PDU) is completed in which order? A Bits, frames, packets, segments, data B Data, bits, segments, frames, packets C Data, segments, packets, frames, bits D Packets, frames, bits, segments, data Answers to Assessment Test A Network Control Protocol is used to help identify the Network layer protocol used in the packet See Chapter 16 for more information B Each field in an IPv6 address is 16 bits long An IPv6 address is a total of 128 bits See Chapter 15 for more information C The port roles used within RSTP include discarding, learning, and forwarding The difference between 802.1d and RSTP is the discarding role See Chapter 10 for more information C The command line console places you at a prompt where you can then set your console user-mode password See Chapter for more information D An IPv6 address is 128 bits long, whereas an IPv4 address is only 32 bits long See Chapter 15 for more information C Link Control Protocol in the PPP stack provides negotiation of dynamic addressing, authentication, and multilink See Chapter 16 for more information B The show interface command shows the line, protocol, DLCI, and LMI information of an interface See Chapter 16 for more information A 256 – 192 = 64, so 64 is our block size Just count in increments of 64 to find our subnet: 64 + 64 = 128 128 + 64 = 192 The subnet is 128, the broadcast address is 191, and the valid host range is the numbers in between, or 129–190 See Chapter for more information B The passive command, short for passive-interface, stops regular updates from being sent out an interface However, the interface can still receive updates See Chapter for more information 10 C ICMP is the protocol at the Network layer that is used to send echo requests and replies See Chapter for more information 11 D Layer switching creates individual collision domains per port See Chapter for more information 12 C The command line vty places you in a prompt that will allow you to set or change your Telnet password See Chapter for more information 13 B To see the contents of all access lists, use the show access-lists command See Chapter 12 for more information 14 C VLANs break up broadcast domains at layer See Chapter 11 for more information 15 A The command erase startup-config deletes the configuration stored in NVRAM See Chapter for more information 16 C ICMP is the protocol at the Network layer that is used to send messages back to an originating router See Chapter for more information 17 A Class A addressing provides 24 bits for host addressing See Chapter for more information 18 B Every seconds, BPDUs are sent out from all active bridge ports by default See Chapter 10 for more information 19 D Switches not propagate VLAN information by default; you must configure the VTP domain for this to occur VLAN Trunking Protocol (VTP) is used to propagate VLAN information across a trunk link See Chapter 11 for more information 20 C IEEE 802.11bg is in the 2.4GHz range, with a top speed of 54Mbps See Chapter 14 for more information 21 A By default, switches break up collision domains on a per-port basis but are one large broadcast domain See Chapter for more information 22 D Port Address Translation (PAT) allows a one-to-many approach to network address translation See Chapter 13 for more information 23 C, D VTP is not right because it has nothing to with trunking except that it sends VLAN information across a trunk link 802.1Q and ISL encapsulations are used to configure trunking on a port See Chapter 11 for more information 24 D Stub networks have only one connection to an internetwork Default routes should be set on a stub network or network loops may occur; however, there are exceptions to this rule See Chapter for more information 25 B Hubs regenerate electrical signals, which are specified at the Physical layer See Chapter for more information 26 A, C Standard and extended access control lists (ACLs) are used to configure security on a router See Chapter 12 for more information 27 D The command copy flash tftp will prompt you to back up an existing file in flash to a TFTP host See Chapter for more information 28 B The command to back up the configuration on a router is copy running-config startup-config See Chapter for more information 29 C The primary reason the OSI model was created was so that different networks could interoperate See Chapter for more information 30 C User Datagram Protocol is a connection network service at the Transport layer, and DHCP uses this connectionless service See Chapter for more information 31 E The clock rate command is two words, and the speed of the line is in bps See Chapter for more information 32 C The show ip interface command will show you if any interfaces have an outbound or inbound access list set See Chapter 12 for more information 33 D The copy tftp flash command places a new file in flash memory, which is the default location for the Cisco IOS in Cisco routers See Chapter for more information 34 C The PDU encapsulation method defines how data is encoded as it goes through each layer of the TCP/IP model Data is segmented at the Transport later, packets created at the Network layer, frames at the Data Link layer, and finally, the Physical layer encodes the 1s and 0s into a digital signal See Chapter for more information Ethernet is defined at these layers This layer supports flow control, sequencing, and acknowledgments This device can measure the distance to a remote network Logical addressing is used at this layer Hardware addresses are defined at this layer This device creates one big collision domain and one large broadcast domain This device creates many smaller collision domains, but the network is still one large broadcast domain This device can never run full duplex This device breaks up collision domains and broadcast domains Written Lab 1.3: Identifying Collision and Broadcast Domains In the following exhibit, identify the number of collision domains and broadcast domains in each specified device Each device is represented by a letter: A Hub B Bridge C Switch D Router Review Questions The following questions are designed to test your understanding of this chapter’s material For more information on how to get additional questions, please see this book’s introduction A receiving host has failed to receive all of the segments that it should acknowledge What can the host to improve the reliability of this communication session? A Send a different source port number B Restart the virtual circuit C Decrease the sequence number D Decrease the window size When a station sends a transmission to the MAC address ff:ff:ff:ff:ff:ff, what type of transmission is it? A Unicast B Multicast C Anycast D Broadcast Which layer devices can be used to enlarge the area covered by a single LAN segment? (Choose two.) A Switch B NIC C Hub D Repeater E RJ45 transceiver Segmentation of a data stream happens at which layer of the OSI model? A Physical B Data Link C Network D Transport Which of the following describe the main router functions? (Choose four.) A Packet switching B Collision prevention C Packet filtering D Broadcast domain enlargement E Internetwork communication F Broadcast forwarding G Path selection Routers operate at layer _ LAN switches operate at layer _ Ethernet hubs operate at layer _ Word processing operates at layer _ A 3, 3, 1, B 3, 2, 1, none C 3, 2, 1, D 2, 3, 1, E 3, 3, 2, none When data is encapsulated, which is the correct order? A Data, frame, packet, segment, bit B Segment, data, packet, frame, bit C Data, segment, packet, frame, bit D Data, segment, frame, packet, bit Why does the data communication industry use the layered OSI reference model? (Choose two.) A It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting B It enables equipment from different vendors to use the same electronic components, thus saving research and development funds C It supports the evolution of multiple competing standards and thus provides business opportunities for equipment manufacturers D It encourages industry standardization by defining what functions occur at each layer of the model E It provides a framework by which changes in functionality in one layer require changes in other layers What are two purposes for segmentation with a bridge? A To add more broadcast domains B To create more collision domains C To add more bandwidth for users D To allow more broadcasts for users 10 Which of the following is not a cause of LAN congestion? A Too many hosts in a broadcast domain B Adding switches for connectivity to the network C Broadcast storms D Low bandwidth 11 If a switch has three computers connected to it, with no VLANs present, how many broadcast and collision domains is the switch creating? A Three broadcast and one collision B Three broadcast and three collision C One broadcast and three collision D One broadcast and one collision 12 Acknowledgments, sequencing, and flow control are characteristics of which OSI layer? A Layer B Layer C Layer D Layer 13 Which of the following are types of flow control? (Choose all that apply.) A Buffering B Cut-through C Windowing Which encryption type does WPA2 use? A AES-CCMP B PPK via IV C PSK D TKIP/MIC How many non-overlapping channels are available with 802.11b? A B 12 C 23 D 40 A single 802.11g access point has been configured and installed in the center of a square-shaped office A few wireless users are experiencing slow performance and drops while most users are operating at peak efficiency In the following list, what are three likely causes of this problem? (Choose three.) A Mismatched TKIP encryption B Null SSID C Cordless phones D Mismatched SSID E Metal file cabinets F Antenna type or direction What is the maximum data rate for the 802.11a standard? A 6Mbps B 11Mbps C 22Mbps D 54Mbps 10 What is the maximum data rate for the 802.11g standard? A 6Mbps B 11Mbps C 22Mbps D 54Mbps 11 What is the maximum data rate for the 802.11b standard? A 6Mbps B 11Mbps C 22Mbps D 54Mbps 12 Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.) A Assigning a private IP address to the AP B Changing the default SSID value C Configuring a new administrator password D Changing the mixed mode setting to single mode E Configuring traffic filtering 13 A wireless client cannot connect to an 802.11b/g BSS with a b/g wireless card The client section of the access point does not list any active WLAN clients What is a possible reason for this? A The incorrect channel is configured on the client B The client’s IP address is on the wrong subnet C The client has an incorrect pre-shared key D The SSID is configured incorrectly on the client 14 Which two features did WPA add to address the inherent weaknesses found in WEP? (Choose two.) A A stronger encryption algorithm B Key mixing using temporal keys C Shared key authentication D A shorter initialization vector E Per frame sequence counter 15 Which two wireless encryption methods are based on the RC4 encryption algorithm? (Choose two.) A WEP B CCKM C AES D TKIP E CCMP 16 Two workers have established wireless communication directly between their wireless laptops What type of wireless topology has been created by these employees? A BSS B SSID C IBSS D ESS 17 Which two of the following describe the wireless security standard that WPA defines? (choose two) A It specifies the use of dynamic encryption keys that change throughout the users connection time B It requires that all devices must use the same encryption key C It can use PSK authentication D Static keys must be used 18 Which wireless LAN design ensures that a mobile wireless client will not lose connectivity when moving from one access point to another? A Using adapters and access points manufactured by the same company B Overlapping the wireless cell coverage by at least 10% C Configuring all access points to use the same channel D Utilizing MAC address filtering to allow the client MAC address to authenticate with the surrounding APs 19 You are connecting your access point and it is set to root What does extended service set ID mean? A That you have more than one access point and they are in the same SSID connected by a distribution system B That you have more than one access point and they are in separate SSIDs connected by a distribution system C That you have multiple access points, but they are placed physically in different buildings D That you have multiple access points, but one is a repeater access point 20 What are three basic parameters to configure on a wireless access point? (Choose three.) A Authentication method B RF Channel C RTS/CTS D SSID E Microwave interference resistance Answers to Review Questions A, C, D There are some various flavors of EAP; some are easier to implement than others The EAP protocols that are correct are PEAP, EAPFAST, and Local-EAP C The IEEE 802.11b and IEEE 802.11g standards both run in the 2.4GHz RF range D The IEEE 802.11a standard runs in the 5GHz RF range C The IEEE 802.11b and IEEE 802.11g standards both run in the 2.4GHz RF range C The minimum parameter configured on an AP for a simple WLAN installation is the SSID, although you should set the channel and authentication method as well A WPA2 uses AES-CCMP for encryption WPA uses TKIP A The IEEE 802.11b standard provides three non-overlapping channels C, E, F Cordless phone interference, antenna type or orientation, and metal filing cabinet reflection of the RF signal can all give rise to connectivity issues D The IEEE 802.11a standard provides a maximum data rate of up to 54Mbps 10 D The IEEE 802.11g standard provides a maximum data rate of up to 54Mbps 11 B The IEEE 802.11b standard provides a maximum data rate of up to 11Mbps 12 B, C When setting up an AP, always change the default SSID and administrator password 13 D Although this question is cryptic at best, the only possible answer is option D If the SSID is not being broadcast (which we must assume in this question), the client must be configured with the correct SSID in order to associate to the AP 14 B, E WPA uses Temporal Key Integrity Protocol (TKIP), which includes both broadcast key rotation (dynamic keys that change) and sequencing of frames 15 A, D Both WEP and TKIP (WPA) use the RC4 algorithm It is advised to use WPA2 which uses the AES encryption 16 C Two wireless hosts directly connected wirelessly is no different then two hosts connecting with a crossover cable They are both ad-hoc networks, but in wireless, we call this an Independent Basic Service Set (IBSS) 17 A, C WPA, although using the same RC4 encryption that WEP uses, provides enhancements to the WEP protocol by using dynamic keys that change constantly, as well as providing a Pre-Shared Key method of authentication 18 B To create an Extended Service Set (ESS), you need to overlap the wireless BSA from each AP by at least 15% in order to not have a gap in coverage so users not lose their connection when roaming between APs 19 A Extended service set ID means that you have more than one access point and they all are set to the same SSID and all are connected together in the same VLAN or distribution system so users can roam 20 A, B, D The three basic parameters to configure when setting up an access point are the SSID, the RF channel, and the authentication method Answers to Written Lab 14 11Mbps 54Mbps True 2.4GHz 2.4GHz 5GHz Block acknowledgments AES-CCMP The IEEE 802.11i standard has been sanctioned by WPA and is termed WPA version 10 RADIUS Server ICMP is extremely important with IPv6, and I discussed in detail how ICMP works with IPv6, followed by how to configure RIP, EIGRP, and OSPF with IPv6 Migrating to IPv6 is no small matter either, and I went over the pros and cons of doing this I told you about three migration strategies—dual stacking, tunneling using both IPv4 and IPv6, and a third approach, NAT-PT, to be used only as a last resort Exam Essentials Understand why we need IPv6 Without IPv6, the world would be depleted of IP addresses Understand link-local Link-local is like an IPv4 private IP address, but it can’t be routed at all, not even in your organization Understand unique local This, like link-local, is like a private IP address in IPv4 and cannot be routed to the Internet However, the difference between link-local and unique local is that unique local can be routed within your organization or company Remember IPv6 addressing IPv6 addressing is not like IPv4 addressing IPv6 addressing has much more address space and is 128 bits long, and represented in hexadecimal, unlike IPv4, which is only 32 bits long and represented in decimal Written Lab 15 In this section, write the answers to the following IPv6 questions: Which type of packet is addressed and delivered to only a single interface? Which type of address is used just like a regular public routable address in IPv4? Which type of address is not meant to be routed? Which type of address is not meant to be routed to the Internet but is still globally unique? Which type of address is meant to be delivered to multiple interfaces? Which type of address identifies multiple interfaces, but packets are delivered only to the first address it finds? Which routing protocol uses multicast address FF02::5? IPv4 had a loopback address of 127.0.0.1 What is the IPv6 loopback address? What does a link-local address always start with? 10 What does a unique local unicast range start with? (The answers to Written Lab 15 can be found following the answers to the review questions for this chapter.) Review Questions The following questions are designed to test your understanding of this chapter’s material For more information on how to get additional questions, please see this book’s Introduction Which of the following is true when describing a global unicast address? A Packets addressed to a unicast address are delivered to a single interface B These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4 C These are like private addresses in IPv4 in that they are not meant to be routed over the Internet D These addresses are meant for nonrouting purposes, but they are almost globally unique, so it is unlikely they will have an address overlap Which of the following is true when describing a unicast address? A Packets addressed to a unicast address are delivered to a single interface B These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4 C These are like private addresses in IPv4 in that they are not meant to be routed D These addresses are meant for nonrouting purposes, but they are almost globally unique, so it is unlikely they will have an address overlap Which of the following is true when describing a link-local address? A Packets addressed to a broadcast address are delivered to a single interface B These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4 C These are like private addresses in IPv4 in that they are not meant to be routed over the Internet D These addresses are meant for nonrouting purposes, but they are almost globally unique, so it is unlikely they will have an address overlap Which of the following is true when describing a unique local address? A Packets addressed to a unique local address are delivered to a single interface B These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4 C These are like private addresses in IPv4 in that they are not meant to be routed D These addresses are not meant for Internet routing purposes, but they are unique, so it is unlikely they will have an address overlap Which of the following is true when describing a multicast address? A Packets addressed to a multicast address are delivered to a single interface B Packets are delivered to all interfaces identified with the address This is also called a one-to-many address C A multicast address identifies multiple interfaces and is delivered to only one address This address can also be called one-to-one-ofmany D These addresses are meant for nonrouting purposes, but they are almost globally unique, so it is unlikely they will have an address overlap Which of the following is true when describing an anycast address? A Packets addressed to an anycast address are delivered to a single interface B Packets are delivered to all interfaces identified by the address This is also called a one-to-many address C This address identifies multiple interfaces and the anycast packet is only delivered to one device This address can also be called oneto-one-of-many D These addresses are meant for nonrouting purposes, but they are almost globally unique, so it is unlikely they will have an address overlap You want to ping the loopback address of your IPv6 local host What will you type? A ping 127.0.0.1 B ping 0.0.0.0 C ping ::1 D trace 0.0.::1 What two multicast addresses does OSPFv3 use? (Choose two.) A FF02::A B FF02::9 C FF02::5 D FF02::6 What multicast addresses does RIPng use? A FF02::A B FF02::9 C FF02::5 D FF02::6 10 What multicast addresses does EIGRPv6 use? A FF02::A B FF02::9 C FF02::5 D FF02::6 11 To enable RIPng, which of the following would you use? A Router1(config-if)# ipv6 ospf 10 area 0.0.0.0 B Router1(config-if)#ipv6 C Router1(config)# router rip ipv6 router eigrp 10 D Router1(config-rtr)#no E Router1(config-if)#ipv6 shutdown eigrp 10 12 To enable EIGRP, which three of the following would you use? (Choose three.) A Router1(config-if)# ipv6 ospf 10 area 0.0.0.0 B Router1(config-if)#ipv6 C Router1(config)# router rip ipv6 router eigrp 10 D Router1(config-rtr)#no E Router1(config-if)#ipv6 shutdown eigrp 10 13 To enable OSPFv3, which of the following would you use? A Router1(config-if)# ipv6 ospf 10 area 0.0.0.0 B Router1(config-if)#ipv6 C Router1(config)# router rip ipv6 router eigrp 10 D Router1(config-rtr)#no E Router1(config-if)#ospf shutdown ipv6 10 area 14 Which of the following statements about IPv6 addresses are true? (Choose two.) A Leading zeros are required B Two colons (::) are used to represent successive hexadecimal fields of zeros C Two colons (::) are used to separate fields D A single interface will have multiple IPv6 addresses of different types 15 What two statements about IPv4 and IPv6 addresses are true? (Choose two.) A An IPv6 address is 32 bits long, represented in hexidecimal B An IPv6 address is 128 bits long, represented in decimal C An IPv4 address is 32 bits long, represented in decimal D An IPv6 address is 128 bits long, represented in hexidecimal 16 Which of the following descriptions about IPv6 is correct? A Addresses are not hierarchical and are assigned at random B Broadcasts have been eliminated and replaced with multicasts C There are 2.7 billion addresses D An interface can only be configured with one IPv6 address 17 How many bits are in an IPv6 address field? A 24 B C D 16 E 32 F 128 18 Which of the following correctly describe characteristics of IPv6 unicast addressing? (Choose two.) A Global addresses start with 2000::/3 B Link-local addresses start with FF00::/10 C Link-local addresses start with FE00:/12 D There is only one loopback address and it is ::1 19 Which of the following statements are true of IPv6 address representation? (Choose two.) A The first 64 bits represent the dynamically created interface ID B A single interface may be assigned multiple IPv6 addresses of any type C Every IPv6 interface contains at least one loopback address D Leading zeroes in an IPv6 16-bit hexadecimal field are mandatory 20 Which of the following are IPv6 translation mechanisms? (Choose three.) A 6to4 tunneling B GRE tunneling C ISATAP tunneling D Teredo tunneling Answers to Review Questions B Unlike unicast addresses, global unicast addresses are meant to be routed A Packets addressed to a unicast address are delivered to a single interface For load balancing, multiple interfaces can use the same address C Link-local addresses are meant for throwing together a temporary LAN for meetings or a small LAN that is not going to be routed but needs to share and access files and services locally D These addresses are meant for nonrouting purposes like link-local, but they are almost globally unique, so it is unlikely they will have an address overlap Unique local addresses were designed as a replacement for site-local addresses B Packets addressed to a multicast address are delivered to all interfaces identified with the multicast address, the same as in IPv4 It is also called a one-to-many address You can always tell a multicast address in IPv6 because multicast addresses always start with FF C Anycast addresses identify multiple interfaces, which is somewhat similar to multicast addresses; however, the big difference is that the anycast packet is only delivered to one address, the first one it finds defined in the terms of routing distance This address can also be called oneto-one-of-many C The loopback address with IPv4 is 127.0.0.1 With IPv6, that address is ::1 C, D Adjacencies and next-hop attributes now use link-local addresses, and OSPFv3 still uses multicast traffic to send its updates and acknowledgments with the addresses FF02::5 for OSPF routers and FF02::6 for OSPF designated routers These are the replacements for 224.0.0.5 and 224.0.0.6, respectively B RIPng uses the multicast IPv6 address of FF02::9 If you remember the multicast addresses for IPv4, the numbers at the end of each IPv6 address are the same 10 A EIGRPv6’s multicast address stayed very near the same In IPv4 it was 224.0.0.10; now it is FF02::A (A=10 in decimal notation) 11 B It’s pretty simple to enable RIPng for IPv6 You configure it right on the interface where you want RIP to run with the ipv6 router rip number command 12 C, D, E Unlike RIPng and OSPFv3, you need to configure EIGRP both from global configuration mode, router config mode, and interface mode, and you have to enable the protocol in router configuration with the no shutdown command 13 A To enable OSPFv3, you enable the protocol at the interface level as with RIPng The command string is ipv6 ospf process-id area area-id 14 B, D To shorten the written length of an IPv6 address, successive fields of zeros may be replaced by double colons In trying to shorten the address further, leading zeros may also be removed Just as with IPv4, a single device’s interface can have more than one address; with IPv6 there are more types of addresses and the same rule applies There can be link-local, global unicast, multicast, and anycast addresses all assigned to the same interface 15 C, D IPv4 addresses are 32 bits long and are represented in decimal format IPv6 addresses are 128 bits long and represented in hexadecimal format 16 B There are no broadcasts with IPv6 Unicast, multicast, anycast, global, and link-local unicast are used 17 D There are 16 bits (four hex characters) in an IPv6 field 18 A, D Global addresses start with 2000::/3, link-locals start with FE80::/10, loopback is ::1, and unspecified is just two colons (::) Each interface will have a loopback address automatically configured 19 B, C If you verify your IP configuration on your host, you’ll see that you have multiple IPv6 addresses, including a loopback address The last 64bits represent the dynamically created interface ID, and leading zeros are not mandatory in a 16-bit IPv6 field 20 A, C, D 6to4, ISATAP (dual stack), and Teredo are translation tunnel mechanisms Answers to Written Lab 15 Unicast Global unicast Link-local Unique local (used to be called site-local) Multicast Anycast OSPFv3 ::1 FE80::/10 10 FC00:: /7 lmi show frame relay lmi statistics map Frame-Relay map table pvc show frame relay pvc statistics route show frame relay route traffic Frame-Relay protocol statistics Also, use Ping and Telnet to verify connectivity Review Questions The following questions are designed to test your understanding of this chapter’s material For more information on how to get additional questions, please see this book’s Introduction Which command will display the CHAP authentication process as it occurs between two routers in the network? A show chap authentication B show interface serial C debug ppp authentication D debug chap authentication Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational? A frame-relay arp B frame-relay map C frame-relay interface-dci D frame-relay lmi-type Suppose you have a customer who has a central HQ and six branch offices The customer anticipates adding six more branches in the near future It wishes to implement a WAN technology that will allow the branches to economically connect to HQ and you have no free ports on the HQ router Which of the following would you recommend? A PPP B HDLC C Frame Relay D ISDN Which of the following command options are displayed when you use the Router#show frame-relay ? command? (Choose three.) A dlci B neighbors C lmi D pvc E map How should a router that is being used in a Frame Relay network be configured to keep split horizon issues from preventing routing updates? A Configure a separate subinterface for each PVC with a unique DLCI and subnet assigned to the subinterface B Combine multiple Frame Relay circuits as a point-to-point line to support multicast and broadcast traffic C Configure many subinterfaces in the same subnet D Configure a single subinterface to establish multiple PVC connections to multiple remote router interfaces Which encapsulations can be configured on a serial interface? (Choose three.) A Ethernet B Token Ring C HDLC D Frame Relay E PPP When setting up Frame Relay for point-to-point subinterfaces, which of the following must not be configured? A The Frame Relay encapsulation on the physical interface B The local DLCI on each subinterface C An IP address on the physical interface D The subinterface type as point-to-point When a router is connected to a Frame Relay WAN link using a serial DTE interface, how is the clock rate determined? A Supplied by the CSU/DSU B By the far end router C By the clock rate command D By the Physical layer bit stream timing A default Frame Relay WAN is classified as what type of physical network? A Point-to-point B Broadcast multi-access C Non-broadcast multi-access D Non-broadcast multipoint 10 Which of the following encapsulates PPP frames in Ethernet frames and uses common PPP features like authentication, encryption, and compression? A PPP B PPPoA C PPPoE D Token Ring 11 You need to configure a router for a Frame Relay connection to a non-Cisco router Which of the following commands will prepare the WAN interface of the router for this connection? A Router(config-if)#encapsulation frame-relay q933a B Router(config-if)#encapsulation frame-relay ansi C Router(config-if)#encapsulation frame-relay ietf D Router(config-if)#encapsulation frame-relay cisco 12 The Acme Corporation is implementing dial-up services to enable remote-office employees to connect to the local network The company uses multiple routed protocols, needs authentication of users connecting to the network, and since some calls will be long distance, needs callback support Which of the following protocols is the best choice for these remote services? A 802.1 B Frame Relay C HDLC D PPP E PAP 13 Which WAN encapsulations can be configured on an asynchronous serial connection? (Choose two.) A PPP B ATM C HDLC D SDLC E Frame Relay 14 Which of the following uses ATM as the Data Link layer protocol that’s terminated at what’s known as the DSLAM? A DSL B PPPoE C Frame Relay D Dedicated T1 E Wireless F POTS 15 Why won’t the serial link between the Corp router and the Remote router come up? Corp#sh int s0/0 Serial0/0 is up, line protocol is down Hardware is PowerQUICC Serial Internet address is 10.0.1.1/24 MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, reliability 254/255, txload 1/255, rxload 1/255 Encapsulation PPP, loopback not set Remote#sh int s0/0 Serial0/0 is up, line protocol is down Hardware is PowerQUICC Serial Internet address is 10.0.1.2/24 MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, reliability 254/255, txload 1/255, rxload 1/255 Encapsulation HDLC, loopback not set A The serial cable is faulty B The IP addresses are not in the same subnet C The subnet masks are not correct D The keepalive settings are not correct E The layer frame types are not compatible 16 In which of the following technologies is the term HFC used? A DSL B PPPoE C Frame Relay D Cable E Wireless F POTS 17 A remote site has just been connected to the central office However, remote users cannot access applications at the central office The remote router can be pinged from the central office router After reviewing the following command output, which you think is the most likely reason for the problem? Central#show running-config ! interface Serial0 ip address 10.0.8.1 255.255.248.0 encapsulation frame-relay frame-relay map ip 10.0.15.2 200 ! Router rip Network 10.0.0.0 Remote#show running-config ! interface Serial0 ip address 10.0.15.2 255.255.248.0 encapsulation frame-relay frame-relay map ip 10.0.8.1 100 ! Router rip Network 10.0.0.0 A The Frame Relay PVC is down B The IP addressing on the Central/Remote router link is incorrect C RIP routing information is not being forwarded D Frame Relay Inverse ARP is not properly configured 18 Which of the following is an industry-wide standard suite of protocols and algorithms that allows for secure data transmission over an IP-based network that functions at the layer Network layer of the OSI model? A HDLC B Cable C VPN D IPSec E xDSL 19 Which of the following describes the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols? A HDLC B Cable C VPN D IPSec E xDSL 20 Referring to the following diagram, what functions does the Frame Relay DLCI provide with respect to RouterA? A Identifies the signaling standard between RouterA and the frame switch B Identifies a portion of the virtual circuit between RouterA and the frame switch C Identifies the encapsulation used between RouterA and RouterB D Defines the signaling standard between RouterB and the frame switch Answers to Review Questions C The command debug ppp authentication will show you the authentication process that PPP uses across point-to-point connections B If you have a router in your Frame Relay network that does not support IARP, you must create Frame Relay maps on your router, which provide known DLCI-to-IP address mappings C The key is “there are no free ports” on your router Only Frame Relay can provide a connection to multiple locations with one interface, and in an economical manner no less C, D, E The show frame-relay ? command provides many options, but the options available in this question are lmi, pvc, and map A If you have a serial port configured with multiple DLCIs connected to multiple remote sites, split horizon rules (discussed in Chapter 8) stop route updates received on an interface from being sent out the same interface By creating subinterfaces for each PVC, you can avoid the split horizon issues when using Frame Relay C, D, E Ethernet and Token Ring are LAN technologies and cannot be configured on a serial interface PPP, HDLC, and Frame Relay are layer WAN technologies that are typically configured on a serial interface C It is very important to remember when studying the CCNA exam objectives, and when configuring Frame Relay with point-to-point subinterfaces, that you not put an IP address on the physical interface A Clocking on a serial interface is always provided by the CSU/DSU (DCE device) However, if you not have a CSU/DSU in your nonproduction test environment, then you need to supply clocking with the clock rate command on the serial interface of the router with the DCE cable attached C Frame Relay, by default, is a non-broadcast multi-access (NBMA) network, which means that broadcasts, such as RIP updates, will not be forwarded across the link by default 10 C PPPoE encapsulates PPP frames in Ethernet frames and uses common PPP features like authentication, encryption, and compression PPPoA is used for ATM 11 C If you have a Cisco router on one side of a Frame Relay network and a non-Cisco router on the other side, you would need to use the Frame Relay encapsulation type of IETF The default is Cisco encapsulation, which means that a Cisco router must be on both sides of the Frame Relay PVC 12 D PPP is your only option because HDLC and Frame Relay not support these types of business requirements PPP provides dynamic addressing, authentication using PAP or CHAP, and callback services 13 A, B Please not freak out because ATM is an answer to this question ATM is not covered in depth on the CCNA exam PPP is mostly used for dial-up (async) services, but ATM could be used as well, though it typically is not used anymore since PPP is so efficient 14 A ATM is the Data-Link layer protocol that’s typically used over the DSL layer connection from the CPE and terminated at what’s known as the DSLAM—an ATM switch that contains DSL interface cards, or ATU-Cs 15 E This is an easy question because the Remote router is using the default HDLC serial encapsulation and the Corp router is using the PPP serial encapsulation You should go to the Remote router and set that encapsulation to PPP or change the Corp router back to the default of HDLC 16 D In a modern network, hybrid fibre-coaxial (HFC) is a telecommunications industry term for a network that incorporates both optical fiber and coaxial cable to create a broadband network 17 C Even though the IP addresses don’t look correct, they are in the same subnet, so option B is not correct The question states that you can ping the other side, so the PVC must be up— option A can’t be correct You cannot configure IARP, so only option C can be correct Since a Frame Relay network is a non-broadcast multi-access network by default, broadcasts such as RIP updates cannot be sent across the PVC unless you use the broadcast statement at the end of the frame-relay map command 18 D IPSec is an industry-wide standard suite of protocols and algorithms that allows for secure data transmission over an IP-based network that functions at the layer Network layer of the OSI model 19 C A VPN allows or describes the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols A VPN can be set up across any type of link 20 B As I mentioned many times in this chapter, and you need to remember this: DLCIs are locally significant only and define the circuit from the router to the switch only They not reference a remote router or DLCI RouterA would use DLCI 100 to get to the RouterB networks RouterB would use DLCI 200 to get to the RouterA networks Answers to Written Lab 16 sh int s0 config t int s0 encap ppp config t username todd password cisco config t int serial0 ppp authentication chap config t int s0 frame interface-dlci 16 int s1 frame interface-dlci 17 config t int s0 no ip address encap frame int s0.16 point-to-point ip address 172.16.60.1 255.255.255.0 frame interface-dlci 16 PPPoE or PPPoA HDLC, LCP, and NCP IPSec 10 Remote access VPNs, site-to-site VPNs, and extranet VPNs

Ngày đăng: 25/10/2019, 11:12

w