9tut ICND1 Practice Questions (v2.00)EXAM: 640-822 Formatted Version By: S Qaisar ShahFile Version: 2.0 My Blog : sqaisars.blogspot.com Interconnecting Cisco Networking Devices – Part 1 (640-822) (9tut.net Latest Questions)Content: Exam A: LabSim Exam B: LabSim Exam C: ARP Testlet Exam D: Hotspot Exam E: Operations Exam F: Subnetting Exam G: Drag & Drop questions Exam H: Wireless QuestionsThe author of these questions is the owner of 9tut.net/9tut.comVisit www.9tut.net for ICND1 and ICND2 questions, sims andfeedback. Visit www.9tut.com for CCNA questions, sims andfeedback.Good luck studying, practicing and on the exam.Sections1. LabSim2. ARP Testlet3. Hotspot4. Operations5. Subnetting6. Drag & Drop questions7. Wireless Questions
Exam A QUESTION 1 Q A1 This topology contains 3 routers and 1 switch. Complete the topology. Drag the appropriate device icons to the labeled Device. Drag the appropriate connections to the locations labeled Connections. Drag the appropriate IP addresses to the locations labeled IP address. (Hint: use the given host addresses and Main router information) To remove a device or connection, drag it away from the topology. Use information gathered from the Main router to complete the configuration of any additional routers. No passwords are required to access the Main router. The config terminal command has been disabled for the HQ router. The router does not require any configuration. Configure each additional router with the following: Configure the interfaces with the correct IP address and enable the interfaces. Set the password to allow console access to consolepw Set the password to allow telnet access to telnetpw Set the password to allow privilege mode access to privpw Note: Because routes are not being added to the configurations, you will not be able to ping through the internetwork. All devices have cable autosensing capabilities disabled. All hosts are PC’sClick on Exhibit for further information. Formatted Version By: S Qaisar Shah.
Section: LabSimExplanation/Reference:For the device at the bottom-right box, we notice that it has 2 interfaces Fa0/2 and Fa0/4; moreover the linkconnects the PC on the right with the device on the bottom-right is a straight-through link -> it is a switch.The question stated that this topology contains 3 routers and 1 switch -> two other devices are routersPlace them on appropriate locations as following:
(Host D and host E will be automatically added after placing two routers. Click on them to accessneighboring routers)Specify appropriate connections between these devices: The router on the left is connected with the Main router through FastEthernet interfaces: use a crossover cable The router on the right is connected with the Main router through Serial interfaces: use a serial cable The router on the right and the Switch: use a straight-through cable The router on the left and the computer: use a crossover cable(To remember which type of cable you should use, follow these tips: To connect two serial interfaces of 2 routers we use serial cable To specify when we use crossover cable or straight-through cable, we should remember: Group 1: Router, Host, Server Group 2: Hub, Switch One device in group 1 + One device in group 2: use straight-through cable Two devices in the same group: use crossover cableFor example:we use straight-through cable to connect switch to router, switch to host, hub to host, hub to server…and we use crossover cable to connect switch to switch, switch to hub, router to router, host to host… )Assign appropriate IP addresses for interfaces:From Main router, use show running-config command:
(Notice that you may see different IP addresses in the real CCNA exam, the ones shown above are justused for demonstration)From the output we learned that the ip address of Fa0/0 interface of the Main router is 192.168.152.177/28.This address belongs to a subnetwork which has:Increment: 16 (/28 = 255.255.255.240 or 1111 1111.1111 1111.1111 1111.1111 0000)Network address: 192.168.152.176 (because 176 = 16 * 11 and 176 < 177)Broadcast address: 192.168.152.191 (because 191 = 176 + 16 – 1)And we can pick up an ip address from the list that belongs to this subnetwork: 192.168.152.190 andassign it to the Fa0/0 interface the router on the leftUse the same method for interface Serial0/0 with an ip address of 192.168.152.161Increment: 16Network address: 192.168.152.160 (because 160 = 16 * 10 and 160 < 161)Broadcast address: 192.168.152.175 (because 176 = 160 + 16 – 1)-> and we choose 192.168.152.174 for Serial0/0 interface of the router on the rightInterface Fa0/1 of the router on the leftIP (of the computer on the left) : 192.168.152.129/28Increment: 16Network address: 192.168.152.128 (because 128 = 16 * 8 and 128 < 129)Broadcast address: 192.168.152.143 (because 143 = 128 + 16 – 1)-> we choose 192.168.152.142 from the listInterface Fa0/0 of the router on the rightIP (of the computer on the left) : 192.168.152.225/28Increment: 16Network address: 192.168.152.224 (because 224 = 16 * 14 and 224 < 225)Broadcast address: 192.168.152.239 (because 239 = 224 + 16 – 1)-> we choose 192.168.152.238 from the listLet’s have a look at the picture below to summarize:
Configure two routers on the left and right with these commands: Router1 = router on the leftAssign appropriate IP addresses to Fa0/0 & Fa0/1 interfaces:Router1> enableRouter1# configure terminalRouter1(config)# interface fa0/0Router1(config-if)# ip address 192.168.152.190 255.255.255.240Router1(config-if)# no shutdownRouter1(config-if)# interface fa0/1Router1(config-if)# ip address 192.168.152.142 255.255.255.240Router1(config-if)# no shutdownSet passwords (configure on two routers)1. Console password:Router1(config-if)# exitRouter1(config)# line console 0Router1(config-line)# password consolepw
Router1(config-line)# loginRouter1(config-line)# exit2. Telnet password:Router1(config)# line vty 0 4Router1(config-line)# password telnetpwRouter1(config-line)# loginRouter1(config-line)# exit3. Privilege mode password:Router1(config)# enable password privpw4. Save the configuration:Router1(config)# exitRouter1# copy running-config startup-config Configure IP addresses of Router2 (router on the right)Router2> enableRouter2# configure terminalRouter2(config)# interface fa0/0Router2(config-if)# ip address 192.168.152.238 255.255.255.240Router2(config-if)# no shutdownRouter2(config-if)# interface serial0/0Router2(config-if)# ip address 192.168.152.174 255.255.255.240Router2(config-if)# no shutdown1. Console password:Router2(config-if)# exitRouter2(config)# line console 0Router2(config-line)# password consolepwRouter2(config-line)# loginRouter2(config-line)# exit2. Telnet password:Router2(config)# line vty 0 4Router2(config-line)# password telnetpwRouter2(config-line)# loginRouter2(config-line)# exit3. Privilege mode password:Router2(config)# enable password privpw4. Save the configuration:Router2(config)# exitRouter2# copy running-config startup-configQUESTION 2 Q A2You have been hired by PC Consultants Incorporated to document the layout of the network.Complete the network topology shown in the graphic by dragging the labels below with the appropriaterouter types, interface types and IP addresses to the graphic.
Find the information you need by using the router console attached to the Home router. Click on Exhibit for further information.Answer:Section: LabSimExplanation/Reference:First we have to find out the types of these routers to place them in correct positions by using show cdpneighbors command on HOME router:
There are 3 columns we should pay more attention to:+ Local Intrfce (Local Interface): the interface on the device you are using “show cdp neighbors”command. In this case it is the interface of HOME router+ Platform: the platform of neighbor device+ Port ID: the neighbor device’s port or interface which links to the HOME routerFrom the exhibit, the “Local Interface”, “Platform” and “Port ID” columns, we can identify where these fourrouters should be placed and their corresponding associated portsFinally, we need to identify the IP addresses of four interfaces on neighboring routers using show running-config command:Home# show running-config!interface FastEthernet0/0 ip address 192.168.47.1 255.255.255.0 duplex auto speed auto!interface FastEthernet0/1 ip address 192.168.238.1 255.255.255.0 duplex auto speed auto!interface Serial0/0 ip address 192.168.235.1 255.255.255.0 duplex auto!interface Serial0/1
ip address 192.168.39.1 255.255.255.0 duplex autoAnd we can easily assign corresponding ip addresses to four neighbor routers, which are on the samenetwork with HOME router’s interfaces>QUESTION 3 Q A3Central Florida Widgets recently installed a new router in their Apopka office. Complete the networkinstallation by performing the initial router configurations and configuring RIPv2 routing using the routercommand line interface (CLI) on the Apopka router.Configure the router per the following requirements: Name of the router is Apopka Enable-secret password is cisco10 The password to access user EXEC mode using the console is RouterPass The password to allow telnet access to the router is scan90IPv4 addresses must be configured as follows: Ethernet network 22.214.171.124/27 – router has second assignable host address in subnet. Serial network is 192.0.2.128/28 – router has last assignable host address in the subnet.Interfaces should be enabled.Routing protocol is RIPv2.(Notice: In the real exam the name, passwords, IP addresses and the positions of the assignable hostaddresses might be different)Case Study Title (Case Study):
1) Name the router:Router> enableRouter# config terminalRouter(config)# hostname Apopka2) Enable-secret password (cisco10):Apopka(config)# enable secret cisco103) Set the console password to RouterPass:Apopka(config)# line console 0Apopka(config-line)# password RouterPassApopka(config-line)# loginApopka(config-line)# exit4) Set the Telnet password to scan90:Apopka(config)# line vty 0 4Apopka(config-line)# password scan90Apopka(config-line)# loginApopka(config-line)# exit5) Configure Ethernet interface (on the right) of router Apopka:The subnet mask of the Ethernet network 126.96.36.199 is 27. From this subnet mask, we can find out theincrement by converting it into binary form, that is /27 = 1111 1111.1111 1111.1111 1111.1110 0000. Paymore attention to the last bit 1 because it tells us the increment, using the formula:Increment = 2place of the last bit 1 (starts counting from 0,from right to left), in this case increment = 25 =32. Therefore:Increment: 32Network address: 188.8.131.52Broadcast address: 184.108.40.206 (because 220.127.116.11 is the second subnetwork, so the previousIP – 18.104.22.168 – is the broadcast address of the first subnet).-> The second assignable host address of this subnetwork is 22.214.171.124/27Assign the second assignable host address to Fa0/0 interface of Apopka router:Apopka(config)# interface Fa0/0Apopka(config-if)# ip address 126.96.36.199 255.255.255.224Apopka(config-if)# no shutdownApopka(config-if)# exit6) Configure Serial interface (on the left) of router Apopka:Using the same method to find out the increment of the Serial network:Serial network 192.0.2.128/28:Increment: 16 (/28 = 1111 1111.1111 1111.1111 1111.1111 0000)Network address: 192.0.2.128 (because 8 * 16 = 128 so 192.0.2.128 is also the network address of thissubnet)Broadcast address: 192.0.2.143-> The last assignable host address in this subnet is 192.0.2.142/28.Assign the last assignable host address to S0/0/0 interface of Apopka router:Apopka(config)# interface S0/0/0 (or use interface S0/0 if not successful)Apopka(config-if)# ip address 192.0.2.142 255.255.255.240Apopka(config-if)# no shutdownApopka(config-if)# exit7) Configure RIP v2 routing protocol:Apopka(config)# router ripApopka(config-router)# version 2Apopka(config-router)# network 188.8.131.52Apopka(config-router)# network 192.0.2.128Apopka(config-router)# endSave the configuration:
Apopka# copy running-config startup-configFinally, you should use the ping command to verify all are working properly!A. The command Apopka(config-line)# login was issued to save the user password in the file password.txtB. The command Apopka(config-line)# login was issued to prompt the user for a password when connectedC. The last assignable host address on the 192.168.0.128/28 network is 192.168.0.143D. The command: Apopka(config-router)# network 192.0.2.128 is equal to the command: Apopka(config-router)# network 192.0.2.0Answer: BDSection: LabSimExplanation/Reference:Visit http://www.9tut.net/icnd1/labsim/ripv2-sim for further explanation.
Exam BQUESTION 1 Q B1What is the subnet broadcast address of the LAN connected to Router1? Click on Exhibit for further information.Exhibit:A. 192.168.136.15B. 192.168.136.31
C. 192.168.136.63D. 192.168.136.127E. 255.255.255.255Answer: ASection: LabSimExplanation/Reference:QUESTION 2 Q B2What is the bandwidth on the WAN interface of Router1? Click on Exhibit for further information.Exhibit:
What interfaces on Router1 have not had any configurations applied? (Choose two) Click on Exhibit for further information.Exhibit:A. Ethernet 0B. FastEthenet 0/0
C. FastEthernet 0/1D. Serial 0E. Serial 0/0F. Serial 0/1Answer: CFSection: LabSimExplanation/Reference:QUESTION 4 Q B4Including the address on the Router1 FastEthernet interface, how many hosts can have IP addresses onthe LAN to which Router1 is connected? Click on Exhibit for further information.Exhibit:
The hosts in the LAN are not able to connect to the Internet.Which commands will correct this issue? Click on Exhibit for further information.Exhibit:A. Router1(conf)# interface fa0/0 Router1(conf-if)# no shutdown
B. Router1(conf)# interface fa0/1 Router1(conf-if)# no shutdownC. Router1(conf)# interface s0/0 Router1(conf-if)# no shutdownD. Router1(conf)# interface s0/1 Router1(conf-if)# no shutdownE. Router1(conf)# interface s0/0 Router1(conf-if)# ip address 10.11.12.13 255.255.255.252F. Router1(conf)# interface s0/1 Routerl(conf-if)# ip address 10.11.12.13 255.255.255.252Answer: CSection: LabSimExplanation/Reference:
Exam CQUESTION 1 Q C1In order to begin communicating with the server, host F sends out an ARP request.How will the devices exhibited in the topology respond to this request?A. Switch West _1 will reply with the MAC address of the server.B. Hosts D and E will respond that the destination is not on the local LAN.C. Router SFX will forward the ARP request to the ILM router.D. Switch West _1 will block the request since the server is not on the LAN.E. The ILM router will respond with the IP address of the WWW server.F. Router SFX will respond with the MAC address of its Fa0/0 interface.Answer: FSection: ARP TestletExplanation/Reference:Because the server WWW is on another LAN of host F, host F knows that it has to send its packets to thedefault gateway.Therefore, for the first time, it will send out an ARP broadcast message asking for the MAC address ofrouter SFX.Router SFX receives this message and replies with the MAC address of Fa0/0 interface.Later, when host F wants to send packets to WWW server, it will include the IP address of WWW serverand the MAC address of Fa0/0 interface of SFX router in the “destination IP address” and “destinationMAC address” fields, respectively.QUESTION 2 Q C2
The ARP reply has been received by host F, which needs to build the packet.What information will be placed in the header of the packet that leaves host F if host F is to communicatewith the WWW server? (Choose two)A. The destination address will be the IP address of interface Fa0/0 of the ILM router.B. The destination address will be the IP address of the WWW server.C. The destination address will be the IP address of interface Fa0/0 of router SFX.D. The source address will be the IP address of host F.E. The source address will be the IP address of interface Fa0/0 of router SFX.F. The destination address will be the IP address of interface Fa0/0 of router SFX.Answer: BDSection: ARP TestletExplanation/Reference:After receiving ARP reply from SFX router, host F will place these fields in the header of the packets: Source addresses: the IP address of host F and the MAC address of host F Destination addresses: the IP address of WWW server and the MAC address of SFX routerQUESTION 3 Q C3
The frame has been received by the ILM router and is to be delivered on the local LAN.Which two statements describe the addressing of the Ethernet frame that has been created by the ILMrouter? (Choose two)A. The destination address will the be the MAC address of the switch A port attached to the Fa0/0 interface of the ILM router .B. The destination address will be the MAC address of the WWW server.C. The destination address will be the MAC address of the A switch port attached to the WWW server.D. The source address will be the MAC address of host F.E. The source address will be the MAC address of interface Fa0/0 of the ILM router.Answer: BESection: ARP TestletExplanation/Reference:QUESTION 4 Q C4Host F is displaying two World Wide Web documents from the WWW server in two browser windows at thesame time.How did the data find its way to the correct browser windows?
A. The IP source addresses of the packets will be used to direct the data to the correct browser window.B. The browsers track the data by the URL.C. TCP port numbers are used to direct the data to the correct application window.D. The OSI application layer tracks the conversations and directs them to the correct browser.Answer: CSection: ARP TestletExplanation/Reference:TCP and UDP protocol port numbers are designed to distinguish multiple applications running on a singledevice from one another.In the TCP and UDP header, there are “Source Port” and “Destination Port” fields which are used toindicate the message sending process and receiving process identities defined.The combination of the IP address and the port number is called “socket”.
Exam DQUESTION 1 Q D1On which router should a default route be configured?A. on the ISP routerB. on R1C. on R2D. on R3Answer: BSection: HotspotExplanation/Reference:QUESTION 2 Q D2
With all links operational and all routers converged, which of the following describes the messagingbetween routers?A. Hellos are sent every five seconds.B. Multicasts are sent every 60 seconds.C. Broadcasts are sent every 30 seconds.D. No messaging unless the topology changes.Answer: CSection: HotspotExplanation/Reference:QUESTION 3 Q D3
Which of the following describes the route update process if the interface from R4 connected to LAN 4goes down?A. No updates occurB. R4 tells both R1 and R3 the network not accessible. Both R3 and R1 update R2.C. R4 tells only R1 the network is not accessible. R1 updates R2 and R2 updates R3.D. R4 tells only R3 the network is not accessible. R3 updates R2 and R2 updates R1.Answer: BSection: HotspotExplanation/Reference:QUESTION 4 Q D4
Why would RIP be used rather than static routes on R1, R2, R3, and R4?A. RIP creates more accurate than static routes.B. RIP uses less network resources than do static routes.C. RIP is supported by more different vendors equipment than static routes.D. RIP requires less configuration to automatically adjust when links go down than static routes.Answer: DSection: HotspotExplanation/Reference:QUESTION 5 Q D5
On which router should a static route be configured?A. on the ISP routerB. on R1C. on R2D. on R3E. on R4Answer: ASection: HotspotExplanation/Reference:Usually, a static route would be needed on the router which is connected to the ISP router to route to theInternet.The ISP router only needs a static route to reach the LANs network.
Exam EQUESTION 1 Q E1The junior network support staff provided the diagram as a recommended configuration for the first phaseof a four-phase network expansion project.The entire network expansion will have over 1000 users on 14 network segments and has been allocatedthis IP address space:192.168.1.1 through 192.168.5.255192.168.100.1 through 184.108.40.206What are three problems with this design? (Choose three)A. The AREA 1 IP address space is inadequate for the number of users.B. The AREA 3 IP address space is inadequate for the number of users.C. AREA 2 could use a mask of /25 to conserve IP address space.D. The network address space that is provided requires a single network-wide mask.E. The router-to-router connection is wasting address space.F. The broadcast domain in AREA 1 is too large for IP to function.Answer: ACESection: OperationsExplanation/Reference:
QUESTION 2 Q E2A technician is testing connection problems in the internetwork.What is the problem indicated by the output from HostA?A. The routing on Router2 is not functioning properly.B. An access list is applied to an interface of Router3.C. The Fa0/24 interface of Switch1 is down.D. The gateway address of HostA is incorrect or not configured.Answer: DSection: OperationsExplanation/Reference:When trying to ping the IP 192.168.3.254, you received the replies from that IP.It means that you can reach the Fa0/0 interface of Router1.But notice that the IP of host A (192.168.3.1/24) and the IP of the Fa0/0 interface of Router 1(192.168.3.254/24) are on the same network.So you don’t need a gateway address configured on HostA.Therefore you can’t conclude the gateway address of HostA was configured correctly.Lately, you tried to use the tracert command to reach another network (192.168.4.7).In this case, a gateway address was required for reaching the network of hostB.But the result told that “Destination host unreachable” – means that Host A can not find a route to Host B-> The gateway address of Host A was incorrect (something other than 192.168.3.254) or not configured isa possibility.A and B are incorrect because if there is a mis-configuration on Router 2 or Router 3 (while Router 1 is
configurated correctly), you will see at least one successful line when using tracert command likes the boldline below: PC> tracert 192.168.4.7 Tracing route to 192.168.4.7 over a maximum of 30 hops: 1 62 ms 62 ms 46 ms 192.168.3.254 2 * * * Request timed out.C is incorrect because we can ping Router 1 -> port Fa0/24 on Switch 1 was turned on and runningcorrectly.QUESTION 3 Q E3The internetwork is using subnets of the address 192.168.1.0 with a subset mask of 255.255.255.224.The routing protocol in use is RIP version 1.Which address could be assigned to the FastEthernet interface on RouterA?A. 192.168.1.31B. 192.168.1.64C. 192.168.1.127D. 192.168.1.190E. 192.168.1.192Answer: DSection: OperationsExplanation/Reference:255.255.255.224 = 1111 1111.1111 1111.1111 1111.1110 0000 (binary form)Increment: 32 First subnetwork: 192.168.1.0 -> 192.168.1.31 (A is incorrect because 192.168.1.31 is a broadcast address) Second subnetwork: 192.168.1.32 -> 192.168.1.63 Third subnetwork: 192.168.1.64 -> 192.168.1.95 (B is incorrect because 192.168.1.64 is a network address) Fourth subnetwork: 192.168.1.96 -> 192.168.1.127 (C is incorrect because 192.168.1.127 is a
broadcast address) Fifth subnetwork: 192.168.1.128 -> 192.168.1.159 Sixth subnetwork: 192.168.1.160 -> 192.168.1.191 (D is correct because 192.168.1.190 is the last assignable host address of this subnetwork) Seventh subnetwork: 192.168.1.192 -> 192.168.1.224 (E is incorrect because 192.168.1.192 is a network address)QUESTION 4 Q E4For security reasons, information about RTA, including platform and IP addresses, should not beaccessible from the Internet.This information should, however, be accessible to devices on the internal networks of RTA.Which command or series of commands will accomplish these objectives?A. RTA(config)# no cdp runB. RTA(config)# no cdp enableC. RTA(config)# interface s0/0 RTA(config-if)# no cdp runD. RTA(config)# interface s0/0 RTA(config-if)# no cdp enableAnswer: DSection: OperationsExplanation/Reference:QUESTION 5 Q E5
What three things will CORE router do with the data that is received from PC1? (Choose three)A. The data frames will be forwarded out interface FastEthernet0/1 of CORE router.B. The data frames will be forwarded out interface FastEthernet1/0 of CORE router.C. CORE router will replace the destination IP address of the packets with the IP address of PC2.D. CORE router will place the MAC address of PC2 in the destination MAC address of the frames.E. CORE router will put the IP address of the forwarding FastEthernet interface in the place of the source IP address in the packets.F. CORE router will put the MAC address of the forwarding FastEthernet interface in the place of the source MAC address.Answer: BDFSection: OperationsExplanation/Reference:
Exam FQUESTION 1 Q F1The goal of this network design is to provide the most efficient use of IP address space in a networkexpansion.Each circle defines a network segment and the number of users required on that segment.An IP subnetwork number and default gateway address are shown for each segment.What are three problems with the network design as shown? (Choose three)A. Interface fa0/3 has an IP address that overlaps with network 10.1.3.0/30.B. Interface fa0/1 has an invalid IP address for the subnet on which it resides.C. Interface fa0/2 has an invalid IP address for the subnet on which it resides.D. Network 10.1.2.0/25 requires more user address space.E. Network 10.1.3.128/25 requires more user address space.F. The IP subnet 10.1.1.0/30 is invalid for a segment with a single server.Answer: ABDSection: Subnetting
Explanation/Reference:QUESTION 2 Q F2If an ethernet port on a router was assigned an IP address of 172.16.112.1/20, what is the maximumnumber of hosts allowed on this subnet?A. 1024B. 2046C. 4094D. 4096E. 8190Answer: CSection: SubnettingExplanation/Reference:QUESTION 3 Q F3The internetwork is using subnets of the address 192.168.1.0 with a subnet mask of 255.255.255.224.The routing protocol in use is RIP version 2.Which address could be assigned to the FastEthernet interface on RouterA?A. 192.168.1.31B. 192.168.1.64C. 192.168.1.127D. 192.168.1.190
E. 192.168.1.192Answer: DSection: SubnettingExplanation/Reference:QUESTION 4 Q F4HostA cannot ping HostB.Assuming routing is properly configured, what could be the cause of this problem?A. HostA is not on the same subnet as its default gateway.B. The address of SwitchA is a subnet address.C. The Fa0/0 interface on RouterA is on a subnet that can’t be used.D. The serial interfaces of the routers are not on the same subnet.E. The Fa0/0 interface on RouterB is using a broadcast address.Answer: DSection: SubnettingExplanation/Reference:
Section: Drag & Drop questionsExplanation/Reference:QUESTION 4 Q G4Answer:Section: Drag & Drop questionsExplanation/Reference:First please notice that by saying “replace” we often mean changes to NVRAM and TFTP while saying“merge” or “add” we mean changes to RAM.Next we should review the syntax of “copy” command:Syntax: copy <source> <base config filename> <destination> <destination filename.txt>1. By default, the flash memory in a router is used to store the Cisco IOS image so the requirement “ replace the IOS image” means that moving file somewhere to the flash memory. In the left columns we only have one choice which has the flash as the destination ->copy tftp flash.2. Same explanation as above, when saying “backup the current IOS image” the flash takes the role as the source ->copy flash tftp.
And “backup” means we should copy it to somewhere like tftp server, CDROM… 3. The running-config is stored in the RAM so “make a backup copy of configuration in RAM” means copy running configuration from RAM to backup server (tftp) -> copy running-config tftp 4. “copy running-config startup-config” is a very common command so no more explanation needed. 5. After solving 4 boxes above, we only have two choices left: “copy tftp running-config” & “copy flash running-config”. The bottom-right box says “merge a backup configuration” so it should be the tftp server and the command here is copy tftp running-config.Q#5 : As a CCNA candidate, you should master the functions of various commands. Look at thefollowing items, some commands are listed on the left. The related roles are listed on the right in awrong sequence. Please match them together. (Not all options are used)Answer:1) Router#copy tftp flash: replace the IOS image2) Router#copy flash tftp: backup the current IOS image3) Router#copy running-config tftp: make a backup copy of configuration in RAM4) Router#copy running-config startup-config: make the configuration in RAM the configuration therouter will use on startup5) Router#copy tftp running-config: merge a backup configuration with the configuration in RAMExplanationFirst please notice that by saying “replace” we often mean changes to NVRAM and TFTP while saying“merge” or “add” we mean changes to RAM. Next we should review the syntax of “copy” command:Syntax: copy <source> <base config filename> <destination> <destination filename.txt>1) By default, the flash memory in a router is used to store the Cisco IOS image so the requirement“replace the IOS image” means that moving file somewhere to the flash memory. In the left columns weonly have one choice which has the flash as the destination ->copy tftp flash.2) Same explanation as above, when saying “backup the current IOS image” the flash takes the role asthe source ->copy flash tftp. And “backup” means we should copy it to somewhere like tftp server,CDROM…3) The running-config is stored in the RAM so “make a backup copy of configuration in RAM” means copyrunning configuration from RAM so backup server (tftp) -> copy running-config tftp
4) “copy running-config startup-config” is a very common command so no more explanation needed.5) After solving 4 boxes above, we only have two choices left: “copy tftp running-config” & “copy flashrunning-config”. The bottom-right box says “merge a backup configuration” so it should be the tftpserver and the command here is copy tftp running-config.
Exam H QUESTION 1 Q H1 Which wireless LAN design ensures that a mobile wireless user will not lose connectivity when moving from one access point to another on the WLAN? A. Utilizing MAC address filtering to allow the client MAC address to authenticate with the surrounding APs B. Using adapters and access points manufactured by the same company C. Overlapping the wireless cell coverage by at least 10% D. Configuring all access points to use the same channel Answer: C Section: Wireless Questions Explanation/Reference: By using more than one Access Point (AP) we can create overlapping cells to allow roaming in a larger area. But we have to ensure that two APs must have at least 10% coverage overlap and they use non- overlapping channels. QUESTION 2 Q H2 You need to troubleshoot an interference issue with the wireless LAN. Which two devices can interfere with the operation of this network because they operate on similar frequencies? (Choose two) A. Microwave oven B. AM radio C. Toaster D. Copier E. Cordless phone F. IP phoneG. Ipod Formatted Version By: S Qaisar Shah. Answer: AE Section: Wireless Questions Explanation/Reference: Microwave oven and cordless phone radiate energy in the 2.4 GHz unlicensed band so they can interfere
with some WLAN standards.As the result of that, you can’t hear clearly on the phone or can’t surf web.QUESTION 3 Q H3Which of the following data network would you implement if you wanted a wireless network that had arelatively high data rate, but was limited to very short distances?A. Broadband personal comm. Service (PCS)B. Broadband circuitC. InfraredD. Spread spectrumE. CableAnswer: CSection: Wireless QuestionsExplanation/Reference:Infrared typically requires a line-of-sight (your TV remote control, for example) which means that it is limitedto very short distances.I am not sure if it is considered “relative high data rate” but infrared can transfer up to 4Mpbs.QUESTION 4 Q H4You need to add a wireless access point to a new office.Which additional configuration step is necessary in order to connect to an access point that has SSIDbroadcasting disabled?A. Configure open authentication on the AP and the clientB. Set the SSID value in the client software to publicC. Set the SSID value on the client to the SSID configured on the APD. Configure MAC address filtering to permit the client to connect to the APAnswer: CSection: Wireless QuestionsExplanation/Reference:Service Set Identifier (SSID) is the term to identify a WLAN. In most cases SSID is broadcast by the AP,the user only needs to select that SSID and provides a correct password to access it.But in some cases for security reason, the SSID can be disabled.Users can only access to that network if they type both SSID and password correctly.
QUESTION 5 Q H5You need to secure a new access point on the a wireless network.Which two practices help secure the configuration utilities on wireless access points from unauthorizedaccess? (Choose two)A. Changing the default SSID valueB. Configuring traffic filteringC. Changing the mixed mode setting to single modeD. Configuring a new administrator passwordE. Assigning a private IP address to the APAnswer: ADSection: Wireless QuestionsExplanation/Reference:To improve security, you should change the default SSID value on your AP.For example, Linksys routers (which are produced by Cisco) typically have an SSID of “linksys” -> A iscorrect.In an AP we can configure traffic filtering but it is mainly used for filtering which services clients can use, IPranges, ports, websites, time access…It has no effect on securing your AP -> B is not correct.“Mixed mode” here means we can configure AP to allow clients to use different standard like 802.11b, g orn.But setting it to single mode doesn’t have any security protection on it -> C is not correct.We should also change the administrator password because everyone can access to the admin page of anAP by open a web browser and type the IP address of that AP (for example: http://192.168.1.1).Typically, Linksys Wireless routers have a default username/password of “admin/admin” or “admin/[blank]”which are easily guessed or found out -> D is correct.We can access the AP by using a private IP address (in the same private network of the AP – 192.168.1.1,for example) -> E is not correct.QUESTION 6 Q H6You need to determine the proper security settings on a new WLAN-capable office.Which encryption type would WPA2 use in this office?A. PSKB. AES-CCMP
C. PPK via IVD. TKIP/MICE. None of the other alternatives applyAnswer: BSection: Wireless QuestionsExplanation/Reference:Advanced Encryption Standard (AES) is the cipher system used by RSN.It is the equivalent of the RC4 algorithm used by WPA.However the encryption mechanism is much more complex and does not suffer from the problemsassociated with WEP. AES is a block cipher, operating on blocks of data 128bits long.CCMP is the security protocol used by AES.It is the equivalent of TKIP in WPA.CCMP computes a Message Integrity Check (MIC) using the well known, and proven, Cipher BlockChaining Message Authentication Code (CBC-MAC) method.Changing even one bit in a message produces a totally different result.The AES-CCMP encryption algorithm used in the 802.11i (WPA2) security protocol.It uses the AES block cipher, but restricts the key length to 128 bits.AES-CCMP incorporates two sophisticated cryptographic techniques (counter mode and CBC-MAC) andadapts them to Ethernet frames to provide a robust security protocol between the mobile client and theaccess point.QUESTION 7 Q H7What is one reason why WPA encryption is preferred over WEP in this network?A. The WPA key values remain the same until the client configuration is changed.B. The values of WPA keys can change dynamically while the system is used.C. The access point and the client are manually configured with different WPA key values.D. A WPA key is longer and requires more special characters than the WEP key.E. None of the other alternatives applyAnswer: BSection: Wireless QuestionsExplanation/Reference:Wireless Encryption Protocol (WEP) uses RC4 encryption and a static 64-bit key so it can be easily brokenas only 40-bits are encrypted and 24 bits are clear-text IV(Initialization Vector).It was later upgraded to 128-bit, but the IV was still clear text meaning it took slightly longer (minutes) tobreak-in.WPA was introduced in 2003 as a replacement for WEP.WPA uses Temporal Key Integrity Protocol (TKIP) to automatically change the keys.TKIP still uses RC4; it just improves how it’s done.
QUESTION 8 Q H8 In an effort to increase security within the wireless network, WPA is being utilized. Which two statements shown below best describe the wireless security standard that is defined by WPA? ( Choose two) A. It requires use of an open authentication method B. It specifies use of a static encryption key that must be changed frequently to enhance security C. It includes authentication by PSK D. It specifies the use of dynamic encryption keys that change each time a client establishes a connection E. It requires that all access points and wireless devices use the same encryption key F. WPA works only with Cisco access pointsAnswer: CD Formatted Version By: S Qaisar Shah. Section: Wireless Questions Explanation/Reference: QUESTION 9 Q H9 You need to configure a new wireless access point for your network. What are three basic parameters to configure an AP? (Choose three) A. Authentication method B. RTS/CTS C. RF channel D. SSID Answer: ACD Section: Wireless Questions Explanation/Reference:
QUESTION 10 Q H10You have finished physically installing an access point on the ceiling at a newly opened office.At a minimum, which parameter must you configure on the access point in order to allow wireless clients tooperate on it?A. SSIDB. AESC. TKIPD. PSKE. None of the other alternatives applyAnswer: ASection: Wireless QuestionsExplanation/Reference:QUESTION 11 Q H11
What two facts can be determined from the diagram of the WLAN shown above? (Choose two)A. Access points in each cell must be configured to use channel 1B. The network diagram represents an extended service set (ESS)C. The two APs should be configured to operate on different channelsD. The area of overlap of the two cells represents a basic service set (BSS)E. The area of overlap must be less than 10% of the area to ensure connectivityF. There are too many hosts on this WLANAnswer: BCSection: Wireless QuestionsExplanation/Reference:QUESTION 12 Q H12A single 802.11g access point has been configured and installed in the center of a square shaped office.A few wireless users are experiencing slow performance and drops while most users are operating at peakefficiency.From the list below, what are three likely causes of this problem? (Choose three)A. Null SSID
B. Mismatched TKIP encryptionC. Cordless phonesD. Antenna type or directionE. Mismatched SSIDF. Metal file cabinetsAnswer: CDFSection: Wireless QuestionsExplanation/Reference:802.11g operates in 2.4 GHz ISM band. Some popular devices and technologies can interfere 802.11gsignal: Newer cordless phones Bluetooth Microwaves Metal surface (can cause interference) Antenna (can reduce wireless signal)QUESTION 13 Q H13Three access points have been installed and configured to cover a small remote office.What term defines the wireless topology?A. SSIDB. BSSC. ESSD. IBSSE. ASSAnswer: CSection: Wireless QuestionsExplanation/Reference:QUESTION 14 Q H14Two workers have established wireless communication directly between their wireless laptops.What type of wireless topology has been created by these employees?
A. ESSB. IBSSC. SSIDD. BSSAnswer: BSection: Wireless QuestionsExplanation/Reference:Independent Basic Service Set – IBSS (ad hoc mode) does not use an AP.It allows two devices to communicate directly.Basic Service Set (BSS) is a single wireless LAN created with an AP and all devices that associate withthat AP.Extended Service Set (ESS) consists of multiple APs, allowing roaming in a larger coverage area.QUESTION 15 Q H15802.1b is being utilized in the wireless network.Which spread spectrum technology does the 802.1b standard define for operation in this network?A. FHSSB. IRC. DSSS and FHSSD. DSSSE. IR, FHSS and DSSSAnswer: DSection: Wireless QuestionsExplanation/Reference:Frequency Hopping Spread Spectrum (FHSS) uses all frequencies in the band, hopping to different ones.By using slightly different frequencies for consecutive transmissions, a device can hopefully avoidinterference from other devices that use the same unlicensed band, succeeding at sending data at somefrequencies.Direct Sequence Spread Spectrum (DSSS) followed as the next general class of encoding type for WLANs.Designed for use in the 2.4 GHz unlicensed band, DSSS uses one of several separate channels orfrequencies.The original 802.11 WLAN standards used FHSS, but the current standards (802.11a, 802.11b, and802.11g) do not.802.1b uses DSSS while 802.1a & 802.1g use Orthogonal Frequency Division Multiplexing (OFDM).
(Reference: ICND1 Official Exam Certification Guide)QUESTION 16 Q H16Which IEEE standard is used to define Wi-Fi?A. IEEE 802.3B. IEEE 802.5C. IEEE 802.11hD. IEEE 802.11cE. IEEE 802.11Answer: ESection: Wireless QuestionsExplanation/Reference:QUESTION 17 Q H17An office is using an IEEE 802.11b wireless LAN.What is the maximum data rate specified for this WLAN?A. 11 mbpsB. 100 mbpsC. 54 mbpsD. 10 mbpsE. 1000 mbps Formatted Version By: S Qaisar Shah.F. 16 mbpsAnswer: ASection: Wireless QuestionsExplanation/Reference:The maximum data rate for popular WLAN standards are listed below: IEEE 802.11a: 54 Mbps in the 5.7 GHz ISM band IEEE 802.11b: 11 Mbps in the 2.4 GHz ISM band IEEE 802.11g: 54 Mbps in the 2.4 GHz ISM band