1 Which PPP authentication methods can you use when configuring PPP ?
(Select two options.)
A. SSL
B. SLIP
C. PAP
D. LAPB
E. CHAP
F. VNP
2 What are the benefits of using a router to segment the network at a main office? (Select two options.)
A. Broadcasts are not forwarded across the router.
B. Broadcasts are eradicated.
C. Adding a router to the network decreases latency.
D. Filtering can occur based on Layer 3 information.
E. Routers are more efficient than switches.
3 You are a network administrator. You must configure a new subnetwork at the branch office. You have been provided with the subnet mask of 255.255.255.224. You want to assign IP addresses to hosts on the subnet.
Which of the following IP addresses would you use? (Choose 3 answers.)
A. 16.23.118.63
B. 87.45.16.159
C. 92.11.178.93
D. 134.178.18.56
E. 192.168.16.87
F. 217.168.166.192
4 What are the characteristic of link state routing protocols? (Choose 3 answers.)
A. The exchange of advertisement is triggered by a change in the network.
B. All routers exchange routing tables with each other in a multipoint network.
C. Packets are routed based upon the shortest path to the destination.
D. Paths are chosen depending on the cost efficiency factor.
E. Every router in an OSPF area is capable of representing the entire network topology.
F. Only the designated router in an OSPF area can represent the entire network topology.
5 Which of the following are typical Layer 2 encapsulations for a WAN link? (Choose 3 answers.)
A. Ethernet
B. PPP
C. Token Ring
D. HDLC
E. Frame Relay
F. POTS
6 what are the basics of distance vector and link state routing protocols?
(Choose 2 answers.)
A. Distance vector protocols send the entire routing table to directly connected neighbors.
B. Distance vector protocols are responsible for sending updates to all networks listed in the routing table.
C. Link state protocols are responsible for sending the entire routing table to the whole network.
D. Link state protocols send updates regarding their own links status to all other routers on the network.
7 Which of the following statements is true regarding the split horizon rule?
A. Distance vector protocols need fall back routes that are responsible for momentary loops.
B. Networks can only remain fully operational provided all information is sent out all active interfaces.
C. Each AS must keep routing tables converged to avoid dead routes from being advertised.
D. Information about a route should not be sent back in the direction from which the original update came.
E. Only routers can split boundaries (horizons) between concentric networks.
8 You have subnetted the 213.105.72.0 network with a /28 mask. How many usable subnetworks and usable host addresses per subnet will be provided?
A. 2 networks with 62 hosts
B. 6 networks with 30 hosts
C. 16 networks and 16 hosts
D. 62 networks and 2 hosts
E. 14 networks and 14 hosts
9 What could you use to prevent rooting loops in the network when configuring the network using a distance vector routing protocol? (Choose 2 answers.)
A. Spanning Tree Protocol
B. Shortest path first tree
C. Link-state advertisements (LSA)
D. Hold-down timers
E. Split horizon
F. VRP
10 Which of the following statements are characteristic of a typical VLAN arrangement? (choose 3 answers.)
A. VLANs logically divide a switch into multiple, independent switches at Layer 2.
B. Trunk links can carry traffic for multiple VLANs.
C. VLAN implementation significantly increases traffic due to adding trunking information.
D. A VLAN can span multiple switches.
E. VLANs extend the collision domain to include multiple switches.
11 In which two types of OSPF networks does a Designated Router (DR) election take place? (Choose two)
A. Point-to-point
B. Nonbroadcast multi-access
C. Point-to-multipoint
D. Broadcast multi-access
12 What are the three general address types of IPv6? (Choose three)
A. Private
B. Unicast
C. Broadcast
D. Public
E. Multicast
F. Anycast
13 Which information is found in an OSPF type 3, network summary link LSA?
A. Summary of routes in the AS.
B. Summary of link state sin an OSPF area.
C. Summary of IP subnets in an OSPF area.
D. Summary of metric coast from ABR to ASBR.
14 Which statements are true regarding on OSPF link state database? (Choose three)
A. Each router has an identical link state database.
B. External routes are imported into a separate link state database.
C. Synchronization of link state databases is maintained via flooding of LSAs.
D. Information in the link state database is used to build a routing table by calculating a shortest-path tree.
E. Link state databases are refreshed every 10 minutes in the absence of topology changes.
15 Which two of the Spanning Tree protocol (STP) states are affected by the forward delay parameter?
A. Blocking
B. Listening
C. Disabled
D. Forwarding
E. Learning
16 Which statement describes Virtual Router Redundancy Protocol (VRRP)?
A. A VRRP group has one master and at least one standby virtual router.
B. A VRRP group has one master and one more backup virtual routers.
C. A VRRP group has one active and one more standby virtual routers.
D. A VRRP group has one active and one backup virtual router.
17 How does a non-Root switch choose its Root Port?
A. It chooses the port with the lowest cumulative Path Cost to the Root Bridge.
B. It chooses the port with the highest cumulative Path Cost to the Root Bridge.
C. The port receives an inferior BPDU from a neighboring switch on a shard LAN segment.
D. The port receives a BPDU announcing a higher Root Path Cost from a neighboring switch on a shared
LAN segment.
18 Which well-defined routing protocol would a network administrator configure on multicast routes when member routes are widely dispersed?
A. Distance Vector Multicast Routing Protocol (DVMRP)
B. Protocol Independent Multicast Dense Mode (PIM-DM)
C. Multicast Open Shortest Path First (MOSPF)
D. Protocol Independent Multicast Sparse Mode (PIM-SM)
E. Core-Based Trees (CBT)
19 TACACS+ uses which of the following protocols to communicate?
A. UDP
B. CDP
C. TCP
D. DES
20 Which WAN connections are typically employed at telecommuter sites? (Choose three)
A. Asynchronous dial-up
B. ISDN BRI
C. Leased lines
D. HDSL
E. Cable modems
F. ADSL
21 Which three are responsible of IKE in the IPSec protocol? (Choose three)
A. Negotiating protocol parameters
B. Packet encryption
C. Exchanging public keys
D. Integrity checking user hashes
E. Authenticating both sides of a connection
F. Implementing tunnel mode
22 Which two statements about Frame Relay subinterface configurations are true?
A. Any IP address must be removed from the physical interface.
B. Subinterface is configured either multipoint or point-to-point.
C. The physical interface and subinterface can each be configured with IP addresses.
D. The configuration must be added to the D channel.
23.What are the benefits of replacing a hub with a bridge and segmenting the network?
A. It increases the number of collision domains.
B. It decreases the number of collision domains.
C. It increases the number of broadcast domains.
D. It decreases the number of broadcast domains.
24 What are three characteristics of a Autonomous System (AS) in a BGP network? (Choose three)
A. Within an AS, all routers must run either BGP or IBGP.
B. An AS uses exterior gateway protocols (EGPs) to exchange information with other autonomous systems.
C. An AS is a group of routers under the same technical administration.
D. Within an AS, routes learned through BGP can be redistributed using interior gateway protocols.
E. Within an AS, routers learned through an interior protocol cannot be redistributed using BGP to otherautonomous systems.