CCNA discovery 4 final exam v4.0 (December 2009)

Refer to the exhibit. A pre-sales system engineer receives a diagram of the
current network WAN connectivity from a customer. EIGRP is the routing protocol
used on the WAN. Based on the default operation of EIGRP, which statement is true
about the routing table on router R1?
There is a single route to the LAN via the use of the T1
There is a single route to the LAN via the use of the DSL
There is a single route to the LAN via the use of the Metro
Ethernet connection.*****

EIGRP installs all three routes to the LAN and load balances the
A new host needs to be connected to VLAN 1. Router RA is attached to the VTP trunk
and configured as shown in the output contained in the graphic. Which of the
following IP addresses should be assigned to this new host? /26 /28 /28**** /28 /28 /28


Refer to the exhibit. A NetworkingCompany designer is reviewing a diagram of a
customer network. What two risks or issues can be identified in the topology that
is shown? (Choose two.)
The firewall router and ISP connection represent a single point of failure.****
A failure of the switch that connects the Cisco Call Manager to the network will
cause the entire IP telephony system to fail.****

Using Layer 3 switches to interconnect the data center servers to the IP phones
introduces too much delay.
The IP phones need to be redundantly connected to the switches to prevent single
points of failure at the access layer.
If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable.
An engineer who is part of a sales team has been asked to select technologies and
equipment capabilities to meet the network requirements of the prospective client.
The engineer is also responsible for diagramming the placement and interconnection
of various network devices and services. Which role is this engineer performing?
post-sales field engineer
account manager
pre-sales engineer****
network designer

Refer to the exhibit. Two network engineers are setting up a prototype network to
test a new Frame Relay network design. One of the engineers connects the cables
and powers up all of the devices per the test plan. The second engineer uses a
console cable to connect to the BR1 router, configures the Frame Relay connection
and issues a show interfaces serial 2/0 command. What does the output of this
command indicate to the engineers?
A no shutdown command must be entered on the interface.
The IP address has not yet been configured on the interface.
The WAN encapsulation method is incorrect on the interface.
The cable that connects BR1 to FR2 may not be correct or is not connected

After an administrator installs a WIC into a two-slot router and issues the show
version command, the newly installed interfaces in the WIC cannot be seen in the
router output. What is a possible reason why the newly installed interfaces are
not displayed in the router output?
The interface is not configured properly.
The WIC was put into slot 0 instead of slot 1.
The WIC was not physically installed in the slot properly.
The show version command cannot be used to validate the presence of installed
Refer to the exhibit. What can be concluded from the output that is shown?
MDF_2811 has a MAC address of 2294:300F:0000.
A Cisco 3750 switch is connected to the FastEthernet1/0/1 port on MDF_2811.
MDF_2811 is installed in the main distribution facility on floor 28 of building

Device 3750-24_IDF2 is running Cisco IOS Software Release 12.2(25)SEE2.***

Refer to the exhibit. A network technician is performing an initial installation
of a new switch in the east wing. The technician removes the switch from the box,
connects the switch to a router that supports the network, and
adds the configuration that is shown. The technician notifies the network
administrator that the switch has been installed. The network administrator then
attempts to telnet to the switch from host to complete the switch
configuration. What are the results of this attempt to telnet?
The switch refuses the connection.
The connection to the switch times out.
The network administrator is prompted to login.****
The connection is established at the user EXEC prompt.
A NetworkingCompany customer is interested in creating an e-commerce business,
which includes a network upgrade and the addition of a new server farm. By
offering their products on the web, the company expects to increase revenue and
reduce wait times to process orders. The network designer proposes to implement
the server farm in a new data center and to add a new T1 circuit to handle the
expected traffic. What are two business goals of the NetworkingCompany customer?
(Choose two.)
install a new T1 circuit
increase revenue***
implement a new server farm
reduce wait times to process orders***
install a new data center
10.JPG (19.7 KiB) Viewed 1274 times
Refer to the exhibit. To demonstrate the importance of using contiguous IP
addressing in a hierarchical network design, a network designer configures a
prototype network with the use of a network simulator. Which EIGRP configuration
commands should the designer enter on router R1 to correctly advertise a single
summary route to router BR1 for the campus LAN?

What makes the Cisco EasyVPN application a useful tool for VPN implementation?
It provides encryption algorithms unavailable in other systems.
It ensures that remote workers actually use the VPN for connectivity.
It simplifies the configuration tasks for the device that is used as the VPN
It allows a greater variety of network devices to be used for VPN connections.
A local car dealership recently purchased an automobile financing company. The
owner of the dealership issues a contract to NetworkingCompany to integrate the
finance company network into the car dealership network. A router in the existing
finance company network requires a password for both Telnet and console access,
but no one remembers the passwords. What can the NetworkingCompany network
technician do to obtain or change the passwords and gain access to the router?
Use a TFTP server to download a new configuration file to the router that contains
the passwords used on the car dealership network and then reload the router.
Connect a rollover cable to the serial0/0 port of the router in order to bypass
the password security, and use the show running-config command to obtain the
Connect a console cable to the router, power cycle the router, issue a Ctrl-Break
to enter ROM monitor mode, and change the configuration register to bypass the
startup configuration.***
Connect the router to another Cisco router at the car dealership, use the show cdp
neighbors command to obtain an IP address of the router, and use SSH to gain
secure access in order to view the passwords.
A network administrator is troubleshooting connectivity problems on a small IPv6
network that consists of two network segments that are connected by a single
router. The administrator can ping the IP addresses of local hosts on each segment
from the router. Hosts on one network segment cannot successfully ping the IP
addresses of hosts on the other network segment. What is the most likely cause of
the connectivity problem between the segments?
incorrect VLAN assignments on each segment
broadcast storm that is caused by a malfunctioning NIC on a host
incorrect DNS mappings of host names to IPv6 addresses
IPv6 traffic forwarding not configured on the router***
At the distribution layer of a hierarchical network, what are two advantages of
using Layer 3 devices instead of Layer 2 switches? (Choose two.)
enables the creation of large multisite VLANs
creates fewer IP subnets to configure and manage
reduces the number of redundant links required
reduces the complexity of STP configurations***
enables traffic filtering based on subnet addresses***

A NetworkingCompany engineer is on a support call resolving technical problems for
a client network. After the issue is resolved, the engineer also provides a
training session for the client's network support staff. Which position on the
networking company team is this engineer performing?
post-sales field engineer***
pre-sales engineer
network designer
account manager
What is the main purpose of the access layer in a hierarchically designed network?
perform routing and packet manipulation
supply redundancy and failover protection
provide a high-speed, low-latency backbone
serve as a network connection point for end-user devices***
A router has been removed from the network for maintenance. A new Cisco IOS
software image has been successfully downloaded to a server and copied into the
flash of the router. What should be done before placing the router back into
Back up the new image.
Copy the running configuration to NVRAM.
Delete the previous version of the Cisco IOS software from flash.
Restart the router and verify that the new image starts successfully.***
A NetworkingCompany customer requires VPN connectivity for workers who must travel
frequently. To support the VPN server, the customer router must be upgraded to a
new Cisco IOS software version with the Advanced IP Services feature set. What
should the field engineer do before copying the new IOS to the router?
Set the router to load the new IOS image file directly from the TFTP server on the
next reboot.
Delete the currently installed IOS by using the erase flash: command, and reload
the router
Issue the show running-configuration command to determine the features of the
currently installed IOS image file.
Issue the show version and the show flash commands to ensure that the router has
enough memory and file space to support the new IOS image.***
The main office of a NetworkingCompany customer currently connects to three branch
offices via three separate point-to-point T1 circuits. The customer network uses
RIPv2 as the routing protocol within both the LAN and the WAN. The account manager
proposes a change to a Frame Relay network because the costs are lower. A single
local loop connection can be installed at the main office with three separate PVCs
to connect the branch offices. How can the main office edge router be configured
to enable the customer to continue to use RIP as the WAN routing protocol?
Enable Inverse ARP on the serial interface in order to learn the routes to the IP
addresses of the remote routers.
To prevent the Frame Relay network from causing a routing loop, disable split
horizon on the serial interface.
Create three separate point-to-point subinterfaces on the serial interface and
assign a different subnet IP address to each one.***
Configure the serial interface with a single interface DLCI number and create
frame-relay map statements for each remote site address.
A high school uses a fractional T1 for Internet access. Wireless network access is
provided in approximately 30 percent of the physical campus. Tests performed
recently by the IT administrators indicate that the T1 circuit is operating at
full capacity. The school district IT design team is asked to propose a network
upgrade plan to address two business goals:
1. Provide wireless network connectivity for students in 90 percent of the
physical campus.
2. Improve Internet access for all students and faculty.
The design team proposes to upgrade the memory of the core router that is
connected to the ISP and to purchase additional wireless access points.
What can be concluded about the proposal that is presented by the design team?
The proposal addresses only the goal to increase the wireless coverage.***
The proposal addresses only the goal to improve Internet access.
The proposal addresses both business goals.
The proposal addresses neither business goal.

Refer to the exhibit. The network administrator is configuring the port security
feature on switch SWC. The administrator issued the command show port-security
interface fa 0/2 to verify the configuration. What can be concluded from the
output that is shown? (Choose three.)
This port is currently up.
The port is configured as a trunk link.
There is no device currently connected to this port.***
Three security violations have been detected on this interface.
Switchport mode for this interface is access-mode.
Security violations will cause this port to shut down immediately.***
What are two advantages of using a simulation tool to test an IP addressing
scheme? (Choose two.)
Address configuration errors can be addressed using out-of-band connections.
Placement of subnets and route summarization can be verified.
An engineer can test physical security without leaving the office or lab.***
The addressing scheme can be tested for scalability.***
The effects of combining new with existing infrastructure can be measured.
It provides real-time monitoring of a production network.
Refer to the exhibit. A field engineer is called into a customer's office to
determine a problem with connectivity in the network. Based on the customer's IP
addressing scheme, what is causing the problem?
The VLSM scheme is correct as shown.
The WAN that connects R1 to R3 has an incorrect mask.
The WAN that connects R1 to R2 overlaps with the R3 LAN.***
The R1 LAN is incorrect because subnet zero cannot be used with VLSM.
A new WIC is installed in an available router slot. At what point during the
router startup process does the router test the card for hardware problems?
after the configuration from NVRAM is loaded into RAM
when the bootstrap program is loaded into RAM
after the configuration from NVRAM is loaded into ROM
during the power-on self-test (POST)***

Refer to the exhibit. A NetworkingCompany engineer is characterizing an existing
network for a new customer. The engineer issues a show run command on the branch
router to gather configuration information. What is the engineer able to determine
as a result of viewing the output of this command?
The branch office router has two routes to the main office LAN in the routing
The default route for the branch office traffic is the router that is located at
the main office.
A connection through ISP-A will be used to reach the main office LAN if the Frame
Relay network is unavailable.
By using both the DSL and the Frame Relay connection, the branch office router
will load balance traffic that is destined for the main office LAN.
A configuration file needs to be loaded into the RAM of a router from a TFTP
server. What should an administrator know before accomplishing this task?
the router IP address and the operating system that is used by the TFTP server
the TFTP server IP address and the name of the configuration file on the server***
the router IP address and the name of the router configuration file in NVRAM
the TFTP server IP address and the router interface through which the file will be
A network designer must select a routing protocol for the network of a customer.
The currently installed network contains both Cisco and non-Cisco routers, and
there is no budget to replace them. The designer plans on implementing both VLSM
and route summarization in the new network design. Which two protocols can provide
the necessary functionality for this LAN? (Choose two.)
Which two weaknesses in a proposed network design can be identified by setting up
a prototype network and performing tests on it? (Choose two.)
congestion and inadequate bandwidth in the provider Frame Relay network
costs of the proposed equipment exceed the customer budget***
potential points of failure that are critical to the network***
limited scalability that can present problems if the network grows faster than
poor documentation of existing network topology and design
A user in a large office calls tech support to complain that the PC no longer
connects to the Internet or to any network resources, but seems otherwise normal.
The help desk technician asks the caller to talk to nearby users to see if other
machines are affected. After a few minutes, the caller reports that several
immediate neighbors have the same problem, but those seated further away do not.
Assuming that the description is accurate, what should be checked next?
power outlet to the PC that is used by the caller
workgroup switch in the telecommunications room****
cable between any network outlet and the telecommunications room
cable between the PC that is used by the caller and the network outlet it connects
cable between the PC that is used by a neighbor and the network outlet the
neighbor PC it connects to
Which of the following are characteristics of the core layer of the hierarchical
network design model? (Choose three.)
redundant paths***
high-level policy enforcement
packet manipulation
media transitions
rapid forwarding of traffic
no packet filtering
A network designer needs to perform prototype testing on a multisite network
design to verify that failure domains are not larger than specified in the
proposal. What would be the most efficient way to conduct this test?
Use simulation software to check the IP addressing scheme for errors.
Power down lab equipment and ping from one host to all other hosts.
Disconnect links between lab equipment and ping end-to-end across the network.
Delete devices or links in simulation software and ping from each host to all
other hosts.***
A customer has asked a network engineer to prototype the new IP addressing and
summarization strategy for a large, multisite network implementation. Which tool
is appropriate for testing the complete addressing scheme?
Cisco SDM
network simulation tool***
actual network equipment in a lab
current network of the customer
During a review of the proposed bill of materials, the NetworkingCompany account
manager realizes that the systems engineer included a lower cost, less capable
switch model for the access layer connectivity than was specified by the network
designer. When questioned, the systems engineer responds that the switches
recommended by the designer cannot be purchased within the budget limitations of
the customer. Which action should the account manager take?
Inform the customer that the project cannot be completed given the unreasonable
budget constraints.
Communicate any risks associated with the equipment substitution and obtain
customer approval to proceed.***
Because the customer is probably aware that the budget limitations will require
lower cost, less capable equipment, the account manager should do nothing.
Because the customer is probably aware that the budget limitations will require
lower cost, less capable equipment, the account manager should do nothing.
Refer to the exhibit. What is the spanning-tree role of all the enabled interfaces
of SW11?
After performing a password recovery operation on a router, the network field
engineer copies the running configuration to the startup configuration and then
reloads the router. The router boots successfully but immediately enters the setup
mode. The engineer manually loads the startup configuration using the copy start
run command and verifies that the configuration is correct and the passwords are
reset. What can cause the router to enter setup mode rather than load the correct
startup configuration file?
The field engineer configured the incorrect passwords in the startup configuration
The configuration register setting was not changed back to the correct value
before the router was reloaded.***
The running configuration was not successfully saved to the startup configuration
before the router was reloaded.
During the password recovery process, the engineer should have copied the startup
configuration to the running configuration before reloading the router.
An HWIC-4ESW, four-port switch module needs to be installed in a Cisco 1841 router
that currently has a WIC-2T module in slot 0. What should the network technician
do first?
Turn off power to the router before installing the new module.***
Remove the WIC-2T module so that the new module can be installed in slot 0.
Shut down all Fast Ethernet ports on the router until the switch module
installation is complete.
Configure the router Cisco IOS software to support an internal trunk link between
the switch and router module.

Refer to the exhibit. Based on the EIGRP configuration that is shown, what can the
field engineer conclude about the EIGRP authentication between RouterA and
Authentication will fail because only one key is configured.
Authentication will fail because the key chain names do not match.
Authentication will succeed and EIGRP updates can be exchanged.***
Authentication will fail because the key chain names must match the router names.

Refer to the exhibit. Following a test plan, the network systems engineer
completes the configuration of an access layer switch and connects three PCs to
test the configuration. The engineer attempts to ping from each PC to the other
connected PCs. Which three statements describe the expected results of pinging
from one host to another? (Choose three.)
Host1 can ping Host2.
Host1 cannot ping Host2.***
Host1 can ping Host3.***
Host1 cannot ping Host3.
Host2 can ping Host3.
Host2 cannot ping Host3.***

Refer to the exhibit. The two switches that are shown will not form a trunk. What
is the most likely cause of this problem?
The native VLANs are improperly configured.
All the hosts are on the same VLAN and a trunk is not needed.
Both ports are set to dynamic auto.***
The trunk should be configured using the switchport mode access command.
During prototype testing, the network designer performs a test to determine the
ability of the network to recover from a link or device failure. Which design goal
is validated if the test is a success?
What are two suggested best practices to implement when securing network devices?
(Choose two.)
Configure VLAN 1 as the native VLAN.
Disable unused ports on switches.***
Enable SSH and disable Telnet.***
Consolidate guest traffic and internal employee traffic.
Ensure that logs are stored locally on routers.

Refer to the exhibit. What does the JAX router do with traffic that is destined
for a web server with an IP address of
The traffic is sent out Serial 0/0/0.***
The router sends the traffic out all interfaces other than the one it came in on.
A request is sent to neighboring routers for paths to the network.
The packets are placed into a queue until a better route is discovered via RIP.
When should a network designer specify that a dedicated firewall appliance be used
at the perimeter of the network rather than a router with a Cisco IOS softwarebased
firewall feature set?
There are multiple servers in the DMZ.
The network is large in size and network traffic can overload the device.***
Traffic filtering is needed on the internal network.
Multiple levels of access to the network are needed.
Which two events occur when the command RTA(config)# frame-relay map ip
22 is issued on a router? (Choose two.)
DLCI 22 replaces the MAC address in the ARP table for entry
The remote router that is connected to network enters 22 the DLCI for
Inverse-ARP is used to add an entry for into the Frame Relay map table
using DLCI 22.
A Layer 2 address is statically mapped to a Layer 3 address.***
RTA uses DLCI 22 to forward data to***
45.JPG (37.57 KiB) Viewed 1250 times
Refer to the exhibit. When creating an extended ACL to deny traffic from the network destined for the Web server, where is the best
location for applying the ACL?
R3 Fa0/0 inbound***
R3 S0/0/1 outbound
R2 S0/0/1 inbound
ISP Fa0/0 outbound
Why would a designer choose a flat network over a hierarchical network design?
to make it easier to filter unwanted traffic
to be able to implement QoS
to keep costs low in small networks***
to reduce the size of failure domains

Refer to the exhibit. What does the status in the output indicate about the DLCI?
The switch has the DLCI configured but it is not usable by this router.***
The DLCI was previously configured in the switch but is no longer there.
It is usable but has little activity.
The DLCI has been renamed for that PVC.
The network designer recommends using RSTP in the design of a new data center.
There are multiple redundant Layer 2 switches and links contained in the new
design. What is the benefit of using RSTP in this situation over standard STP?
Redundant links are not blocked.
Routing tables converge more quickly.
Spanning Tree convergence times are reduced.***
Fewer redundant links are required to maintain connectivity.
A network administrator wants to load a configuration file from a TFTP server into
NVRAM on a router. How should the administrator create a startup-config file in
NVRAM that matches the contents of the configuration file on the TFTP server?
Copy the configuration file from a TFTP server by using the command copy tftp
Copy the configuration file from a TFTP server by using the command copyfilename
Copy the file to RAM from a console connection by using the copy tftp runningconfig
command. Then reload the router to use the new configuration.
Paste the configuration file to the command line of the router while in global
configuration mode. Then issue the copy startup-config running-config command.***
What can be broadcast over the wireless network to help a guest user conveniently
log in to the network and use wireless services?
VPN authentication
WPA encryption
VLAN parameters
WEP keys
Which two options are true about discontiguous networks? (Choose two.)
The routing problems of discontiguous subnetworks can be resolved easily by using
the RIPv2 default configuration.
The default configuration of all classless routing protocols can prevent
problems that are caused by discontiguous networks.
Automatic route summarization can cause problems in a network with discontiguous
A network that runs a classful routing protocol will have problems if
discontiguous subnets exist in the network.***
Automatic route summarization helps resolve problems with a network with
discontiguous subnetworks.

Refer to the exhibit. A network associate is configuring a new router to provide
routing between VLANs. The associate removes the router from the box and connects
the Fa0/0 interface to a trunking port on the switch. After the configuration is
applied to the router, the traffic between VLANs still fails. What is causing this
to occur?
The NWRnStick router needs a routing protocol configured.
The NWRnStick router needs additional Fast Ethernet interfaces installed.
The subinterfaces of the NWRnStick router should have IP addresses applied.***
All the subinterfaces of the NWRnStick router should be configured in the same

A company has an IT staff that is not highly trained. What two features or
technologies must the network designer identify as training needs in order for the
staff to understand the basic operation of VPNs? (Choose two.)
access control lists
encryption algorithms***
Frame Relay configuration
QoS operation
tunneling protocols***
VLAN configuration
Which statement is true about implementing QoS in a network?
Voice traffic automatically receives the highest priority.
QoS guarantees enough bandwidth to every application.
QoS increases actual bandwidth on a link to ensure voice quality.
Voice traffic requires priority over other data traffic because it is sensitive to
Which three enhancements does IPv6 offer over IPv4? (Choose three.)
easier implementation and configuration
more effective IP security
integrated IP mobility support***
simplified header information***
fewer reserved IP addresses
eliminates the need to implement DHCP***

Refer to the exhibit. What happens if the network administrator issues the
commands shown when an ACL called Managers already exists on the router?
The commands overwrite the Managers ACL that is already on the router.
The commands are added at the end of the Managers ACL that is already on the
The commands are added at the beginning of the Managers ACL that is already on the
The network administrator receives an error stating that the ACL already exists.
A technician is configuring a router for routing using EIGRP. The technician
enters the EIGRP router configuration mode command:
Router(config-router)# variance 3
What is the effect of entering this command?
It enables unequal cost load balancing.***
It adjusts the cost of all EIGRP routes to 3.
It restricts the number of EIGRP feasible successor routes to 3.
It enables EIGRP equal cost load balancing over a maximum of 3 routes.
A small bookstore would like to offer wireless connectivity for customers with
laptops. Which wireless components or devices will provide connectivity to the
customers with the least possible cost to the bookstore?
standalone access points
wireless LAN controllers
standalone lightweight access points***
lightweight access point and wireless LAN controller


Post a Comment