1、CCNA 2 Final Exam Answers V311. What are two possible reasons a router would not load a valid IOS from flash? (Choose two.)The configuration register is set to 02142.The first boot system command executed in the startup configuration file is boot system rom.The configuration register is set to 02100
2、.The boot field is set to the hexadecimal number 2.The startup configuration file is missing or corrupt.2. What are two recommended uses of login banners? (Choose two.)to display security warning messagesto welcome any user to the routerto warn people about misusing privileged EXEC modeto identify c
3、ircuits and other devices connected to the routerto announce a scheduled system shutdown 3.Router A and Router B have been correctly configured to use RIP as a dynamic routing protocol and all intefaces on Router A and Router B are reporting interface is up, line protocol is up status. RIP is then c
4、onfigured on Router C using the following commands: RouterC(config)# router rip RouterC(config-router)# network 192.168.4.0 RouterC(config-router)# network 172.16.0.0 If no additional routing is configured on Router A, Router B, and Router C, what will be the result?Networks 192.168.12.0/24, 192.168
5、.4.0/24, and 172.16.0.0/16 will be unreachable from Router A.Router A will have no knowledge of network 192.168.12.0/24, but will have routes to networks 192.168.4.0/24 and 172.16.0.0/16.All networks shown in the graphic will be reachable by Router A, Router B, and Router C.Networks 192.168.4.0/24 a
6、nd 172.16.0.0/16 will be unreachable from Router A and Router B.4. What are the primary functions of a router? (Choose two.)determine the best path for packetsprevent collisions on the network LANregulate flow control between sender and receiverprovide domain name resolutionforward packets to the ap
7、propriate interface5. What are some reasons to change the configuration register setting? (Choose two.)to force the system to ignore the configuration file stored in NVRAM to monitor password changesto change the POST sequenceto force the router to boot the IOS from NVRAMto force the system into ROM
8、 monitor mode6. A network administrator issues the erase startup-config command on a configured router with the configuration register set to 02102 and observes the following output: Erasing the nvram filesystem will remove all files! Continue? Confirm OK Erase of nvram: complete If the router unexp
9、ectedly loses power after this sequence, what will occur when power is restored?The router will enter ROM monitor mode upon completion of the power-on self test (POST).The router will load the last known valid configuration file.The router will enter Rx-boot mode.The router will prompt the user to e
10、nter setup mode or to continue without entering setup mode.7. Why are routed protocols important to networking? (Choose two.)Routed protocols detect collisions and fragments.Routers use routed protocols to calculate the best path to a destination.Routed protocols transport data across the network.Th
11、e fields and formats used within a packet are defined by routed protocols.Routed protocols are used to configure the metrics used by routing protocols.8. The main router of XYZ company has enough flash and RAM to store multiple IOS images. An administrator wants to upload a second IOS image from a T
12、FTP server to the flash of the router. Which method will accomplish this task?Paste the IOS filename to the command line of the router while in global configuration mode. Press enter. Then issue the copy tftp flash command.Use the setup utility to load the new image to flash.Copy the IOS image file
13、from a TFTP server using the command copyfilenameip addressflash .Copy the IOS image file from a TFTP server using the command copy tftp flash. When prompted, provide the IP address or name of the TFTP server and the IOS image filename.9.A network administrator has a console connection to the Freman
14、tle router. Pings to Melville are successful, but pings to Cottesloe and Nedlands fail. What could be a first step in troubleshooting the problem?Use an extended ping from Fremantle to each router in the network.Use the show interfaces command from a Telnet session on Melville to check the connectio
15、n to Cottesloe.Use the traceroute command to discover exactly which link in the network is down.Use the show cdp neighbors detail command from Fremantle to gather information about all Cisco routers in the network.10.Refer to the exhibit. The new security policy for the company allows all IP traffic
16、 from the Engineering LAN to the Internet while only web traffic from the Marketing LAN is allowed to the Internet. Which ACL can be applied in the outbound direction of Serial 0/1 on the Marketing router to implement the new security policy?access-list 197 permit ip 192.0.2.0 0.0.0.255 any access-l
17、ist 197 permit ip 198.18.112.0 0.0.0.255 any eq www access-list 165 permit ip 192.0.2.0 0.0.0.255 any access-list 165 permit tcp 198.18.112.0 0.0.0.255 any eq www access-list 165 permit ip any any access-list 137 permit ip 192.0.2.0 0.0.0.255 any access-list 137 permit tcp 198.18.112.0 0.0.0.255 any
18、 eq wwwaccess-list 89 permit 192.0.2.0 0.0.0.255 any access-list 89 permit tcp 198.18.112.0 0.0.0.255 any eq www 11.Hosts from the Limerick LAN are not allowed access to the Shannon LAN but should be able to access the Internet. Which set of commands will create a standard ACL that will apply to tra
19、ffic on the Shannon router interface Fa0/0 implementing this security?access-list 42 deny 172.19.123.0 0.0.0.255 192.0.2.0 0.0.0.255 access-list 42 permit any access-list 56 deny 172.19.123.0 0.0.0.255 access-list 56 permit any access-list 61 deny 172.19.123.0 0.0.0.0 access-list 61 permit any acces
20、s-list 87 deny ip any 192.0.2.0 0.0.0.255 access-list 87 permit ip any 12. Which of the following commands will correctly configure an extended ACL? (Choose two).Router(config)# access-list 18 permit tcp host 192.168.73.3 eq 25Router(config)# access-list 102 permit tcp 10.43.0.0 0.0.255.255 any eq 8
21、0Router(config)# access-list 187 permit tcp host 192.168.42.34 172.29.0.0 0.0.255.255 eq 23Router(config)# access-list 99 permit host 10.217.32.3Router(config)# access-list 128 permit tcp host 192.168.100.31 eq 2313. What are the results of setting the boot field bits in the configuration register t
22、o 0000? (Choose two.)The startup-config file will be ignored at bootup.The router will load the IOS from Flash.The router will enter ROM monitor mode upon reload.The router will enter boot ROM mode and have limited capabilities.The administrator can enter the b command to manually boot the IOS.14.Re
23、fer to the exhibit. Router D interface S0 on has gone down. What is the maximum time that will elapse before Router A learns that network 168.58.14.0 is down?5 seconds13 seconds17 seconds25 seconds30 seconds77 seconds15. During initial router bootup the following line appears: NVRAM invalid, possibl
24、y due to write erase. What are two possible reasons for this result? (Choose two.)The startup-config file was not saved to RAM before reboot.The IOS has been erased.The router has not been configured.The startup-config file cannot be located.The router will not enter initial configuration dialog.16.
25、The Suffolk router is directly connected to the networks shown in the graphic and has a default route that points to the Richmond router. All interfaces are active and properly addressed. However, when the workstation on network 172.29.5.0/24 sends a packet to destination address 172.29.198.5, it is
26、 discarded by the Suffolk router. What can be a reason for this result?The ip classless command is not enabled on the Richmond router.The route was ignored if the Richmond router did not include the 172.29.198.0/24 network in its routing updates.The Richmond router is in a different autonomous syste
27、m than the Suffolk router.The ip subnet-zero command was not configured on the Suffolk router.The ip classless command is not enabled on the Suffolk router.17. access-list 199 deny tcp 178.15.0.0 0.0.255.255 any eq 23 access-list 199 permit ip any any Assuming this ACL is correctly applied to a rout
28、er interface, which statements describe traffic on the network? (Choose two.)All FTP traffic from network 178.15.0.0 will be permitted.All Telnet traffic destined for network 178.15.0.0 will be denied.Telnet and FTP will be permitted from all hosts on network 178.15.0.0 to any destination.Telnet wil
29、l not be permitted from any hosts on network 178.15.0.0 to any destination.Telnet will not be permitted to any host on network 178.15.0.0 from any destination.18.What facts can be determined from the highlighted text shown in the exhibit? (Choose two.)A weak encryption was applied to all unencrypted
30、 passwords.The enable password is now more secure than the enable secret password.An MD5 hashing algorithm was used on all encrypted passwords.Any configured user EXEC mode or Telnet passwords will be encrypted in this configuration.The service password-encryption command was used to encrypt all pas
31、swords on the router including enable secret.19. What are three features of CDP? (Choose three.)provides information on directly connected devices that have CDP enabledtests Layer 2 connectivityenabled by default on each interfaceprovides a layer of securityused for debugging Layer 4 connectivity is
32、sues20. What information can be learned during the initial router bootup? (Choose two.)the configuration register value the number and types of interfaces installedthe router model and the amount of memory that is availablethe amount of memory required to load the IOS and configurationthe number of interfaces with connected cabl
copyright@ 2008-2022 冰豆网网站版权所有
经营许可证编号:鄂ICP备2022015515号-1