Q101. - (Topic 5) 

Refer to the exhibit. 

The DHCP settings have recently been changed on the DHCP server and the client is no longer able to reach network resources. What should be done to correct this situation? 

A. Verify that the DNS server address is correct in the DHCP pool. 

B. Ping the default gateway to populate the ARP cache. 

C. Use the tracert command on the DHCP client to first determine where the problem is located. 

D. Clear all DHCP leases on the router to prevent address conflicts. 

E. Issue the ipconfig command with the /release and /renew options in a command window. 

Answer:

Explanation: 

A PC will retain its DHCP assigned IP address until the lease time expires, which often times is 24 hours or more. When changes are made to the DHCP server, the client should issue the ipconfig/release and then ipconfig/renew commands to obtain a new IP address lease. 


Q102. - (Topic 1) 

Refer to the exhibit. 

Host A is sending a packet to Host B for the first time. What destination MAC address will Host A use in the ARP request? 

A. 192.168.0.1 

B. 172.16.0.50 

C. 00-17-94-61-18-b0 

D. 00-19-d3-2d-c3-b2 

E. ff-ff-ff-ff-ff-ff 

F. 255.255.255.255 

Answer: E Explanation: 

For the initial communication, Host A will send a broadcast ARP (all F's) to determine the correct address to use to reach the destination. ARP sends an Ethernet frame called an ARP request to every host on the shared link-layer legmen. The Ethernet header includes the source host MAC address and a destination address of all Fs representing a broadcast frame. The ARP request contains the sender's MAC and IP address and the target (destination) IP address. The target's MAC address is set to all 0s. ARP Request 

Reference: 

http://www.technicalhowto.com/protocols/arp/arp.html 


Q103. - (Topic 7) 

By default, how many MAC addresses are permitted to be learned on a switch port with port security enabled? 

A. 8 

B. 2 

C. 1 

D. 0 

Answer:


Q104. - (Topic 4) 

The ip helper-address command does what? 

A. assigns an IP address to a host 

B. resolves an IP address from a DNS server 

C. relays a DHCP request across networks 

D. resolves an IP address overlapping issue 

Answer:

Explanation: 

http://cisconet.com/tcpip/dhcp/107-how-to-use-ip-helper-address-to-connect-remote-dhcp-

server.html 

When the DHCP client sends the DHCP request packet, it doesn’t have an IP address. So it uses the all-zeroes address, 0.0.0.0, as the IP source address. And it doesn’t know how to reach the DHCP server, so it uses a general broadcast address, 255.255.255.255, for the destination. So the router must replace the source address with its own IP address, for the interface that received the request. And it replaces the destination address with the address specified in the ip helper-address command. The client device’s MAC address is included in the payload of the original DHCP request packet, so the router doesn’t need to do anything to ensure that the server receives this information. The router then relays the DHCP request to the DHCP server. 


Q105. - (Topic 4) 

A network administrator cannot connect to a remote router by using SSH. Part of the show interfaces command is shown. 

router#show interfaces 

Serial0/1/0 is up, line protocol is down 

At which OSI layer should the administrator begin troubleshooting? 

A. physical 

B. data link 

C. network 

D. transport 

Answer:

Explanation: 

https://learningnetwork.cisco.com/thread/12389 

I think the indication here is "Serial 0 is up, line protocol is down". What causes this indication? Correct me if I am wrong. When you have this indication, a cable unplugged is not a correct answer. If you check the output of your "show interface serial 0" command again, you should notice it as "Serial 0 is down, line protocol is down. Under the "show ip int brief" you should see status = down and protocol = down as opposed to up, down. Because you disconnected the cable, layer 1 will go down, which is indicated by the serial 0 down status. The line protocol status is for layer 2. So, a cable unplugged is not a correct answer to "Serial 0 is up, line protocol is down". Up/down means that the physical layer is OK, but there is a problem with the data link link (line protocol). 


Q106. - (Topic 3) 

Which statement is true? 

A. An IPv6 address is 64 bits long and is represented as hexadecimal characters. 

B. An IPv6 address is 32 bits long and is represented as decimal digits. 

C. An IPv6 address is 128 bits long and is represented as decimal digits. 

D. An IPv6 address is 128 bits long and is represented as hexadecimal characters. 

Answer:

Explanation: 

http://www.cisco.com/en/US/technologies/tk648/tk872/technologies_white_paper0900aecd 8026003d.pdf 

One of the key advantages IPv6 brings is the exponentially larger address space. The following will outline the basic address architecture of IPv6. 128-bit-long addresses Represented in hexadecimal format: Uses CIDR principles: prefix/prefix length x:x:x:x:x:x:x:x, where x is a 16-bit hex field The last 64 bits are used for the interface ID 


Q107. - (Topic 3) 

Which router command will configure an interface with the IP address 10.10.80.1/19? 

A. router(config-if)# ip address 10.10.80.1/19 

B. router(config-if)# ip address 10.10.80.1 255.255.0.0 

C. router(config-if)# ip address 10.10.80.1 255.255.255.0 

D. router(config-if)# ip address 10.10.80.1 255.255.224.0 

E. router(config-if)# ip address 10.10.80.1 255.255.240.0 

F. router(config-if)# ip address 10.10.80.1 255.255.255.240 

Answer:

Explanation: 

255.255.224 equal /19 in CIDR format hence the answer 


Q108. - (Topic 3) 

What information can be used by a router running a link-state protocol to build and maintain its topological database? (Choose two.) 

A. hello packets 

B. SAP messages sent by other routers 

C. LSAs from other routers 

D. beacons received on point-to-point links 

E. routing tables received from other link-state routers 

F. TTL packets from designated routers 

Answer: A,C 

Explanation: 

Reference 1: http://www.ciscopress.com/articles/article.asp?p=24090&seqNum=4 

Link state protocols, sometimes called shortest path first or distributed database protocols, are built around a well-known algorithm from graph theory, E. W. Dijkstra'a shortest path algorithm. Examples of link state routing protocols are: Open Shortest Path First (OSPF) for IP The ISO's Intermediate System to Intermediate System (IS-IS) for CLNS and IP DEC's DNA Phase V Novell's NetWare Link Services Protocol (NLSP) Although link state protocols are rightly considered more complex than distance vector protocols, the basic functionality is not complex at all: 

1.

 Each router establishes a relationship—an adjacency—with each of its neighbors. 

2.

 Each router sends link state advertisements (LSAs), some 

3.

 Each router stores a copy of all the LSAs it has seen in a database. If all works well, the databases in all routers should be identical. 

4.

 The completed topological database, also called the link state database, describes a graph of the internetwork. Using the Dijkstra algorithm, each router calculates the shortest path to each network and enters this information into the route table. OSPF Tutorial 


Q109. - (Topic 5) 

Refer to the exhibit. 

The junior network support staff provided the diagram as a recommended configuration for the first phase of a four-phase network expansion project. The entire network expansion will have over 1000 users on 14 network segments and has been allocated this IP address space. 

192.168.1.1 through 192.168.5.255 

192.168.100.1 through 192.168.100.255 

What are three problems with this design? (Choose three.) 

A. The AREA 1 IP address space is inadequate for the number of users. 

B. The AREA 3 IP address space is inadequate for the number of users. 

C. AREA 2 could use a mask of /25 to conserve IP address space. 

D. The network address space that is provided requires a single network-wide mask. 

E. The router-to-router connection is wasting address space. 

F. The broadcast domain in AREA 1 is too large for IP to function. 

Answer: A,C,E 

Explanation: 

The given IP addresses of areas 1 and 3 along with network masks of /24 cannot accommodate 500 users so are inadequate, while the area 2 is having over capacity so its network mask can be reduced to /25 to accommodate the only 60 users it has. 


Q110. - (Topic 7) 

Which statement about the inside interface configuration in a NAT deployment is true? 

A. It is defined globally 

B. It identifies the location of source addresses for outgoing packets to be translated using access or route maps. 

C. It must be configured if static NAT is used 

D. It identifies the public IP address that traffic will use to reach the internet. 

Answer:

Explanation: 

This module describes how to configure Network Address Translation (NAT) for IP address conservation and how to configure inside and outside source addresses. This module also provides information about the benefits of configuring NAT for IP address conservation. NAT enables private IP internetworks that use nonregistered IP addresses to connect to the Internet. NAT operates on a device, usually connecting two networks, and translates the private (not globally unique) addresses in the internal network into legal addresses before packets are forwarded onto another network. NAT can be configured to advertise to the outside world only one address for the entire network. This ability provides additional security by effectively hiding the entire internal network behind that one address. NAT is also used at the enterprise edge to allow internal users access to the Internet and to allow Internet access to internal devices such as mail servers.