Cisco 642 831 Cit Certificati

64
Empleo y Formación | Garantía y Pruebas | Política de privacidad | Servicios de Recuperación de Activos Bookmark and Share | español Productos de red Los routers de la red Switches de red Cables de red Tarjetas de red Red de chasis Adaptadores de red Módulos de Red Red de Montes Fuentes de alimentación Memoria GBIC Firewalls de Red Hardware balanceadores de carga De equipos de telecomunicaciones Central de Equipos de Oficina Etiquetas Tipo de producto Etiquetas de productos de la serie Números de partes por MFG Cisco artículos de contenido Se utiliza para distribuidores de Cisco que puede confiar Las mejores marcas de red Cisco Extreme Networks Foundry Networks Force10 Networks HP Nortel Networks Compaq Juniper Networks F5 Networks Brocado Alcatel Kemp Tecnologías Cisco 642-831 CIT Examen de Certificación Solución de problemas de Internet de Cisco 642-831 examen de Apoyo ... Continuar abajo para CCNP artículos y Cisco 642-831 Pregu examen 642-831 CCNP tiene una duración de 75-90 minutos para completar y cuenta con aproximadamente 60 a 70 preguntas. El CIT de Cisco 642-831 es un examen de calificación para la certificación Cisco Certified Network Professional CCNP ®. El CIT de Cis prueba los materiales cubiertos por la solución de problemas de internetworking de Cisco (CIT) del curso. El CIT de Cisco 642-831 exa tiene importantes habilidades y conocimientos necesarios para solucionar problemas de rendimiento inferior al óptimo en un entorno de Cisco 642-831 examen incluye temas en la descripción y aplicación de estrategias eficaces de solución de problemas, resolución de pr enrutamiento, solución de problemas multi-capa de conmutación de redes y solución de problemas WAN y conexiones de acceso remo señalan en el sitio web Cisco.com. Tenga en cuenta que el Cisco CCNP 642 a 831 temas de examen de certificación y los objetivos pu que las tecnologías están siempre cambiando. CCNP 642-831 Objetivos del examen: Describir y aplicar estrategias eficaces de solución de problemas Describir y aplicar métodos de solución de problemas de capas modelo Aislar interconexión de redes sub-óptima operación en el definido correctamente la capa del modelo OSI Identificar las herramientas y recursos para solucionar problemas de red Solucionar problemas de IP unicast y multicast de enrutamiento Solucionar problemas de IGP Solucionar problemas de BGP Solucionar problemas de enrutamiento multicast Solucionar problemas de redistribución de protocolo Solucionar problemas de enrutamiento basado en políticas Solucionar problemas de multi-capa de redes de conmutación de Solucionar problemas de árbol de expansión Solucionar problemas de las VLAN Solucionar problemas de multi-capa de las operaciones del interruptor Solucionar problemas de protocolos de puerta de enlace de redundancia Solucionar problemas de la WAN y acceso remoto Solucionar problemas y comprobar AAA Solucionar problemas de Frame Relay Solucionar problemas de PPP Solucionar problemas de RDSI y DDR Solucionar problemas y comprobar las operaciones de acceso remoto VPN con IPSec colas Solución de problemas y soluciones de compresión CCNP exámenes de certificación Cisco 642-821 BCRAN Examen de Certificación (Cisco construcción de redes de acceso remoto del examen) Cisco 642-831 examen de certificación TIC (Internet Cisco Solución de problemas del examen de Apoyo) Cisco 642-811 BCMSN Examen de Certificación (Examen Cisco Multilayer Switched construcción) Cisco 642-891 examen de certificación Compuesto (Cisco examen compuesto) Cisco 642-892 examen de certificación Compuesto (Cisco examen compuesto) Cisco 642-801 examen de certificación BSCI (edificación Escalables Cisco Internetworks examen) Cisco 642-901 examen de certificación BSCI (edificación Escalables Cisco Internetworks examen) Volver a Certificaciones Cisco Volver a Certificaciones Cisco 642-831 Preguntas y Respuestas (los errores se aprende) Esperamos que estas preguntas y respuestas sobre el Cisco 642-831 examen de ayudarle en su seguimiento de una certificación C Pregunta: ¿Cuál de las siguientes direcciones IP es una dirección de clase C de la red privada? A. 11000000.10101010.00010001.00001001 B. 10100000.10101000.00010001.00001001 Cisco utilizados | Usado extrema | Fundición usados | usados Nortel | Nueva Force10 | Usado F5 Networks | Nueva Juniper | Usado HP Traducido al: español Mostrar texto original Más información gina 1 de 64 Cisco 642-831 CIT Certification Exam 09/11/2010 http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Transcript of Cisco 642 831 Cit Certificati

Page 1: Cisco 642 831 Cit Certificati

Empleo y Formación | Garantía y Pruebas | Política de privacidad | Servicios de Recuperación de Activos

Bookmark and Share |

español ▼

Productos de red

Los routers de la redSwitches de redCables de redTarjetas de redRed de chasisAdaptadores de redMódulos de RedRed de MontesFuentes de alimentaciónMemoriaGBICFirewalls de RedHardware balanceadores de cargaDe equipos de telecomunicacionesCentral de Equipos de OficinaEtiquetas Tipo de productoEtiquetas de productos de la serieNúmeros de partes por MFG

Cisco artículos de contenido

Se utiliza para distribuidores de Cisco que puede confiar

Las mejores marcas de red

CiscoExtreme NetworksFoundry NetworksForce10 NetworksHPNortel NetworksCompaqJuniper NetworksF5 NetworksBrocadoAlcatelKemp Tecnologías

Cisco 642-831 CIT Examen de Certificación

Solución de problemas de Internet de Cisco 642-831 examen de Apoyo ... Continuar abajo para CCNP artículos y Cisco 642-831 Preguexamen 642-831 CCNP tiene una duración de 75-90 minutos para completar y cuenta con aproximadamente 60 a 70 preguntas. El CIT de Cisco 642-831 es un examen de calificación para la certificación Cisco Certified Network Professional CCNP ®. El CIT de Cisprueba los materiales cubiertos por la solución de problemas de internetworking de Cisco (CIT) del curso. El CIT de Cisco 642-831 exatiene importantes habilidades y conocimientos necesarios para solucionar problemas de rendimiento inferior al óptimo en un entorno deCisco 642-831 examen incluye temas en la descripción y aplicación de estrategias eficaces de solución de problemas, resolución de prenrutamiento, solución de problemas multi-capa de conmutación de redes y solución de problemas WAN y conexiones de acceso remoseñalan en el sitio web Cisco.com. Tenga en cuenta que el Cisco CCNP 642 a 831 temas de examen de certificación y los objetivos puque las tecnologías están siempre cambiando. CCNP 642-831 Objetivos del examen: Describir y aplicar estrategias eficaces de solución de problemas

Describir y aplicar métodos de solución de problemas de capas modeloAislar interconexión de redes sub-óptima operación en el definido correctamente la capa del modelo OSIIdentificar las herramientas y recursos para solucionar problemas de red

Solucionar problemas de IP unicast y multicast de enrutamiento

Solucionar problemas de IGPSolucionar problemas de BGPSolucionar problemas de enrutamiento multicastSolucionar problemas de redistribución de protocoloSolucionar problemas de enrutamiento basado en políticas

Solucionar problemas de multi-capa de redes de conmutación de

Solucionar problemas de árbol de expansiónSolucionar problemas de las VLANSolucionar problemas de multi-capa de las operaciones del interruptorSolucionar problemas de protocolos de puerta de enlace de redundancia

Solucionar problemas de la WAN y acceso remoto

Solucionar problemas y comprobar AAASolucionar problemas de Frame RelaySolucionar problemas de PPPSolucionar problemas de RDSI y DDRSolucionar problemas y comprobar las operaciones de acceso remoto VPN con IPSeccolas Solución de problemas y soluciones de compresión

CCNP exámenes de certificación

Cisco 642-821 BCRAN Examen de Certificación (Cisco construcción de redes de acceso remoto del examen) Cisco 642-831 examen de certificación TIC (Internet Cisco Solución de problemas del examen de Apoyo) Cisco 642-811 BCMSN Examen de Certificación (Examen Cisco Multilayer Switched construcción) Cisco 642-891 examen de certificación Compuesto (Cisco examen compuesto) Cisco 642-892 examen de certificación Compuesto (Cisco examen compuesto) Cisco 642-801 examen de certificación BSCI (edificación Escalables Cisco Internetworks examen) Cisco 642-901 examen de certificación BSCI (edificación Escalables Cisco Internetworks examen) Volver a Certificaciones Cisco Volver a Certificaciones

Cisco 642-831 Preguntas y Respuestas (los errores se aprende)

Esperamos que estas preguntas y respuestas sobre el Cisco 642-831 examen de ayudarle en su seguimiento de una certificación C

Pregunta:

¿Cuál de las siguientes direcciones IP es una dirección de clase C de la red privada? A. 11000000.10101010.00010001.00001001 B. 10100000.10101000.00010001.00001001

Cisco utilizados | Usado extrema | Fundición usados | usados Nortel | Nueva Force10 | Usado F5 Networks | Nueva Juniper | Usado HP

Traducido al: español Mostrar texto original Más información

Página 1 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 2: Cisco 642 831 Cit Certificati

D. 11000000.10101000.00010001.00001001 E. 11000000.10101001.00010001.00001001

Respuesta: D. 11000000.10101000.00010001.00001001

Explicación:

RFC1918 especifica la asignación de direcciones IP para redes privadas. Clase A 10.0.0.0 - 10.255.255.255 (10.08 prefijo) Clase B 172.16.0.0 - 172.31.255.255 (prefijo 172.16/12) Clase C 192.168.0.0 - 192.168.255.255 (prefijo 192.168/16) o en binario (sólo los 2 primeros otctets están representados) Clase A 0000 1010.0000 0000 Clase B 1010 1100.0001 0000 Clase C 1100 0000.1010 1000

Pregunta:

En OSPF el uso que los proyectos de resolución de direcciones IP para intercambiar información de estado de enlace? A. 224.0.0.5 B. 224.0.0.6 C. 224.0.0.9 D. 224.0.0.10

Respuesta: A. 224.0.0.5

Explicación:

OSPF utiliza 224.0.0.5 (todos los routers OSPF) para el intercambio de información de estado de enlace y escucha a 224.0.0.6 (todos los routers OSPF designados) para recibir actualizaciones de multidifusión de DRothers. Las direcciones de multidifusión más reservados se pueden encontrar aquí: http://www.iana.org/assignments/multicast-addresses

Pregunta:

Queremos anunciar sólo una ruta por defecto a través de EIGRP. ¿Cómo lograr esto? A. R1 (config) # interface serial0 R1 (config-if) # ip eigrp resumen dirección 0.0.0.0 1000 0.0.0.0 B. R1 (config) # router EIGRP 1000 R1 (config-router) # vecino 172.16.1.25 por defecto vienen siempre C. R1 (config) # router EIGRP 1000 R1 (config-router) # ip eigrp resumen dirección 0.0.0.0 1000 0.0.0.0 D. R1 (config) # ip resumen dirección eigrp 1000 0.0.0.0 0.0.0.0

Respuesta: A. R1 (config) # interface serial0 R1 (config-if) # ip eigrp resumen dirección 0.0.0.0 1000 0.0.0.0

Explicación:

Para anunciar sólo una ruta por defecto y suprimir todas las actualizaciones de enrutamiento otros usamos la IP-dirección de resumen eigrp as_number 0.0.0.0 0.0.0.0 comando en el modo de configuración de la interfaz. Sustitución 0.0.0.0 0.0.0.0 con una dirección de resumen y la máscara de red se anuncian resumen de la ruta que. También tenemos que desactivar la generación automática de resúmenes con la no auto-summary comando de configuración del router.

Pregunta:

EIGRP usa los siguientes cuadros? A. Ruta / Desvío de mesa B. tabla Costo C. Topología de la tabla D-Link estado de la tabla E. vecino de mesa F. EIGRP tabla

Respuesta:A. Ruta / Desvío de mesa C. Topología de la tabla E. vecino de mesa

Explicación: La tabla de vecinos contiene todas las adyacencia formado. La tabla de topología es donde todas las rutas aprendidas se mantienen. La ruta / tabla de reenvío contiene más baja de las rutas métrica compuesta.

Pregunta:

Cuando se utiliza la configuración automática de IPv6 con lo que son los requisitos mínimos? A. R1 (config) # ipv6 de ruta R1 (config) # interfaz tipo R1 (config-if) # ipv6 permiten B. R1 (config-if) # ipv6 la conducción C. R1 (config) # ipv6 de ruta R1 (config-router) # ipv6 permiten D. R1 (config) # ipv6 la conducción

Respuesta: A. R1 (config) # ipv6 de ruta R1 (config) # interfaz tipo R1 (config-if) # ipv6 permiten

Explicación:

Cuando se inicializa un nodo que genera una dirección local de vínculo para la interfaz. La dirección local de vínculo es la interfaz s identificador concatenado con el prefijo FE80 conocido local de vínculo:: Los ceros más a la derecha del prefijo local de vínculo se reemplazan con el ID de interfaz. Por ejemplo, el prefijo local de vínculo FE80: 0:0:0:0:0:0:0 y la interfaz ID 200: CFF: forma FE0A.2C51 FE80 dirección local de vínculo: 0:0:0:200: CFF: FE0A. 2C51 El nodo a continuación, inicia la duplicación de los avances de detección de direcciones y si no hay dirección duplicada existe el nodo asigna la dirección generada locales de vínculo a la interfaz.

Pregunta:

Queremos redistribuir nuestras rutas RIP en OSPF. ¿Cuál es la configuración correcta para lograr esto? A. R1 (config) # router rip R1 (config-router) # ospf redistribuir B. R1 (config) # redistribuir ospf rip C. R1 (config) # router ospf 100 R1 (config-router) # redistribuir subredes rip D. R1 (config) # router ospf R1 (config-router) # redistribuir subredes rip

Respuesta: C. R1 (config) # router ospf 100 R1 (config-router) # redistribuir subredes rip

Explicación: La redistribución de comando permite inyectar las rutas de un protocolo de enrutamiento a otro. El subredes palabra clave es necesaria para redistribuir las rutas subredes de otro modo sólo-subredes rutas no se redistribuyen.

Pregunta:

¿Qué sucede cuando un DR falla en una red OSPF? A. El BDR se hace cargo de la función de router designado, pero se apodera de tener esta función cuando el original DR viene de nuevo en línea y un nuevo BDR es elegido B. La elección se realiza entre todos los routers de copia de seguridad designado y el BDR con la más alta prioridad se convierte en el DR C. El BDR se hace cargo de la función de Router Designado incluso si el DR viene de nuevo en línea y un nuevo BDR es elegido D. La elección se realiza entre todos los routers de copia de seguridad designado y el BDR con la prioridad más baja se convierte en el DR

Respuesta: C. El BDR se hace cargo de la función de Router Designado incluso si el DR viene de nuevo en línea y un nuevo BDR es elegido

Explicación:

Un problema importante con el router designado (DR) esquema es que si el DR falla, un proyecto de resolución nuevo debe ser elegido. adyacencias Nueva debe ser establecido, y todos los routers de la red deben sincronizar sus bases de datos con el nuevo RD (parte del proceso de adyacencia de la capacidad). Mientras todo esto ocurre, la red no está disponible para los paquetes de tránsito. Para evitar este problema, una BDR (BDR) es elegido, además de la RD. Todos los routers formar adyacencias, no sólo con la República Dominicana, sino también con el BDR. El DR y BDR también se adyacentes entre sí. Si el DR falla, el BDR se convierte en el nuevo RD. Debido a que los demás routers de la red ya están junto con el BDR, falta de disponibilidad de la red se reduce al mínimo. Cuando un router OSPF se activa y descubre sus vecinos, busca un activo DR y BDR. Si un DR y BDR existe, el router que lo acepta. Si no hay BDR, se celebra una elección en la que el router de mayor prioridad se convierte en el BDR Si más de un router tiene la misma prioridad el que tiene la más alta

Traducido al: español Mostrar texto original Más información

Página 2 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 3: Cisco 642 831 Cit Certificati

Cabe señalar que la prioridad puede influir en una elección, pero no se sobrepondrá a la activa DR o BDR. Es decir, si un router con una prioridad más alta se activa después de un DR y BDR se han elegido, el nuevo router no reemplazará a ninguno de ellos. Así que los dos primeros routers elegibles DR-inicializar en una red de acceso múltiple se convertirá en el DR y BDR.

Pregunta:

¿Qué tipo de LSA no se inundan en un área totalmente rechoncho? A. LSA tipo 2 B. LSA tipo 1 C. LSA tipo 5 D. LSA tipo 4

Respuesta:C. LSA tipo 5 D. LSA tipo 4

Explicación: Debido a que las zonas totalmente rechoncho utilizar una ruta por defecto a todos los destinos (externo a la AS y de área) de la ABR bloqueará LSA tipo 4 y 5, pero también todas las LSA de resumen con la excepción de un tipo único del 3 LSA para anunciar la ruta por defecto.

Pregunta:

¿Qué tipo de LSA se utilizan para anunciar las rutas que han sido redistribuidas en el OSPF? A. LSA tipo 5 B. LSA tipo 1 C. LSA tipo 3 D. LSA tipo 7

Respuesta: A. LSA tipo 5

Explicación: LSA tipo 5 o Autónoma LSAs sistema externo se utilizan para anunciar las rutas que han sido redistribuidas en el OSPF. Que se inundan en todo el sistema a excepción de talón, talón totalmente y las áreas no tan rechoncho.

Pregunta:

¿Cómo podemos influir en la elección de DR y BDR? A. R1 (config) # interface ethernet0 R1 (config-if) # ip ospf prioridad 220 B. R1 (config) # interface ethernet0 R1 (config-if) # ip prioridad 220 C. R1 (config) # interface ethernet0 R1 (config-if) # ip ospf prioridad 0 D. R1 (config) # router ospf 10 R1 (config-router) # 220 prioridad

Respuesta: A. R1 (config) # interface ethernet0 R1 (config-if) # ip ospf prioridad 220

Explicación: La ip ospf priority comando establecer un valor a la interfaz que se usa cuando el DR y BDR se elige. La prioridad más alta va a ganar las elecciones, en caso de empate, el más alto RID va a ganar.

Pregunta:

¿Qué comando usamos para ver el estado de forma adyacencias con otros routers OSPF? A. show ip ospf base de datos de resumen B. show ip ospf detalle C. show ip ospf base de datos D. show ip ospf vecino

Respuesta: D. show ip ospf vecino

Explicación: El show ip ospf vecino comando muestra el estado de funcionamiento de todos los vecinos OSPF (adyacencias).

Pregunta:

Una ruta externa OSPF que el AS no se hace cargo del costo para el ASBR en cuenta que se consignan en la tabla de enrutamiento con el siguiente código? A. O E2 B. O E1 C. O D. O IA

Respuesta: A. O E2

Explicación: Tipo 2 rutas externas (E2) son rutas externas al AS OPSF y sin tener en cuenta el costo de la ruta de acceso al ASBR.

Pregunta:

Queremos inyectar una ruta de resumen, de otras áreas OSPF, en el área de red troncal 0 de un ABR. ¿Qué comando usamos? A. x área networkmask alcance de la red B. Resumen de direcciones de red networkmask la zona C. red networkmask D. Resumen de ruta networkmask red

Respuesta: A. x área networkmask alcance de la red

Explicación: Para inyectar una ruta de resumen de otras áreas OSPF a través de la ABR en la espina dorsal se utiliza el área de area_id gama Dirección_de_la_Red network_mask comando de configuración del router en el ABR.

Pregunta:

Una red de LSA se origina en que router? A. DR B. BDR C. ABR D. ASBR

Respuesta: A. DR

Explicación: Red de LSA (tipo 2) son originarios de la República Dominicana en todos los multi-acceso a la red y la lista de todos los routers adjunto, incluidos los que uno mismo.

Pregunta:

¿Cuál de los siguientes atributos obligatorios conocido? A. Atomic_Aggregate B. MULTI_EXIT_DISC C. LOCAL_PREF D. Agregador E. NEXT_HOP F. AS_PATH

Respuesta:E. NEXT_HOP F. AS_PATH

Explicación:

Los tres atributos obligatorios conocidos son: - Origen - AS_PATH - NEXT_HOP

P tQueremos configurar EIGRP en R1 E1 pero no se le permite participar en el proceso de EIGRP. ¿Cómo lograr esto? A R1 ( fi ) # t i 10 R1 ( fi t ) # t k 10 1 1 1 0 0 0 0 10 R1 ( fi t ) # t k 192 168 1 0

Traducido al: español Mostrar texto original Más información

Página 3 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 4: Cisco 642 831 Cit Certificati

C. R1 (config) # router eigrp 10 R1 (config-router) # network 10.1.1.1 R1 (config-router) # network 192.168.1.0 D. R1 (config) # router eigrp 10 R1 (config-router) # network 10.1.1.1 R1 (config-router) # network 192.168.1.0 R1 (config) # Interfaz Ethernet 1 R1 (config-if) # ip eigrp pasiva

Respuesta: B. R1 (config) # router eigrp 10 R1 (config-router) # network 10.1.1.1 0.0.0.0 R1 (config-router) # network 192.168.1.0

Explicación: Desde el lanzamiento de IOS 12.01 (T) de la red de declaración fue dada la capacidad de utilizar máscaras comodín como OSPF. Antes de que el IOS versión del router (IOS) se corrija la dirección que el número de red con clase importante, en este caso 10.0.0.0 que incluyen Ethernet 1. En versiones anteriores esto se lograría con la pasiva-interfaz de comandos de configuración del router.

Pregunta:

¿Cuál es la configuración para R1 en la red que se muestra en la exposición? AS123 ha BGP interno y R1 está mirando con R4. [Haga clic en exhibición] A. R1 (config) # router bgp 123 R1 (config-router) # vecino 192.158.1.3 R1 (config-router) # vecino 192.168.1.7 R1 (config-router) # vecino 192.168.1.11 B. R1 (config) # router bgp 123 R1 (config-router) # vecino 192.158.1.3 R1 (config-router) # vecino 192.168.1.7 R1 (config-router) # 192.168.1.11 prójimo como a distancia-456 C. R1 (config) # router bgp 123 R1 (config-router) # vecino 192.158.1.3 a distancia como 123 R1 (config-router) # 192.168.1.7 vecino a distancia como 123 R1 (config-router) # vecino 192.168. 1.11 D. R1 (config) # router bgp 123 R1 (config-router) # vecino de 192.168.1.3 a distancia como 123 R1 (config-router) # vecino de 192.168.1.7 a distancia como 123 R1 (config-router) # vecino 192.168. 1.11 a distancia, como 456

Respuesta:D. R1 (config) # router bgp 123 R1 (config-router) # vecino de 192.168.1.3 a distancia como 123 R1 (config-router) # vecino de 192.168.1.7 a distancia como 123 R1 (config-router) # vecino 192.168. 1.11 a distancia, como 456

Explicación: Para configurar BGP en un enrutador de seguir los siguientes pasos: Paso 1: Habilitar el proceso de BGP y especificar el número local de AS con el router bgp comando. Paso 2: Utilice el mando a distancia, como vecino de comandos para especificar un vecino y su número de AS

Pregunta:

¿Cuál de las siguientes afirmaciones son ciertas acerca de los reflectores ruta? A. Si una ruta se recibe de un cliente, promocionar la ruta a los otros clientes y no clientes B. Si una ruta se recibe de un par eBGP anunciar la ruta a todos los clientes, pero no a los clientes que no C. Si una ruta se recibe de un cliente que no anunciar la ruta a todos los clientes D. Si una ruta se recibe de un cliente que no, la caída de la ruta

Respuesta:A. Si una ruta se recibe de un cliente, promocionar la ruta a los otros clientes y no clientes C. Si una ruta se recibe de un cliente que no anunciar la ruta a todos los clientes

Explicación:

reflectores Ruta utilizar las siguientes reglas: - Si la ruta se recibe de un cliente que no pares a continuación, anunciar que la ruta a todos los clientes - Si la ruta se recibe de un cliente de pares a continuación, anunciar la ruta a todos los clientes y los compañeros no cliente - Si la ruta se recibe de una fuente externa de pares BGP anunciar la ruta a todos los clientes y compañeros sin cliente

Pregunta:

¿Cuál de las siguientes afirmaciones son ciertas acerca de BGP? A. BGP es un protocolo de estado de enlace B. BGP no admite VLSM C. ¿Es un protocolo de vector de distancia. D. BGP utiliza el puerto TCP 179 E. BGP se describe en el RFC 1771

Respuesta:D. BGP utiliza el puerto TCP 179 E. BGP se describe en el RFC 1771

Explicación: BGP se describe en el RFC 1771 (http://www.ietf.org/rfc/1771rfc.txt) y utiliza el puerto TCP 179 como su protocolo de transporte.

Pregunta:

¿Cuál de los siguientes campos pertenecen al mensaje OPEN en BGP? Camino A. atributos Capa de red B. Accesibilidad Información C. Hola tiempo Versión D. E. Autónoma número de sistema

Respuesta:Versión D. E. Autónoma número de sistema

Explicación:

El mensaje BGP ABIERTO contiene los siguientes campos: - BGP número de versión - Autónoma número de sistema - Tiempo de mantenimiento - Identificador BGP - Los parámetros opcionales

Pregunta:

¿En qué orden son las siguientes seis decisiones evaluados durante el proceso de toma de BGP? A. Primera, Segunda, Tercera, Fouth, Quinta, Sexta B. Disponibilidad del siguiente salto, Mayor Administrativo de peso, más alta Prefernece local, la ruta más corta AS, bajo MED, externos en internos BGP

Respuesta: B. Disponibilidad del siguiente salto, Mayor Administrativo de peso, más alta Prefernece local, la ruta más corta AS, bajo MED, externos en internos BGP

Explicación:

El proceso de toma BGP sigue los siguientes pasos: - Si el siguiente salto no está disponible ignorar la ruta - Prefiere la ruta con el mayor peso administrativo (propietario de Cisco) - Si las masas son iguales prefiere la ruta con mayor preferencia local - Si las preferencias locales son iguales prefiere la ruta con el menor AS_PATH - Si el AS_PATHs son iguales prefieren la vía con el tipo más bajo origen - Si el tipo de origen es el mismo que prefiere la ruta con el menor MED - Si el MED es igual prefieren externa rutas BGP interno sobre las rutas BGP - Si todo sigue igual prefiere la ruta con el camino más corto a la NEXT_HOP BGP, es decir, la ruta con menor métrica de IGP para el router del siguientesalto - El último paso se prefiere la ruta anunciada por el router con el más bajo RID

Pregunta:

¿Cómo podemos influir en las métricas de OSPF? A. R1 (config) # interface serial0 R1 (config-if) # ancho de banda de 256 B. R1 (config) # interface serial0 R1 (config-if) # 256k de ancho de banda C. R1 (config) # interface serial0 R1 (config-if) # ip ospf cuestan 10 D. R1 (config) # router ospf 10 R1 (config-router) Coste # 10 E. R1 (config) # router ospf 10 R1 (config-router) Coste ip # 10

Respuesta:A. R1 (config) # interface serial0 R1 (config-if) # ancho de banda de 256 C. R1 (config) # interface serial0 R1 (config-if) # ip ospf cuestan 10

Traducido al: español Mostrar texto original Más información

Página 4 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 5: Cisco 642 831 Cit Certificati

Explicación: OSPF utiliza el costo como un indicador que se deriva de los 10 8/bandwidth ^ fórmula. Cambiar el ancho de banda de la declaración de una interfaz ejecuta OSPF influirá en la métrica. También puede utilizar la ip ospf cost valor interfaz de comandos de configuración para influir en el coste.

Pregunta:

¿Cómo podemos cambiar el cálculo del coste por defecto de OSPF? A. R1 (config-router) # ospf de referencia de banda ancha 1000 B. R1 (config-if) # ospf de referencia de banda ancha 1000 C. R1 (config) # ospf de referencia de banda ancha 1000 D. R1 (config-router) # ospf auto-coste de referencia de banda ancha 1000 E. R1 (config) # ospf auto-coste de referencia de banda ancha 1000 F. R1 (config) # ospf auto-coste de referencia de banda ancha 1000

Respuesta: D. R1 (config-router) # ospf auto-coste de referencia de banda ancha 1000

Explicación: Uso de la ospf-coste de referencia de auto-ancho de banda valor de comandos de configuración del router podemos controlar la forma en OSPF calcula las métricas por defecto para la interfaz. El rango de valores es 1-4294967, el valor por defecto es 100.

Pregunta:

Al configurar BGP queremos usar loopback0 como la interfaz para establecer las sesiones de peering. ¿Cómo podemos lograr esto? vecino A. 10.1.1.1 a distancia, como un vecino 10.1.1.1 actualización de código loopback0 vecino B. 10.1.1.1 a distancia, como un vecino 10.1.1.1 actualización punto loopback0 vecino C. 10.1.1.1 a distancia, como un vecino 10.1.1.1 actualización de la interfaz de loopback0 D. vecino 10.1.1.1 a distancia, como un vecino 10.1.1.1 pares loopback0

Respuesta: vecino A. 10.1.1.1 a distancia, como un vecino 10.1.1.1 actualización de código loopback0

Explicación: La actualización de código comando que se utiliza en combinación con el vecino comando nos permite elegir la interfaz vamos a utilizar como la dirección IP de origen para el período de sesiones de interconexión con el vecino.

Pregunta:

En la red [exposición click] sólo necesita R3 para recibir una ruta por defecto de R1. ¿Qué queremos configurar en R1? A. router bgp 123 sin sincronización de red 192.168.1.0 máscara 255.255.255.0 10.1.1.2 vecino a distancia, como 456 vecinos 10.1.1.4 a distancia, como 789 no auto-summary B. router bgp 123 sin sincronización de red 192.168.1.0 máscara 255.255.255.0 10.1.1.2 prójimo como a distancia-456 10.1.1.2 vecino vecino ruta predeterminada 10.1.1.4 a distancia, como 789 no auto-summary C. router bgp 123 sin sincronización de red 192.168.1.0 máscara 255.255.255.0 10.1.1.2 vecino a distancia, como 456 vecinos 10.1.1.4 a distancia, como 789 vecinos 10.1.1.2 por defecto vienen de no auto-summary D. router BGP 123 no hay una red de sincronización 0.0.0.0 red 192.168.1.0 máscara 255.255.255.0 10.1.1.2 vecino a distancia, como 456 vecinos 10.1.1.4 a distancia, como 789 no auto-summary

Respuesta:C. router bgp 123 sin sincronización de red 192.168.1.0 máscara 255.255.255.0 10.1.1.2 vecino a distancia, como 456 vecinos 10.1.1.4 a distancia, como 789 vecinos 10.1.1.2 por defecto vienen de no auto-summary

Explicación: Usando el defecto vienen palabra clave con el vecino comando le permitirá inyectar una ruta por defecto en ese punto? s AS. La red 0.0.0.0 comando hará lo mismo pero para todos los vecinos mencionados en el proceso de BGP.

Pregunta:

¿Cuál es el código de origen de una ruta se originó en un router BGP? A. 1 B. 2 C. 0 D. 3

Respuesta: C. 0

Explicación:

Origen Origen Código Código Descripción nombre 0 IGP ruta se originó en un router BGP. Ruta 1 EGP se originó a partir de un EGP (no eBGP) Ruta 2 incompleta su origen en un proceso de enrutamiento otras a continuación, a través de la redistribución de BGP.

Pregunta:

El Holdtime predeterminada para una sesión BGP es? A. 60 segundos B. 240 segundos C. 120 segundos D. 180 segundos

Respuesta: D. 180 segundos

Explicación: El Holdtime defecto BGP, enviado en el mensaje abierto, es de 180 segundos.

Pregunta:

En una emisión Hellos OSPF multiacceso red se envían cada _______? A. 90 segundos B. 10 segundos C. 40 segundos D. 30 minutos E. 60 segundos

Respuesta: B. 10 segundos

Explicación: Hellos se envían periódicamente cada 10 segundos (por defecto) en un medio de difusión multiacceso.

Pregunta:

Una dirección IPv6 que es dentro del mismo sitio, pero podría ser en una red diferente es una dirección de ____________? A. del sitio local B. locales de vínculo C. de redes locales D. Área local

Respuesta: A. del sitio local

Explicación: Un sitio local es la dirección de unidifusión que se encuentra dentro del mismo sitio, pero podría estar en una red diferente.

Pregunta:

Cuando en el diseño jerárquico de Cisco que se encuentra listas de acceso? A. Acceso capa B. capa de base C. capa de red D. capa de transporte E. capa de distribución

Respuesta: E. capa de distribución

Explicación: La capa de distribución es responsable de determinar el acceso a la columna vertebral mediante la filtración de actualizaciones innecesarias de recursos y de forma selectiva la concesión de acceso a los usuarios y los departamentos a través de listas de acceso

Traducido al: español Mostrar texto original Más información

Página 5 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 6: Cisco 642 831 Cit Certificati

Pregunta:

¿Cuál de los siguientes protocolos de enrutamiento se VLSM apoyo? A. EIGRP B. IS-IS C. OSPF D. VPID 2 E. BGP F. VPID un G. EGP H. IGRP

Respuesta:

A. EIGRP B. IS-IS C. OSPF D. VPID 2 E. BGP

Explicación: RIPv2, EIGRP, OSPF, IS-IS y BGP se VLSM apoyo.

Pregunta:

Habida cuenta de la red 192.168.1.0/24 lo que será la máscara de subred, si sólo queremos 20 hosts en cada subred? A. / 28 B. / 30 C. / 29 D. / 27

Respuesta: D. / 27

Explicación: Para que podamos obtener un 20 hosts en cada subred, necesitamos 5 bits del último octeto esto nos da 2 ^ 5-2 = 30 hosts en cada subred. Todavía tenemos 3 bits a la izquierda para las subredes disponibles. Así que la máscara de subred es 255.255.255.224 o / 27.

Pregunta:

EIGRP utiliza la dirección de multidifusión para que las actualizaciones? A. 224.0.0.1 B. 224.0.0.5 C. 224.0.0.6 D. 224.0.0.9 E. 224.0.0.10

Respuesta: E. 224.0.0.10

Explicación: EIGRP usa 224.0.0.10 para el envío de actualizaciones de enrutamiento.

Pregunta:

En IS-IS que mejor describe un pseudonodo? A. La LAN identificador de subred de radiodifusión. B. Un router que sólo está conectado a la red troncal y proporcionar el tráfico de tránsito entre las zonas. C. Un grupo de routers que ejecuta el protocolo IS-IS. D. Un servicio en la capa de red a la que el paquete debe ser dirigida.

Respuesta: A. La LAN identificador de subred de radiodifusión.

Explicación: Un pseudonodo es el identificador de LAN para una subred de radiodifusión. Esto hace que el dominio de difusión aparece como un router virtual y los routers aparecen interfaces conectados.

Pregunta:

Cuando un router tiene múltiples rutas a una red que se utiliza para enviar un paquete a la red? R. La ruta que coincide con la mayor longitud de prefijo. B. La ruta que se supo por última vez. C. La ruta que utiliza la interfaz más rápida. D. La ruta que se conoció en primer lugar. E. La ruta que coincida con la duración más corta prefijo.

Respuesta: R. La ruta que coincide con la mayor longitud de prefijo.

Explicación: El proceso de transmisión a utilizar la ruta donde el mayor número de bits de subred coincide con la de la red de destino. Esto se conoce como el partido más largo de la longitud de prefijo.

Pregunta:

¿Cuál de las siguientes son parte de la función de conmutación en un router? A. Compruebe si el marco pasa por la CRC. B. Compruebe si hay una capa de 2 direcciones. C. Compruebe si hay varias rutas de igual costo. D. Verifique que el mejor camino hacia el destino.

Respuesta:A. Compruebe si el marco pasa por la CRC. B. Compruebe si hay una capa de 2 direcciones.

Explicación:

La función de conmutación en un router realiza los siguientes pasos: - Comprueba la trama entrante de validez - Comprueba si contiene una capa de 2 dirección al router - Comprueba el tamaño del marco, no demasiado grande o demasiado pequeño - Comprueba si pasa la comprobación de redundancia cíclica - Tiras de la capa 2 de cabecera y el remolque y se comprueba la dirección de destino en contra de su caché - Crea el encabezado de nuevo marco y el remolque y coloca el marco en la cola de la interfaz de salida

Pregunta:

¿Cuál de las siguientes se encaminan procotols? A. OSPF B. NetBeui C. SPX D. TCP E. BGP F. IS-IS G. AppleTalk H. IP I. IPX

Respuesta:G. AppleTalk H. IP I. IPX

Explicación: Un protocolo enrutado es el protocolo de capa 3 utilizado para transferir datos desde el dispositivo de un extremo a otro a través de la red. AppleTalk, IPX, IP, Vines, DECnet IV son ejemplos de protocolos de enrutamiento.

Traducido al: español Mostrar texto original Más información

Página 6 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 7: Cisco 642 831 Cit Certificati

Pregunta:

Lo que se describe por el siguiente: El valor asignado a cada ruta de acceso basado en los criterios especificados en el protocolo de enrutamiento. A. Métrica B. Administración Distancia Ancho de banda C. D. Máscara de subred E. Longitud del prefijo F. coste de la ruta

Respuesta: A. Métrica

Explicación: La métrica es un valor asignado a cada ruta de acceso basado en los criterios especificados en el protocolo de enrutamiento.

Pregunta:

En cuanto a la tabla de enrutamiento que vemos rutas marcadas con i, a través de protocolo que son estas rutas aprendidas? A. EIGRP B. OSPF C. BGP D. IGRP E. IS-IS

Respuesta: E. IS-IS

Explicación:

Las rutas que están marcados con una i en la tabla de enrutamiento son rutas aprendidas a través de IS-IS. R1 # show ip route Códigos: I - IGRP derivada, R - RIP derivada, O - OSPF derivados, C - conectado, S - estática, E - EGP derivados, B - BGP derivados, * - Ruta candidata por defecto, IA - ruta OSPF zona de cosas, i - ES ia-se deriva, - IS-IS, U - por usuario ruta estática, o - a petición de enrutamiento, M - móvil, P - periódico ruta descargado estática, D - EIGRP, EX - EIGRP externa, E1 - tipo externo OSPF una ruta, E2 - OSPF tipo externo ruta 2, N1 - OSPF tipo NSSA externa una ruta, N2 - OSPF tipo NSSA externa 2 rutas

Pregunta:

El importe máximo de caminos de igualdad de costes en un router de Cisco es por defecto? A. 6 B. 10 C. 2 D. 4 E. 8

Respuesta: D. 4

Explicación: En un router Cisco, en caso de varias rutas de igual costo, existen en la propiedad intelectual hasta 6 rutas de acceso se puede utilizar para equilibrar la carga de tráfico a través de la red en forma de round-robin. El valor por defecto es de 4 caminos.

Pregunta:

Queremos entrar en una ruta estática en la tabla de enrutamiento que se quedará allí, incluso si la interfaz se apaga. ¿Cómo lograr esto? A. ip route 192.168.1.0 255.255.255.0 172.16.1.1 B. ip route 192.168.1.0 255.255.255.0 serial0 / 1 C. ip route 192.168.1.0 255.255.255.0 172.16.1.1 persistentes D. ip route 192.168.1.0 255.255.255.0 172.16.1.1 permanente

Respuesta: D. ip route 192.168.1.0 255.255.255.0 172.16.1.1 permanente

Explicación: Uso de la permanente de palabras clave con el comando ip route asegura que la ruta no será eliminado de la tabla de enrutamiento, incluso si la interfaz se apaga.

Pregunta:

¿Cuál de las siguientes afirmaciones válidas para la aplicación de rutas estáticas? A. El administrador de red necesita un control sobre el vínculo. B. Utilización de rutas estáticas hace más fácil escalabilidad. C. La red es una red de conexión. D. Las rutas estáticas son más confiables ya que no hay convergencia en el caso de un fracaso. E. Las rutas estáticas son más fáciles de confgure sin importar el tamaño de la red.

Respuesta:A. El administrador de red necesita un control sobre el vínculo. C. La red es una red de conexión.

Explicación:

Algunas de las razones para la aplicación de rutas estáticas son: - Relación de bajo ancho de banda, por ejemplo, acceso telefónico a los enlaces - Necesita el control sobre el enlace - El enlace es una copia de seguridad a la ruta de forma dinámica adquirida - Sólo hay una ruta de acceso a la red remota, una red de conexión - Router tiene recursos limitados y no se puede ejecutar un protocolo de enrutamiento

Pregunta:

ODR utiliza el protocolo para enviar prefijos del router remoto al router principal? A. El enrutamiento estático B. EIGRP C. CDP D. IGRP E. SNMP

Respuesta: C. CDP

Explicación: ODR oa petición de enrutamiento utiliza Cisco Discovery Protocol (CDP) para enviar los prefijos de las redes conectadas desde el router habla o de manera remota al hub o router principal.

Pregunta:

De forma predeterminada ODR envía actualizaciones cada 60 segundos queremos que esto disminuirá a 30 segundos. ¿Cómo lograr esto? A. R1 (config) # temporizador ODR 30 B. R1 (config-if) # temporizador ODR 30 C. R1 (config-if) # temporizador de 30 D. R1 (config-if) # cdp timer 30

Respuesta: D. R1 (config-if) # cdp timer 30

Explicación: Debido a ODR, On Demand Routing, utiliza CDP (Cisco Discovery Protocol) que puede cambiar el intervalo de actualización, cambiando el temporizador de CDP para enviar actualizaciones más o menos frecuencia cada 60 segundos (por defecto)

Traducido al: español Mostrar texto original Más información

Página 7 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 8: Cisco 642 831 Cit Certificati

Pregunta:

Redes lógicamente agrupadas bajo un control administrativo se llama _________ (n)? A. Zona B. Dominio C. Grupo de trabajo D. Jerarquía E. Backbone F. Autónoma sistema

Respuesta: F. Autónoma sistema

Explicación: Un sistema autónomo es una agrupación lógica de las redes bajo un control administrativo.

Pregunta:

Queremos crear 15 subredes de la dirección 172.16.0.0/16. Cuántos equipos se encuentran disponibles en cada subred? A. 2046 B. 2048 C. 2050 D. 2044

Respuesta: A. 2046

Explicación: Para darnos 15 subredes se utiliza 5 bits de la porción de host que nos da 30 subredes disponibles [2 ^ 5-2 = 30]. Esto nos deja 11 bits disponible para huéspedes, 2 ^ 11 - 2 = 2 046 hosts en cada subred.

Pregunta:

¿Cuáles son algunas ventajas de utilizar el prefijo de enrutamiento? A. Reducción en el tamaño de la tabla de enrutamiento. B. elimina la necesidad de un protocolo de enrutamiento exterior. C. mayor flexibilidad en el direccionamiento de red. D. elimina la necesidad de resumen de rutas E. permite complejos protocolos de enrutamiento para ser utilizado en redes privadas.

Respuesta:A. Reducción en el tamaño de la tabla de enrutamiento. C. mayor flexibilidad en el direccionamiento de red.

Explicación:

Los siguientes son algunos de los beneficios de Prefijo de enrutamiento / CIDR: - Reduce la tabla de enrutamiento en el tamaño - Permite una mayor flexibilidad en el direccionamiento de red - Menos sobrecarga en el tráfico de red, CPU y memoria

Pregunta:

¿Cuál de los siguientes protocolos de enrutamiento no admiten VLSM? A. EGP B. BGP -4 C. IGRP D. VPID 2 E. OSPF F. VPID un G. IS-IS

Respuesta:A. EGP C. IGRP F. VPID un

Explicación:

Los siguientes protocolos de enrutamiento de apoyo VLSM: - RIPv2 - OSPF - IS-IS - EIGRP - BGP-4

Pregunta:

diseño Ciscos jerárquica consiste en que las capas? A. Acceso B. Backbone C. Distribución D. Red E. núcleo F. internetwork

Respuesta:A. Acceso C. Distribución E. núcleo

Explicación:

El modelo de diseño jerárquico de Cisco tiene las siguientes capas: - El núcleo de la capa - La capa de distribución - La capa de acceso

Pregunta:

¿Cuál de los siguientes elementos se encuentran en la capa de la base del diseño Ciscos jerárquica? A. Acceso a las listas B. QoS C. NAT D. redundancia E. Complejo decisiones de enrutamiento

Respuesta:B. QoS D. redundancia

Explicación:

La función básica capas principales es conectar a toda la empresa mediante la interconexión de los dispositivos de la capa de distribución. Para lograr la máxima disponibilidad que necesitan una capa altamente redundante. Todos los servicios, por ejemplo, filtrado (listas de acceso), etc NAT debe ser removido de esta capa, ya que crear un estado latente en el proceso de reenvío. Para garantizar una mayor prioridad a determinados tipos de tráfico QoS puede ser implementado en esta capa.

Pregunta:

Un DIS envía paquetes hello cada segundo __________? A. 10 B. 45 C. 3 D. 15 E. 3.3

Traducido al: español Mostrar texto original Más información

Página 8 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 9: Cisco 642 831 Cit Certificati

Respuesta: E. 3.3

Explicación: Un DIS envía paquetes de saludo cada 3,3 segundos para mantener la adyacencias con los demás routers. Otros routers envían paquetes Hello cada 10 segundos.

Pregunta:

Al elegir a un DIS y las prioridades son todos iguales lo que se utilizará para la elección del DIS? A. El valor más alto en el TLV B. El valor más bajo en el TLV C. La mayor numéricos SNPA D. La menor numéricos SNPA E. La más alta dirección IP numérica F. La menor dirección IP numérica

Respuesta: C. La mayor numéricos SNPA

Explicación: Una elección DIS se basa en la prioridad (por defecto es 64) si todas las prioridades son el valor por defecto entonces el más alto SNPA (Subred punto de fijación), la dirección de enlace de datos determinará la DIS.

Pregunta:

¿Qué campos en un paquete LSP determinar si el LSP es más reciente el que aparece en la base de datos? A. Número de orden B. Tiempo de mantenimiento C. Suma de comprobación D. LAN ID E. versión F. restante de vida útil G. prioridad

Respuesta:A. Número de orden C. Suma de comprobación F. restante de vida útil

Explicación:

Los campos de árboles utilizados en un LSP para determinar si el LSP es más reciente el que aparece en la base de datos son los siguientes: - Tiempo de vida restante - Número de secuencia - Suma de comprobación

Pregunta:

¿Cómo podemos cambiar el router entero sea de nivel 1 sólo IS-IS router? isis A. router es de tipo de nivel 1 B. router isis isis circuito de tipo de nivel 1 interfaz C. ethernet0 isis nivel del circuito de tipo-1 D. ethernet0 nivel de interfaz es de tipo-1

Respuesta: isis A. router es de tipo de nivel 1

Explicación: Usamos el es de tipo comando de configuración del router para cambiar el nivel de enrutamiento IS-IS proceso de enrutamiento para el router entero o para la instancia de IS-IS si hay más de una instancia en ejecución.

Pregunta:

Las listas de distribución se pueden utilizar para lograr que de lo siguiente? A. Para cambiar la métrica de las rutas redistribuidas en otro protocolo de enrutamiento. B. Para etiquetar las rutas que se redistribuyen de un protocolo de enrutamiento en otro. C. Para cambiar la prioridad de un paquete cuando se viaja a través de la red. D. Prevenir bucles de enrutamiento, cuando se redistribuya entre los múltiples protocolos de enrutamiento. E. redes de ocultar, por ejemplo, laboratorios, redes seguras, que se anuncian a toda la red.

Respuesta:D. Prevenir bucles de enrutamiento, cuando se redistribuya entre los múltiples protocolos de enrutamiento. E. redes de ocultar, por ejemplo, laboratorios, redes seguras, que se anuncian a toda la red.

Explicación: Distribuya las listas son listas de acceso aplicadas para el proceso de enrutamiento para determinar qué redes se aceptarán en la tabla de enrutamiento o enviados en las actualizaciones. El también puede funcionar para controlar la seguridad, gastos generales y las razones de gestión.

Pregunta:

¿Qué forma de cola tiene un umbral que indica el número de bytes o paquetes que puedan ser enviados antes del servicio de la cola de al lado? A. personalizado cola B. Prioridad cola C. Clase base de cola justo ponderado D. baja latencia cola E. Cisco Express Forwarding F. Weighted Fair Queuing

Respuesta: A. personalizado cola

Explicación: En la costumbre de cola del buffer interfaz se divide en 16 filas. Cada cola tiene un umbral que indica el número de bytes o paquetes que puedan ser enviados antes del servicio de la cola de al lado.

Pregunta:

Además de las listas de acceso se puede usar un otro método para reducir el tráfico de red que no es tan exigente en recursos como listas de acceso. ¿Qué método es ése? A. interfaz nula B. compensar lista C. lista de distribución D. personalizado cola

Respuesta: A. interfaz nula

Explicación: Una interfaz nula es la interfaz virtual o lógico que sólo existe en el sistema operativo del router, el tráfico enviar a desaparecer porque la interfaz no tiene la capa física. Al deshabilitar los mensajes ICMP inalcanzable enviado en respuesta a los paquetes de enviar a la interfaz nula los paquetes se cayó en silencio, es decir, ningún mensaje de error se envía al dispositivo de transmisión.

Pregunta:

¿Cuáles son algunas de las características de IPv6? A. Parte de la dirección IPv6 es la dirección NIC MAC B. Configuración automática C. Complejo cabecera D. No hay necesidad para las direcciones multicast E. Seguridad

Respuesta:B. Configuración automática E. Seguridad

Explicación:

IPv6 incluye las siguientes, y más, los beneficios y características: - Dirección de un espacio más grande

Traducido al: español Mostrar texto original Más información

Página 9 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 10: Cisco 642 831 Cit Certificati

- La seguridad - Movilidad - Encabezado simple y eficiente - ...

Pregunta:

En la terminología de NAT lo que se describe por el siguiente: "Estas direcciones permiten a los ejércitos de la organización para comunicar" A. Dentro mundial B. Fuera de locales C. Dentro de locales D. Fuera mundial

Respuesta: C. Dentro de locales

Explicación: Dentro de las direcciones locales lo permiten para cada dispositivo final en la organización para comunicarse. Estas direcciones son únicas dentro de la empresa, pero que probablemente no son únicos a nivel mundial. Son el interior direcciones como se ve a nivel local dentro de la empresa.

Pregunta:

¿Qué significa: 1 representan en IPv6? A. locales de vínculo B. total mundial unicast C. No especificado y de bucle invertido D. sitio local

Respuesta: C. No especificado y de bucle invertido

Explicación:

La dirección IPv6 unicast no especificada y de bucle invertido se representa 0000.0000.0000.0000.0000.0000.0000.0000.0000.0000.0000.0001 o 0.0.0.0.0.0.0.0.0.0.0.1 o :: 1 A menudo se utiliza para descargar el software o su interés en una dirección. La dirección de bucle invertido se utiliza para probar la interfaz de la solución de problemas básicos.

Pregunta:

Los primeros 48 bits de una dirección IPv6 se utiliza? R. Para crear la unidifusión global en conjunto. B. Para crear la gama de multidifusión. C. Para introducir la dirección MAC de la máquina. D. Para crear una transicion fácil de IPv4

Respuesta: R. Para crear la unidifusión global en conjunto.

Explicación: Los primeros 48 bits de una dirección IPv6 es el encabezado utilizado por el IANA para exteriores de enrutamiento dentro de la Internet para crear la unidifusión global en conjunto. Si este prefijo de 48 bits no se utiliza el esquema de direcciones IPv4 es similar al direccionamiento privado.

Pregunta:

¿Cuál de los siguientes protocolos de enrutamiento IPv6 apoyo en un router Cisco? A. BGP -4 B. OSPF C. IS-IS D. RIPng E. EIGRP F. VPID un G. IGRP H. VPID 2

Respuesta:

A. BGP -4 B. OSPF C. IS-IS D. RIPng

Explicación:

Desde Ciscos 12.2T IOS y luego liberar el siguiente apoyo a los protocolos de enrutamiento IPv6: - RIPng - OSPF - IS-IS - BGP-4

Pregunta:

¿Cuál de las siguientes técnicas se utilizan protocolos de vector-distancia para evitar bucles de enrutamiento? A. sujeción B. contar hasta el infinito C. número de saltos D. horizonte dividido E. inundaciones

Respuesta:A. sujeción D. horizonte dividido

Explicación:

vectores Distancia utilizar las siguientes técnicas para evitar los bucles de enrutamiento: - El horizonte dividido - Poison inversa - Sujeción - Se activa actualizaciones - El envejecimiento de las rutas de la tabla de enrutamiento Contando hasta el infinito es una condición que ocurre cuando una ruta desaparece de la red y se encuentra en los protocolos de vector de distancia, pero en rigor no se trata de una técnica.

Pregunta:

¿Qué técnica de bucle de enrutamiento evitar se describe? "El proceso de enrutamiento no anunciar un camino para salir de la interfaz a través del cual se supo que la ruta" A. Dividir horizonte con rutas inalcanzables B. Veneno inversa C. Se activa actualización D. Split horizonte

Respuesta: D. Split horizonte

Explicación: El horizonte dividido norma estatal que el proceso de enrutamiento no se anuncian las redes de la interfaz a través de las cuales estas redes se aprendieron. Con veneno revertir el proceso de enrutamiento se anuncian las redes, pero la métrica se fija en infinito.

P tUso de RIP, ¿cómo podemos configurar R1 R2 para que sólo sabe acerca de la red 192.168.5.x/24.

Traducido al: español Mostrar texto original Más información

Página 10 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 11: Cisco 642 831 Cit Certificati

B. router rip red 192.168.5.0 192.168.1.0 192.168.1.3 vecino C. router ethernet extraer pasiva-interfaz 0 de la red 192.168.1.0 de la red 192.168.5.0 D. router ethernet extraer pasiva-interfaz de una red 192.168.1.0 de la red 192.168.5.0 192.168.1.3 vecino E. router ethernet extraer pasiva-interfaz de una red 192.168.1.0 de la red 192.168.5.0

Respuesta: A. router ethernet extraer pasiva-interfaz 0 de la red 192.168.1.0 de la red 192.168.5.0 192.168.1.3 vecino

Explicación: Mediante el uso de la pasiva-interfaz de comandos de configuración del router que bloquear el envío de actualizaciones de difusión en la red. Debido a R2 necesita saber acerca de la red 192.168.5.0/24 usamos el comando vecino para enviar actualizaciones de unidifusión a R2. R2 también necesita ser configurado de una manera similar de otro modo sería R3 conocer 192.168.5.0/24 red a través de R2.

Pregunta:

IGRP envía actualizaciones periódicas cada segundo _________? A. 90 B. 30 C. 180 D. 630 120 E.

Respuesta: A. 90

Explicación: Por defecto IGRP envía actualizaciones periódicas cada 90 segundos.

Pregunta:

¿Cómo lograr el equilibrio de carga a través de caminos desiguales en EIGRP? A. tráfico cuota máxima B. varianza máxima C.-caminos D. tráfico compartir min

Respuesta: B. varianza

Explicación: La variación de comando se puede utilizar para equilibrar la carga de costos a través de caminos desiguales. compartido minutos de tráfico necesidades a través de interfaces de palabra clave para tener el mismo resultado de lo contrario, utiliza el coste caminos iguales.

Pregunta:

número de saltos en IGRP se utiliza para? A. limitar el diámetro de la red B. IGRP no tiene un número de saltos C. primaria métricas D. secundaria métricas después de la métrica compuesta de ancho de banda y el retardo

Respuesta: A. limitar el diámetro de la red

Explicación: Por defecto, el número de saltos en IGRP es 100 pero puede ser configurado para 255 y se utiliza para limitar el diámetro de la red.

Pregunta:

La distancia administrativa de una ruta de resumen EIGRP es? A. 5 B. 90 C. 170 D. 120

Respuesta: A. 5

Explicación:

Fuente Administrativo Distancia

Conectado Interfaz 0

Ruta estática 1

EIGRP resumen de ruta 5

BGP externo 20

Interior EIGRP 90

IGRP 100

OSPF 110

IS-IS 115

RIP 120

EGP 140

On Demand Routing (ODR) 160

Exteriores EIGRP 170

BGP interno 200

Pregunta:

¿Cuál de los siguientes protocolos de enrutamiento son los protocolos de enrutamiento interior? A. EIGRP B. EGP C. IS-IS D. BGP E. VPID 2 F. OSPF

Respuesta:

A. EIGRP C. IS-IS E. VPID 2 F. OSPF

Explicación: RIPv1 y v2, OSPF, IGRP, EIGRP e IS-IS se consideran interior protcols de enrutamiento, ya que se ejecutan dentro de la empresa. Exterior protocolos de enrutamiento, como BGP y EGP son o han sido utilizados para el intercambio de información de enrutamiento entre las empresas.

Pregunta:

Del estado de enlace protocolos de enrutamiento de reducir la sobrecarga de la red utilizando? A. Mediante el uso de actualizaciones de difusión. B. Mediante el envío de toda la tabla de enrutamiento en cada actualización. C. Al no utilizar el número de saltos como métrica. D. Mediante el uso de actualizaciones de multidifusión. E. Mediante el envío de actualizaciones provocó que contienen sólo el cambio en lugar de toda la tabla de enrutamiento.

Respuesta:D. Mediante el uso de actualizaciones de multidifusión. E. Mediante el envío de actualizaciones provocó que contienen sólo el cambio en lugar de toda la tabla de enrutamiento.

óDel estado de enlace protocolos de enrutamiento de algunas de las siguientes técnicas para reducir la sobrecarga de la red:

Traducido al: español Mostrar texto original Más información

Página 11 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 12: Cisco 642 831 Cit Certificati

- Envío de actualizaciones desencadenadas - Con frecuencia el envío de resúmenes de la red - No enviar toda la tabla de enrutamiento con cada actualización

Pregunta:

BGP utiliza el indicador que se? A. costo B. número de saltos C. métrica compuesta D. atributos

Respuesta: D. atributos

Explicación: BGP tiene un complejo de atributos métricos llamado por los caminos que el tráfico puede ser manipulado.

Pregunta:

Queremos restablecer todas las sesiones de BGP. ¿Cómo lograr esto? A. ip bgp claro * B. clear ip bgp ruta C. vía ip claro * D. clear ip bgp restablecer

Respuesta: A. ip bgp claro *

Explicación: La ip bgp claro * comando se restablecerá todas las sesiones de BGP.

Pregunta:

Un nivel 2 IS-IS router puede ser comparado con un router OSPF ________. A. borde del área B. límite de sistema autónomo C. columna vertebral D. interno

Respuesta: C. columna vertebral

Explicación: IS-IS routers L1 puede ser comparado con los routers OSPF no-espina dorsal interna. IS-IS routers L2 se puede comparar a los routers OSPF columna vertebral. IS-IS routers L1/L2 puede ser comparado con los routers OSPF borde del área.

Pregunta:

¿Cuál de las siguientes afirmaciones sobre IS-IS son verdaderas? R. Es un protocolo sin clases B. No es compatible con VLSM. C. Hellos se envían cada 10 segundos en todos los medios de comunicación. D. hellos se envían cada 10 segundos en una red de difusión y cada 30 segundos en una red no difusión. E. Si no hay saludos durante 40 segundos, el prójimo es declarado muerto.

Respuesta:R. Es un protocolo sin clases C. Hellos se envían cada 10 segundos en todos los medios de comunicación.

Explicación: IS-IS es un protocolo sin clase que admite VLSM. Hellos se envían cada 10 segundos en todos los medios (de difusión o no difusión) y un vecino es declarado muerto a los 30 segundos de silencio.

Pregunta:

¿Cuál de los siguientes protocolos de apoyo resumen automático en el límite de la clase? A. OPSF B. IS-IS C. RIP D. IGRP E. BGP F. EIGRP

Respuesta:

C. RIP D. IGRP E. BGP F. EIGRP

Explicación: OSPF e IS-IS no son compatibles con el resumen automático en el límite de clase, pero el resumen se puede configurar manualmente.

Pregunta:

En EIGRP paquetes hello se envían cada segundo ___________? A. 10 B. 60 en los enlaces de acceso con una velocidad menor que T1 C. 30 en los enlaces de acceso con una velocidad menor que T1 D. 120 en los enlaces de acceso con una velocidad menor que T1 E. 5 F. 30

Respuesta:B. 60 en los enlaces de acceso con una velocidad menor que T1 E. 5

Explicación: En la mayoría de las redes EIGRP envía paquetes hello de multidifusión a través de cada 5 segundos. En X.25 multipunto, Frame Relay o ATM interfaces con la velocidad de acceso inferior o igual a T1, hola paquetes se envían cada 60 segundos usando unicast. [Sobre la base saludos subinterfaces punto a punto se envían cada 5 segundos]

Pregunta: Antes de las bases de datos están sincronizados y LSRs se están recibiendo el router OSPF pasa por diferentes estados. ¿Cuál es el orden correcto? A. Primera, Segunda, Tercera, Fouth, Quinta, Sexta, Séptima B. Abajo, inicio de dos vías, ExStart, cambio de moneda, de carga, completo

Respuesta: B. Abajo, inicio de dos vías, ExStart, cambio de moneda, de carga, completo

Explicación:

Un router OSPF pasa a través de los siguientes estados: Un estado presionado: envía su propio paquete hello 2 Estado de inicio: espera a 4 veces el intervalo de saludo para escuchar una respuesta 3 Estado de dos vías: el router se ve propia identificación en la lista de los vecinos, se forma adjancency 4 Estado ExStart: vecinos de determinar la relación maestro / esclavo 5 de cambio de estado: tanto los vecinos enviar paquetes de base de datos la descripción 6 Estado de carga: el router quiere más detalles utilizando un paquete de LSR 7 completo estado: LSRs se reciben y bases de datos son actualizados y sincronizados, los vecinos están completamente adyacentes

Pregunta:

Después de reiniciar nuestro router que desea ver el estado de nuestra adyacencias OSPF. ¿Qué comando usamos? mostrar el resultado de A. ip ospf mostrar B. ip ospf base de datos

Traducido al: español Mostrar texto original Más información

Página 12 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 13: Cisco 642 831 Cit Certificati

Respuesta: mostrar el D. ip ospf vecino

Explicación:

R1 # show ip ospf vecino Identificación del Estado Pri Dirección Tiempo Muerto Interfaz 192.168.1.1 1 COMPLETO / DRother 0:00:45 192.168.1.1 Ethernet0 172.16.4.15 un FULL / DRother 0:00:45 172.16.4.15 Ethernet0 10.1.1.4 5 FULL / RD 0:00:44 192.168.1.3 ethernet0 show ip ospf vecino dará una línea de resumen para cada vecino. El show ip ospf interfaz de comando también se mostrará el estado de la interfaz ejecuta OSPF.

Pregunta:

Spanning Tree se usa para prevenir? A. bucles de enrutamiento B. enlaces unidireccionales C. Reducción de los lazos D. Difusión tormentas

Respuesta: C. Reducción de los lazos

Explicación: Spanning Tree se usa para prevenir los bucles puente.

Pregunta:

La dirección de destino de un marco de BPDU es? A. 01-00-5e-ff-ff-ff B. 01-00-5e-seguido de la dirección MAC de cada interruptor en la topología de árbol de expansión C. 01-08-C2-00-00-00 D. ss-ff-ff-ff-ff-ff

Respuesta: C. 01-08-C2-00-00-00

Explicación: marcos BPDU son enviadas a la dirección multicast conocida STP 01-80-C2-00-00-00.

Pregunta:

¿En qué topologías de red OSPF nos encontramos con una DR y BDR? A. Punto a punto B. no difusión multiacceso C. El punto a multipunto D. Difusión multiacceso E. punto a punto de no difusión

Respuesta:B. no difusión multiacceso D. Difusión multiacceso

Explicación: Encontramos routers Designado (DR) y copia de seguridad de routers designados en redes multiacceso de difusión y redes de no difusión multiacceso.

Pregunta:

La métrica de OSPF es? A. ancho de banda B. costo C. número de saltos D. compuesto

Respuesta: B. costo

Explicación: OSPF utiliza el costo como la métrica, el costo se calcula mediante la siguiente fórmula 8/bandwidth ^ 10.

Pregunta:

¿Cómo podemos establecer la IDR en un router OSPF? A. R1 (config) # router ospf 100 R1 (config-router) # router xxxx-id B. R1 (config) # interface ethernet0 R1 (config-if) # ip ospf xxxx router-id C. R1 (config) # interface loopback0 R1 (config-if) # ip address xxxx yyyy D. R1 (config) # xxxx router-id E. R1 (config) # interface loopback0 R1 (config-if) # ip ospf xxxx router-id

Respuesta:A. R1 (config) # router ospf 100 R1 (config-router) # router xxxx-id C. R1 (config) # interface loopback0 R1 (config-if) # ip address xxxx yyyy

Explicación: Si una interfaz de bucle invertido está configurado en el router, la más alta dirección IP de la interfaz de bucle invertido configurado (s) se utilizará como la ID del router. También puede utilizar el router-id de comandos en modo de configuración del router.

Pregunta:

En un circuito de frame relay los temporizadores OSPF son? A. hola temporizador 30 segundos B. muertos temporizador de 120 segundos C. muertos temporizador de 90 segundos D. muertos temporizador de 30 segundos E. hola temporizador 40 segundos F. hola temporizador de 10 segundos G. muertos temporizador de 40 segundos

Respuesta:A. hola temporizador 30 segundos B. muertos temporizador de 120 segundos

Explicación: interfaces de serie con la encapsulación Frame Relay son tipos no difusión de la red por lo que el temporizador hola es de 30 segundos y el contador de tiempo muerto es de 120 segundos.

Pregunta:

¿Cuál de las siguientes redes OSPF son iguales? A. red 192.168.1.0 0.0.0.255 area 1056 B. red 192.168.1.0 área de 1056 C. de la red 192.168.1.0 0.0.0.255 area 0.0.4.32 D. red 192.168.1.0 0.0.0.255 área 1.0.5.6 E. red 192.168.1.0 0.0.0.255 area 0.0.10.56

Respuesta:A. red 192.168.1.0 0.0.0.255 area 1056 C. de la red 192.168.1.0 0.0.0.255 area 0.0.4.32

Explicación: El parámetro del área pueden ser representados en un decimal o en formato decimal con puntos. El formato decimal debe leerse como una cadena binaria, por ejemplo, decimal 1056 = 00000000.00000000.00000100.00100000 = 0.0.4.32 en formato decimal con puntos.

Pregunta:

¿Cómo configurar OSPF en R1 en el modo de NBMA? A. R1 (config) # interface serial 0 R1 (config-if) # ip address 192.168.1.2 255.255.255.0 R1 (config-if) # encapsulation frame-relay R1 (config-if) # ip ospf red no difusión R1 (config) # router ospf 10 R1 (config-router) # network 192 168 1 2 0 0 0 255 area 0

Traducido al: español Mostrar texto original Más información

Página 13 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 14: Cisco 642 831 Cit Certificati

no difusión R1 ( config) # router ospf 10 R1 (config-router) # network 192.168.1.2 0.0.0.255 area 0 R1 (config-router) # vecino 192.168.1.4 R1 (config-router) # vecino de 192.168.1.6 C. R1 (config) # interface serial 0 R1 (config-if) # ip address 192.168.1.2 255.255.255.0 R1 (config-if) # encapsulation frame-relay R1 (config-if) # ip ospf red no difusión R1 (config) # router ospf 10 R1 (config-router) # network 192.168.1.2 0.0.0.255 area 0 R1 (config-router) # vecino 192.168.1.4 R1 (config-router) # vecino de 192.168.1.6 D. R1 (config) # interface serial 0 R1 (config-if) # ip address 192.168.1.2 255.255.255.0 R1 (config-if) # encapsulation frame-relay R1 (config-if) # ip ospf red no difusión R1 (config) # router ospf R1 (config-router) # network 192.168.1.2 0.0.0.255 area 0 R1 (config-router) # vecino 192.168.1.4 R1 (config-router) # vecino de 192.168.1.6

Respuesta:C. R1 (config) # interface serial 0 R1 (config-if) # ip address 192.168.1.2 255.255.255.0 R1 (config-if) # encapsulation frame-relay R1 (config-if) # ip ospf red no difusión R1 (config) # router ospf 10 R1 (config-router) # network 192.168.1.2 0.0.0.255 area 0 R1 (config-router) # vecino 192.168.1.4 R1 (config-router) # vecino de 192.168.1.6

Explicación: La red de ip ospf no difusión del comando no es necesario porque este es el predeterminado que se utiliza en entornos multiacceso no difusión. No es sin embargo la necesidad de utilizar el vecino declaraciones tan adyacencias se pueden formar.

Pregunta:

Queremos saber cuántas veces el router ha vuelto a calcular su tabla de enrutamiento. ¿Qué comando usamos? mostrar el resultado de A. ip ospf vecino mostrar B. ip ospf mostrar C. ip ospf interface mostrar el D. ip ospf base de datos

Respuesta: mostrar B. ip ospf

Explicación:

El show ip ospf comando mostrará cuántas veces el algoritmo SPF se ha ejecutado. R1 # show ip ospf Enrutamiento de procesos "ospf 10" con ID 10.1.1.1 Sólo es compatible con TOS única (TOS0) rutas Apoya opaca LSA SPF horario de retraso de 5 segundos, tiempo de espera entre dos FPS 10 segundos Mínimo LSA intervalo de 5 segundos. Mínimo LSA llegada un segundos grupo LSA estimulación temporizador de 100 segundos inundaciones interfaz estimulación temporizador 55 mseg Retransmisión temporizador estimulación 100 mseg Número de LSA externos 0. Suma de comprobación 0x0 Suma Número de opaco como LSA 0. Suma de comprobación 0x0 Suma Número de DCbitless externos y opaco como LSA 0 Número de DoNotAge externos y opaco como LSA 0 Número de áreas en este router es de 2. Normal 0 2 0 trozo NSSA inundaciones externos lista de longitud 0 COLUMNA VERTEBRAL Zona (0) Número de interfaces en esta área es de 2 Área ha resumen del mensaje de autenticación algoritmo SPF ejecutado 4 veces rangos de área son Número de LSA 4. Suma de comprobación 0x29BEB Suma Número de enlace LSA opaco 0. Suma de comprobación 0x0 Suma Número de LSA DCbitless 3 Número de indicación LSA 0 Número de LSA DoNotAge 0 Inundaciones longitud de la lista 0

Pregunta:

¿Cómo puede asegurarse de que un router no se convertirá en un DR o BDR? A. ip ospf prioridad 0 B. ip ospf prioridad 255 C. ip ospf coste 0 D. no ip ospf prioridad

Respuesta: A. ip ospf prioridad 0

Explicación: La prioridad predeterminada es 1, esto se puede cambiar con el comando ip ospf priority comando, estableciendo la prioridad a 0 asegura que el router no participará en las elecciones DR o BDR.

Pregunta:

EIGRP utiliza lo algoritmo para determinar la selección de ruta? A. Difusión algoritmo de actualización B. Bellman Ford C. Dijkstra D. Diffie-Hellman

Respuesta: A. Difusión algoritmo de actualización

Explicación: EIGRP usa DUAL o Algoritmo de Actualización Difusa para seleccionar camino.

Pregunta:

¿Cuál de los siguientes requisitos deben cumplirse a fin de crear un enlace virtual? A. La zona de tránsito no puede ser un área de rutas B. La zona de tránsito puede ser un área no tan rechoncho C. La relación virtual se puede terminar en un router interior D. El área tranist necesita tener toda la información de enrutamiento E. La zona de tránsito puede ser un área de rutas

Respuesta:A. La zona de tránsito no puede ser un área de rutas D. El área tranist necesita tener toda la información de enrutamiento

Explicación: El área a través del cual se configura la conexión virtual, conocida como zona de tránsito, deben tener información completa de enrutamiento y esta zonade tránsito no puede ser un área de rutas internas. Los enlaces virtuales se configuran entre ABR y uno de ellos debe tener una conexión a la red troncal.

Pregunta:

El área 1 tiene que estar configurado para que no LSA externos o LSA de resumen se enviará a la zona. ¿Cómo lograr esto? [Exposición, haga clic en la topología] A. R4 router ospf 10 network 192.168.1.1 0.0.0.0 area 0 network 172.16.1.1 0.0.0.0 area 1 area 1 stub no-summary R5 router ospf 10 network 0.0.0.0 255.255.255.255 area 1 B. R4 router ospf 10 network 192.168.1.1 0.0.0.0 area 0 network 172.16.1.1 0.0.0.0 area 1 area 1 stub R5 router ospf 10 network 0.0.0.0 255.255.255.255area 1 area 1 stub C. R4 router ospf 10 network 192.168.1.1 0.0.0.0 area 0 network 172.16.1.1 0.0.0.0 area 1 area 1 stub no-summary R5 router ospf 10 network 0.0.0.0 255.255.255.255 area 1 area 1 stub

Traducido al: español Mostrar texto original Más información

Página 14 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 15: Cisco 642 831 Cit Certificati

Answer:C. R4 router ospf 10 network 192.168.1.1 0.0.0.0 area 0 network 172.16.1.1 0.0.0.0 area 1 area 1 stub no-summary R5 router ospf 10 network 0.0.0.0 255.255.255.255 area 1 area 1 stub

Explanation: In order to configure an area as a totally stub area so that no external or summary LSAs are being send to the area, except the default summary route, we use the area area_id stub no-summary router configuration command on the ABR. All routers in the totally stub area need to be configured with the area area_id stub router configuration command.

Question:

If a route in the routing table is marked as O E1 we know the following about that route: A. An LSA type 3 summary link in which the cost of the path to the ASBR is added to the external cost to reach the next-hop router outside the AS. B. An LSA type 4 summary link in which the cost of the path to the ASBR is added to the external cost to reach the next-hop router outside the AS. C. An LSA type 3 external link in which only the cost of path from the ASBR to the next-hop router outside the AS is considered. D. An LSA type 4 external link in which only the cost of path from the ASBR to the next-hop router outside the AS is considered. E. An LSA type 5 external link in which only the cost of path from the ASBR to the next-hop router outside the AS is considered. F. An LSA type 5 summary link in which the cost of the path to the ASBR is added to the external cost to reach the next-hop router outside the AS. G. An LSA type 5 external link in which the cost of the path to the ASBR is added to the external cost to reach the next-hop router outside the AS.

Answer: G. An LSA type 5 external link in which the cost of the path to the ASBR is added to the external cost to reach the next-hop router outside the AS.

Explanation:If the routing table entry is marked with O E1 it means that the LSA type 5 external route added the cost of the path to the ASBR to the external cost to reach the next-hop router outside the AS.

Question:

How can we change the default cost to the default route that is advertised into a stub area? A. R1(config-router)#area x cost value B. R1(config-if)#area x default-cost value C. R1(config-if)#ip ospf default-cost value D. R1(config-router)#area x default-cost value

Answer: D. R1(config-router)#area x default-cost value

Explanation:To define the cost of the default route generated and advertised by the ABR to the stub area we use the area area_id default-cost cost router configuration command.

Question:

In a NSSA which type of LSAs are not propgated into that area? A. LSA type 4 B. LSA type 5 C. LSA type 3 D. LSA type 7 E. LSA type 1 F. LSA type 2

Answer:A. LSA type 4 B. LSA type 5

Explanation: In a NSSA (not-so-stubby area) there are no LSA type 4 and 5 propagated into or out of the area.

Question:

Which command would produce the following output? Internet Address 172.16.2.2, Mask 255.255.255.0, Area 0.0.0.0 AS 1, Router ID 192.168.99.1, Network Type BROADCAST, Cost: 10 Transmit Delay is 1 sec, State OTHER, Priority 1 Designated Router id 192.168.25.1, Interface address 192.168.25.1 Backup Designated router id 192.168.4.8, Interface addr 192.168.4.8 Timer intervals configured, Hello 10, Dead 60, Wait 40, Retransmit 5 Hello due in 0:00:05 Neighbor Count is 8, Adjacent neighbor count is 2 Adjacent with neighbor 192.168.4.8 (Backup Designated Router) Adjacent with neighbor 192.168.25.1 (Designated Router) A. show ip ospf database B. show ip ospf C. show ip ospf border-routers D. show ip ospf interface

Answer: D. show ip ospf interface

Explanation:

R1# show ip ospf interface ethernet 0 Ethernet 0 is up, line protocol is up Internet Address 172.16.2.2, Mask 255.255.255.0, Area 0.0.0.0 AS 1, Router ID 192.168.99.1, Network Type BROADCAST, Cost: 10 Transmit Delay is 1 sec, State OTHER, Priority 1 Designated Router id 192.168.25.1, Interface address 192.168.25.1 Backup Designated router id 192.168.4.8, Interface addr 192.168.4.8 Timer intervals configured, Hello 10, Dead 60, Wait 40, Retransmit 5 Hello due in 0:00:05 Neighbor Count is 8, Adjacent neighbor count is 2 Adjacent with neighbor 192.168.4.8 (Backup Designated Router) Adjacent with neighbor 192.168.25.1 (Designated Router)

Question:

On what type of router do we configure the summary address in OSPF? A. ASBR B. ABR C. Backbone D. Interior

Answer: A. ASBR

Explanation: The summary address is used to summarize the networks that will be advertised to the outside world. This is configured on the ASBR.

Question:

Following Ciscos design recommendations for OSPF what is the maximum amount of routers in an area? A. 25 B. unlimited C. 100 D. 50 E. 250

Traducido al: español Mostrar texto original Más información

Página 15 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 16: Cisco 642 831 Cit Certificati

Explanation:

Ciscos design recommendations for OSPF stipulate the following: - routers per area: 50 - neighbors per router: 60 - areas per router: 3 - a router may not be a DR or BDR for more then 1 LAN

Question:

What could prevent OSPF adjacencies to be formed? A. no loopback interfaces configured B. misconfigured bandwidth statement C. misconfigured ospf priority D. misconfigured hello timer E. misconfigured MTU

Answer:D. misconfigured hello timer E. misconfigured MTU

Explanation: Some common problems for adjacencies not being formed are misconfigured IP mask, MTU, interface hello timer, OSPF hello interval and OSPF dead interval. Also make sure that both neighbors are part of the same area and area type.

Question:

In the ISO address the area and system id of a system is IS-IS is described in the? A. Network Entity Title B. Network Selector C. Host address D. Subnetwork point of attachment

Answer: A. Network Entity Title

Explanation: The Network Entity Title (NET) describes both the area and system id of a system in the IS-IS network but excludes the Network Selector (NSEL), which defines the Network Service Access Point (NSAP) address of the system.

Question:

In ISO addressing which two fields are used for external routing? A. High order DSP B. System ID C. Network selector (NSEL) D. Authority and format identifier (AFI) E. Initial domain identifier (IDI)

Answer:D. Authority and format identifier (AFI) E. Initial domain identifier (IDI)

Explanation: The IDP part of an ISO address is used for external routing and is issued by the ISO. It contains 2 parts, the authority and format identifier (AFI) and the initial domain identifier (IDI).

Question:

Which IS-IS packet is used to request individual LSPs and to acknowledge receipt of those? A. LAN Level 2 B. LAN Level 1 C. Level 2 LSP D. PSNP E. CSNP F. Level 1 LSP

Answer: D. PSNP

Explanation: A PSNP or Partial Sequence Number Packet is used to request individual LSPs and to acknowledge receipts of these LSPs.

Question:

When configuring IS-IS on a Cisco router it is which IS-IS router by default? A. Level 1-2 B. Level 1 C. Level 2 D. No defaults, this needs to be configured.

Answer: A. Level 1-2

Explanation: The IS-IS Level 1-2 router configuration is the default configuration on Cisco routers.

Question:

Which of the following are IS-IS network types? A. Point-to-point B. Broadcast C. Point-to-multipoint nonbroadcast D. NonBroadcast MultiAccess E. Point-to-multipoint

Answer:A. Point-to-point B. Broadcast

Explanation: IS-IS defines 2 network types, broadcast subnetworks and point-to-point networks.

Question:

Which fields in the IS-IS LAN Hello packet are not in the Point-to-Point Hello packet? A. Holding time B. Local Circuit ID C. Circuit type D. Priority E. LAN ID

Answer:D. Priority E. LAN ID

Explanation:

The common fields in both Hello packets are: - Fixed Integrated IS-IS header - Circuit type - Source ID - Holding time - Packet length In Point-to-point Hello packets we have an additional Local Circuit ID field. In LAN Hello packets there are the Priority and LAN ID fields.

Question:TLV code 129 or Protocols Supported are used by which PDU?

Traducido al: español Mostrar texto original Más información

Página 16 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 17: Cisco 642 831 Cit Certificati

B. SNP C. LSP Level 2 D. Hello E. LSP Level 1 and 2

Answer: D. Hello

Explanation: TLV code 129, Protocols Supported is used by the Hello PDU and states the protocols that the transmitting router supports, i.e. CLNS only, IP only or both.

Question:

ISO 10589 defines the metric for Integrated IS-IS. Which of the following are part of that? A. Bandwidth B. Hop C. Attribute D. Reliability E. Delay F. Error

Answer:E. Delay F. Error

Explanation:

Integrated IS-IS has 4 metrics defined by ISO 10589: - Default - Delay - Expense - Error

Question:

Which statements are true regarding ISO addressing? A. The area address must be the same for all routers in the same domain. B. All level 1 routers must have a system ID that is unique for the entire domain. C. All level 2 routers must have a system ID that is unique for the entire area. D. The ISO address is assigned to the interface. E. All level 2 routers must have a system ID that is unique for the entire domain. F. All level 1 routers must have a system ID that is unique for the entire area.

Answer:E. All level 2 routers must have a system ID that is unique for the entire domain. F. All level 1 routers must have a system ID that is unique for the entire area.

Explanation:

Some of the rules for ISO addressing: - the ISO address is assigned to the system, not to the interface - the router has one NET address, with a limit of 3 per area in multiarea Intergrated IS-IS - when multiple NETs are configured on the same router they must have the same system id - the area address must be the same for all routers in the same area - Level 2 routers must have a system ID that is unique for the entire domain - Level 1 routers must have a system ID that is unique for the entire area - The system ID length must be the same for ISs and ESs within a routing domain

Question:

When a new router is with a higher priority appears on a IS-IS network what will happen to the DIS? A. Nothing will happen and the DIS remains the same. B. The new router will become a backup DIS and will take over the role of the current DIS when it fails. C. The new router will become to new DIS after a new election. D. The new router will become to new DIS and the old DIS becomes a backup DIS.

Answer: C. The new router will become to new DIS after a new election.

Explanation: When a DIS has a problem or a new router with a higher priority comes online a new DIS is elected in the place of the old DIS.

Question:

Which command would produce the following output? System Id SNPA Interface State Holdtime Type Protocol 0000.0000.0007 aa00.0400.6408 Ethernet0 Init 277 IS ES-IS 0000.0C00.0C35 0000.0c00.0c36 Ethernet1 Up 91 L1 IS-IS 0800.2B16.24EA aa00.0400.2d05 Ethernet0 Up 29 L1L2 IS-IS 0800.2B14.060E aa00.0400.9205 Ethernet0 Up 1698 ES ES-IS 0000.0C00.3E51 DLCI 123 Serial1 Up 28 L2 IS-IS 0000.0C00.62E6 0000.0c00.62e7 Ethernet1 Up 22 L1 IS-IS 0A00.0400.2D05 aa00.0400.2d05 Ethernet0 Init 24 IS ES-IS A. show clns neighbors detail B. show isis neighbors detail C. show isis neighbors D. show isis snpa E. show clns snpa F. show clns neighbors

Answer: F. show clns neighbors

Explanation:

R1# show clns neighbors System Id SNPA Interface State Holdtime Type Protocol 0000.0000.0007 aa00.0400.6408 Ethernet0 Init 277 IS ES-IS 0000.0C00.0C35 0000.0c00.0c36 Ethernet1 Up 91 L1 IS-IS 0800.2B16.24EA aa00.0400.2d05 Ethernet0 Up 29 L1L2 IS-IS 0800.2B14.060E aa00.0400.9205 Ethernet0 Up 1698 ES ES-IS 0000.0C00.3E51 DLCI 123 Serial1 Up 28 L2 IS-IS 0000.0C00.62E6 0000.0c00.62e7 Ethernet1 Up 22 L1 IS-IS 0A00.0400.2D05 aa00.0400.2d05 Ethernet0 Init 24 IS ES-IS

Question:

Which of the 4 metrics defined by ISO 10589 for Integrated IS-IS is supported by Cisco and what is its value? A. Delay B. 64 C. Default D. 15 E. Error F. 100 G. 10 H. Expense

Traducido al: español Mostrar texto original Más información

Página 17 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 18: Cisco 642 831 Cit Certificati

Answer:C. Default G. 10

Explanation: The default or cost is the only out of the 4 metrics of IS-IS supported by Cisco. Its default value is 10 on all interfaces.

Question:

Looking at the following output: R1# show isis database IS-IS Level-1 Link State Database LSPID LSP Seq Num LSP Checksum LSP Holdtime ATT/P/OL 0000.0C00.0C35.00-00 0x0000000C 0x5696 792 0/0/0 0000.0C00.40AF.00-00* 0x00000009 0x8452 1077 1/0/0 0000.0C00.62E6.00-00 0x0000000A 0x38E7 383 0/0/0 0000.0C00.62E6.03-00 0x00000006 0x82BC 384 0/0/0 0800.2B16.24EA.00-00 0x00001D9F 0x8864 1188 1/0/0 0800.2B16.24EA.01-00 0x00001E36 0x0935 1198 1/0/0 IS-IS Level-2 Link State Database LSPID LSP Seq Num LSP Checksum LSP Holdtime ATT/P/OL 0000.0C00.0C35.03-00 0x00000005 0x04C8 792 0/0/0 0000.0C00.3E51.00-00 0x00000007 0xAF96 758 0/0/0 0000.0C00.40AF.00-00* 0x0000000A 0x3AA9 1077 0/0/0A. That that entry comes from a Level 1-2 router B. That that entry comes from a Pseudonode C. That that entry comes from a Level 1 only router D. That that entry comes from a new router still in the process of forming the adjacency

Answer: A. That that entry comes from a Level 1-2 router

Explanation: ATT represents the attach bit. It indicates that the router is also a Level 2 router and it can reach other areas. Level 1 routers use the presence of this bit to identify the closest Level 1-2 router to send their out-of-area data.

Question:

In Integrated IS-IS, TLV stands for? A. Type B. Length C. Value D. Local ciruict ID E. Length indication F. Packet length G. Time H. Version I. Lifetime

Answer:A. Type B. Length C. Value

Explanation:

The structure of the TLV is: - Type or Code, the type of TLV that identifies it and the characteristics that are related to it - Length, the length of the following field - Value, IP routes, IS-IS neighbors or authentication

Question:

We want to summarize our IP routes for Integrated IS-IS. How do we configure this? A. router isis summary-address address mask B. interface ethernet 0 ip router isis summary-address address mask C. router isis summary-address ip address mask D. interface ethernet 0 ip router isis summary-address ip address mask

Answer: A. router isis summary-address address mask

Explanation: To create IP routes summarization for Integrated IS-IS we use the summary-address address mask router configuration command.

Question:

How do we configure over NMBA in broadcast configuration? A. interface serial1 ip address 10.1.1.1 255.255.255.0 ip router isis encapsulation frame-relay frame-relay map clns 123 broadcast frame-relay map ip 10.1.1.2 123 broadcast B. interface serial1 ip address 10.1.1.1 255.255.255.0 ip router isis encapsulation frame-relay frame-relay map clns 123 frame-relay map ip 10.1.1.2 123 C. interface serial1 ip address 10.1.1.1 255.255.255.0 ip router isis encapsulation frame-relay frame-relay map isis 123 broadcast frame-relay map ip 10.1.1.2 123 broadcast D. interface serial1 ip address 10.1.1.1 255.255.255.0 encapsulation frame-relay frame-relay map clns 123 broadcast frame-relay map ip 10.1.1.2 123

Answer:A. interface serial1 ip address 10.1.1.1 255.255.255.0 ip router isis encapsulation frame-relay frame-relay map clns 123 broadcast frame-relay map ip 10.1.1.2 123 broadcast

Explanation: We are using the frame-relay map interface configuration command. The keyword IP is used to map the IP destination address to the DLCI and we define the interface as broadcast. Without the CLNS keyword no router appear in the IP routing table because IS-IS does not receive IS-IS frames to populate the IP routing table.

Question:

Given the following NSAP Address: 49.0005.80.0000a7.0000.ffdd.0004.1921.6801.1005.00 What is the system ID? A. 0004.1921.6801 B. 0005.80.0000a7.0000 C. 1921.6801.1005 D. 0004 E. 49 F. 0004.1921.6801.1005.00

Answer: C. 1921.6801.1005

Explanation:

The address is a GOSIP NSAP format: 49.0005.80.0000a7.0000.ffdd.0004.1921.6801.1005.00 __.____.__.______.____.____.____.______________.__ AFI.ICD.DFI.AAI.Reserved.RDI.Area.SystemID.SEL AFI: Authority and Format Identifier ICD I t ti l C d D i t

Traducido al: español Mostrar texto original Más información

Página 18 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 19: Cisco 642 831 Cit Certificati

AAI: Administrative Authority Identifier RDI: Routing Domain Identifier (Autonomous System Number) SEL: Network Service Access Point (NSAP) Selector

Question:

Wich IS-IS show command will display the metric? A. show clns databse detail B. show isis database C. show isis neighbor detail D. show clns interface E. show isis interface F. show clns neighbor detail

Answer: D. show clns interface

Explanation:

The show clns interface command will display the Level 1 and Level 2 metric of the outbound interface. R1# show clns interface ethernet 0 Ethernet0 is up, line protocol is up Checksums enabled, MTU 1497, Encapsulation SAP Routing Protocol: ISIS Circuit Type: level-1-2 Interface number 0x0, local circuit ID 0x1 Level-1 Metric: 10, Priority: 64, Circuit ID: R2.01 Number of active level-1 adjacencies: 1 Level-2 Metric: 10, Priority: 64, Circuit ID: R2.01 Number of active level-2 adjacencies: 1 Next ISIS LAN Level-1 Hello in 5 seconds Next ISIS LAN Level-2 Hello in 1 seconds

Question:

What is the function of a Level 2 IS-IS router? A. To route traffic between Level 1/2 routers. B. To locate the destination within an area. C. To route traffic between areas. D. To maintain the database.

Answer: C. To route traffic between areas.

Explanation: The function of a Level 2 router is to route traffic between areas.

Question:

Which EIGRP table is build using Hellos? A. Neighbor table B. Topology table C. Routing table D. Link-state database.

Answer: A. Neighbor table

Explanation: The neighbor table is build from information on Hellos received from adjacent routers (neighbors).

Question:

This state is reached when a router has sent out network packets and is waiting for ACKs from all its neighbors. A. Active B. Passive C. Dead D. Stuck in Active

Answer: A. Active

Explanation: When a router has send out network packets because of a topology change and no Feasible Successor was found it will wait for ACKs from its neighbors. The route is set to active mode.

Question:

In the EIGRP composite metric the K1 value represents? A. Bandwidth B. Loading C. Delay D. Reliability E. MTU

Answer: A. Bandwidth

Explanation:

The EIGRP Metrics are as follows:

Symbol Value

K1 Bandwidth

K2 Loading

K3 Delay

K4 Reliability

K5 MTU

Question:

In order for EIGRP to make adjacencies which conditions have to be met? A. The sending router must have a different AS number then the receiving one. B. The data-link layer protocols must match. C. The SRTT must be lower then 10 milliseconds. D. The router must hear a Hello packet or ACK from the neighbor. E. The metric settings need to be the same F.

Answer:D. The router must hear a Hello packet or ACK from the neighbor. E. The metric settings need to be the same

Explanation:

In order for adjacencies to be formed the following conditions need to be met: - The router must hear a Hello packet or an ACK from a neighbor - The AS number in the packet header must be the same as that of the receiving router - The metric settings need to be same.

When a route in the EIGRP topology goes down a is sent when there is no FS

Traducido al: español Mostrar texto original Más información

Página 19 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 20: Cisco 642 831 Cit Certificati

B. Update C. ACK D. Hello

Answer: A. Query

Explanation: Queries are sent out when a route in the topology table goes down and there is no feasible successor.

Question:

What could cause an EIGRP topology table to be recalculated? A. The topology table received a reply or a query from a neighbor B. The neighbor table does not receive a Hello within the holdtime C. The routing table has removed the routes from the topology table to be put in the routing table D. The neighbor table received a reply or a query from a neighbor E. The topology table does not receive a Hello within the holdtime

Answer:A. The topology table received a reply or a query from a neighbor B. The neighbor table does not receive a Hello within the holdtime

Explanation:

The following reasons could cause a topology table to be recalculated:

- New network is available �� - topology table receives an update containing the new network �� - interface for a directly connected EIGRP network comes online - Successor is changed in the topology table and in the routing table �� - topology table receives a reply or a query from a neighbor �� - the cost of the link changes - A change from a neighbor when a network has become unavailable �� - topology table receives a query, reply or update the remote network is down �� - neighbor table does not receive a Hello within the holdtime �� - the network is directly connected and the router senses a loss of carrier

Question:

How do we prevent OSPF Hellos being sent out of the ethernet interface of R1? A. R1(config-if)#passive-interface ospf B. R1(config)#passive-interface ethernet 0 C. R1(config)#router ospf 10 R1(config-router)#passive-interface ethernet 0 D. R1(config)#router ospf 10 R1(config-router)#passive interface ethernet 0

Answer: C. R1(config)#router ospf 10 R1(config-router)#passive-interface ethernet 0

Explanation: To surpress OSPF or EIGRP Hello packets or RIP updates we can use the passive-interface interface router configuration command.

Question:

How can we view the content of each LSP sent by IS-IS? A. show isis database detail B. show isis database lspid C. show isis database D. show isis database summary

Answer: A. show isis database detail

Explanation: The show isis area database command with the keyword detail added will show the content of each LSP.

Question:

Which command will tell us what type of OSPF router the router is we are connected to? A. show ip ospf interface B. show ip ospf process_id C. show ip ospf neighbor D. show ip ospf database

Answer: B. show ip ospf process_id

Explanation: The show ip ospf process_id will display the specific type of OSPF router, e.g. It is an internal router.

Question:

When a BGP AS is broken up into smaller sub-ASs we call those? A. Peer Group B. Domain C. Confederations D. Route Reflectors E. Private AS

Answer: C. Confederations

Explanation: When an AS is divided in smaller sub-ASs we call it a confederation. Inside each confederation the rules of iBGP apply, e.g. they must be fully meshed.

Question:

Which of the following configurations will enable the IS-IS routing process on R1? [click exhibit for topology] A. router isis net 49.0001.0000.000.0001.00 B. interface ethernet 0 ip address 10.1.1.2 255.255.255.0 ip router isis ! router isis net 49.0001.0000.000.0001.00 C. interface ethernet 0 ip address 10.1.1.2 255.255.255.0 ip router isis net 49.0001.0000.000.0001.00 ! interface serial 0 ip address 10.1.2.1 255.255.255.0 ip router isis net 49.0001.0000.000.0001.00 ! D. interface ethernet 0 ip address 10.1.1.2 255.255.255.0 ip router isis ! interface serial 0 ip address 10.1.2.1 255.255.255.0 ip router isis ! router isis net 49.0001.0000.000.0001.00

Answer:D. interface ethernet 0 ip address 10.1.1.2 255.255.255.0 ip router isis ! interface serial 0 ip address 10.1.2.1 255.255.255.0 ip router isis ! router isis net 49.0001.0000.000.0001.00

Explanation:

To enable the Integrated IS-IS routing process we need to do the following steps: - enable the routing process with the router isis command - configure the Network Entity Title with the net router configuration command - enable IS-IS on the relevant interface with the ip router isis interface configuration command

Question:

A router will be marked dead in EIGRP after _____ attempts of sending a unicast query. A. 15 B. 7 C. 5 D. 16 E. 30

Answer: D. 16

Explanation:When a router does not hear an acknowledgment within the alloted time it will retransmit the qeury as a unicast. If after 16 attempts there is no reponse the neighbor will be marked as dead

Traducido al: español Mostrar texto original Más información

Página 20 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 21: Cisco 642 831 Cit Certificati

Question:

When can a neighbor become a feasible successor? A. The topology table hold all routes so all neighbors are feasible successors. B. If the feasible distance is lower then the advertised distance. C. If the advertised distance is lower then the feasible distance. D. If the RTO is lower then the RTP.

Answer: C. If the advertised distance is lower then the feasible distance.

Explanation: A neighbor can become a feasible successor only when its advertised distance is less than the feasible distance. This is DUALs key to remain loopfree.

Question:

This timer is used in EIGRP to determine how long the router waits for an ACK before retransmitting. A. Hello B. RTP C. SRTT D. RTO

Answer: D. RTO

Explanation: The RTO or ReTransmission Timeout is used to determine how long the router waits for an ACK before retransmitting the packet. This timer is calculated in reference to the SRTT (smooth Round-Trip Time).

Question:

EIGRP uses by default ______ % of the bandwidth. A. 25 B. 10 C. 75 D. 50 E. 100

Answer: D. 50

Explanation: By default EIGRP uses 50% of the bandwidth of the link for its traffic, this value can be configured.

Question:

We want to see how many EIGRP Updates have been sent and received. Which command do we use? A. show ip eigrp interfaces B. show ip eigrp neigbors C. show ip eigrp neigbors detail D. show ip eigrp traffic

Answer: D. show ip eigrp traffic

Explanation:

R1# show ip eigrp traffic IP-EIGRP Traffic Statistics for process 10 Hellos sent/received: 175/165 Updates sent/received: 9/25 Queries sent/received: 4/0 Replies sent/received: 0/4 Acks sent/received: 15/10

Question:

Which of the following messages will not use multicast in EIGRP? A. Hello B. Update C. Query D. ACK

Answer: D. ACK

Explanation: ACK are always sent unicast, it is a Hello packet with no data but the acknowledgment field has a positive number. Updates can be multicast if there is a change in the topology and unicast if its a reply to a single router. Hellos and Queries are always multicast.

Question:

In OSPF interarea summarization is communicated via which LSA(s)? A. Type 5 B. Type 7 C. Type 1 D. Type 2 E. Type 3 F. Type 4

Answer:E. Type 3 F. Type 4

Explanation: LSA type 3 include the networks or subnets within an area that might have been summarized and that are sent to the backbone and between ABRs. Type 4 is information set to the ASBR from the ABR.

Question:

How do we change the time that Hellos are being sent? A. R1(config)#router eigrp 10 R1(config-router)#hello-interval 25 B. R1(config)#interface ethernet 0 R1(config-if)#ip hello-timer eigrp 10 25 C. R1(config)#interface ethernet 0 R1(config-if)#ip hello-interval eigrp 10 25 D. R1(config)#interface ethernet 0 R1(config-if)#ip hello-interval eigrp 25

Answer: C. R1(config)#interface ethernet 0 R1(config-if)#ip hello-interval eigrp 10 25

Explanation: The ip hello-interval eigrp AS_number seconds interface configuration command will change the how often Hellos are sent to neighbors out of that interface.

Question:

Changing the bandwidth on an EIGRP enabled interface will have which of the following results? A. Changes the K1 value and therefore the metric calculation. B. Changes the amount of EIGRP traffic sent over the link C. Changes the priority of EIGRP traffic sent over the link D. Changes the state of interface E. Changes the K3 value and therefore the metric calculation.

Answer:A. Changes the K1 value and therefore the metric calculation. B. Changes the amount of EIGRP traffic sent over the link

Explanation: By changing the bandwidth statement on an EIGRP interface we change the K1 value and that will result in a new metric calculation. Beause by default EIGRP uses 50% of the available bandwidth for its own traffic that change will result in a change here as well.

Traducido al: español Mostrar texto original Más información

Página 21 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 22: Cisco 642 831 Cit Certificati

Question:

What does r stand for in the output of show ip eigrp topology? A. A query has been sent and the router is waiting for a reply B. A reply packet was sent to this destination C. A query packet was sent to this destination D. An update packet was sent to this destination

Answer: A. A query has been sent and the router is waiting for a reply

Explanation:

Lower case r in the show ip eigrp topology table means that the flag has been set by the software after a query packet was sent and the router is now waiting for a reply. Router# show ip eigrp topology IP-EIGRP Topology Table for process 10 Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply, r - Reply status P 192.168.1.0 255.255.255.0, 2 successors, FD is 0 via 172.16.80.28 (46251776/46226176), Ethernet0 via 172.16.81.28 (46251776/46226176), Ethernet1 via 172.16.80.31 (46277376/46251776), Serial0

Question:

Which of the following are components of EIGRP? A. Protocol-dependent modules B. Protocol-independent modules C. Neighbor recovery D. Peer groups E. Attributes F. Authentication

Answer:A. Protocol-dependent modules C. Neighbor recovery

Explanation:

Cisco identifies 4 main components of EIGRP: - Protocol-dependent modules - RTP - Neighbor discovery - Neighbor recovery

Question:

Which of the following statements are true when configuring EIGRP over a NBMA network? A. EIGRP traffic should not exceed the CIR of the VC. B. Bandwidth allocated to EIGRP must be the same in both directions on each VC. C. EIGRP traffic should not exceed the EIR of the VC. D. EIGRP aggregated traffic over all VCs can be more then the access line speed of the interface. E. Bandwidth allocated to EIGRP can be different in both directions on each VC.

Answer:A. EIGRP traffic should not exceed the CIR of the VC. B. Bandwidth allocated to EIGRP must be the same in both directions on each VC.

Explanation:

When configuring EIGRP over a NBMA cloud Cisco recommends you follow the following rules: - EIGRP traffic should not exceed the CIR capacity of the VC - EIGRP aggregated traffic over all VCs should not exceed the access line speed of the interface - Bandwidth allocated to EIGRP on each VC must be the same in both directions

Question:

How do we verify if a remote router is configured as a stub with EIGRP? A. show ip eigrp topology B. show ip eigrp stub C. show ip eigrp interface D. show ip eigrp database E. show ip eigrp neighbor detail

Answer: E. show ip eigrp neighbor detail

Explanation:

Router# show ip eigrp neighbors detail IP-EIGRP neighbors for process 10 H Address Interface Hold Uptime SRTT RTO Q Seq Tye (sec) (ms) Cnt Num 0 10.1.1.5 Et0/0 12 00:04:48 1832 5000 0 14 Version 12.2/1.2, Retrans:0, Retries:0 Restart time 00:01:05 Stub Peer Advertising ( CONNECTED SUMMARY ) Routes

Question:

Which of the following keywords are not used with the EIGRP stub command? A. no-summary B. static C. send-only D. receive-only E. total F. connected

Answer:A. no-summary C. send-only E. total

Explanation:

The EIGRP stub command has the following keywords: - receive-only, the neighbor is a receive-only router - connected, the neighbor advertises connected routes - static, the neighbor advertises static routes - summary, the neighbor advertises summary routes

Question:

We want to change the time a router waits without hearing a Hello from the its neighbor before declaring it unavailable. How do we achieve this? A. R1(config)#interface ethernet 0 R1(config-if)#ip hold-time eigrp 10 100 B. R1(config)#interface ethernet 0 R1(config-if)#ip eigrp hold-interval 10 100 C R1(config)#interface ethernet 0 R1(config-if)#ip hold-timer eigrp 10 100

Traducido al: español Mostrar texto original Más información

Página 22 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 23: Cisco 642 831 Cit Certificati

D. R1(config)#interface ethernet 0 R1(config-if)#ip eigrp hold-time 10 100 E. R1(config)#interface ethernet 0 R1(config-if)#ip hold-interval eigrp 10 100

Answer: A. R1(config)#interface ethernet 0 R1(config-if)#ip hold-time eigrp 10 100

Explanation: We use the ip hold-time eigrp AS_nr seconds interface configuration command to change the time a router waits without hearing a Hello from a neighbor before declaring that neighbor unavailable.

Question:

When can we turn off synchronization in BGP? A. When the network is not running an IGP. B. When the local preference attribute is set. C. When the network is fully meshed. D. When the network is partial meshed.

Answer: C. When the network is fully meshed.

Explanation: Synchronization can be turned off if the BGP network is fully meshed.

Question:

Which attribute is created by a route reflector? A. Originator-ID B. Origin C. Community D. Multiple Exit Discriminator

Answer: A. Originator-ID

Explanation: The optional nontransitive attribute Originator-ID is created by the route reflector. The attribute contains the RID of the router that originated the update and is used to prevent routing loops.

Question:

When would you not use BGP? A. The routing policy between you and the ISP is the same. B. There is a difference in routing policy between you and the ISP. C. Your AS will be a transit domain. D. There are limited resources on the router. E. When you are using multiple ISPs.

Answer:A. The routing policy between you and the ISP is the same. D. There are limited resources on the router.

Explanation:

The following are some statements when not to use BGP: - the organization and ISP use the same routing policy - multiple redundant links to the ISP but only 1 link will be activated to connect to the Internet - the routers have limited resources (CPU, memory) - low bandwidth between the organization and ISP causing the additional routing overhead to interfere with the data

Question:

Which BGP message is used to inform a peer an error occured? A. Open B. Keepalive C. Notification D. Update

Answer: C. Notification

Explanation: BGP uses the notification message to inform the receiving router of errors that cause the connection to be closed.

Question:

Which of the following AS numbers are part of the private pool described by RFC 2270? A. 32123 B. 56412 C. 6600 D. 19200 E. 65560 F. 65495 G. 65510

Answer:F. 65495 G. 65510

Explanation: The private AS pool ranges from 64512 - 65535.

Question:

Which of the following describes best the synchronization rule in BGP? A. A router cannot forward a route to an iBGP peer unless the route is in the local IP routing table. B. A router is synchronized when the iBGP table is the same as the eBGP table. C. A router can forward a route to an eBGP peer unless the route is in the local IP routing table. D. A router cannot forward a route to an eBGP peer unless the route is in the local IP routing table. E. A router can forward a route to an iBGP peer unless the route is in the local IP routing table.

Answer: D. A router cannot forward a route to an eBGP peer unless the route is in the local IP routing table.

Explanation: The synchronization rule states that a router cannot forward a route to an eBGP peer unless the route is in its local IP routing table. This requires the IGP and BGP to be synchronized and prevents BGP from advertising routes that the AS cannot direct to the destination.

Question:

Which of the following attributes are optional transitive? A. Aggregator B. Community C. Atomic aggregate D. Originator ID E. Cluster ID F. Weight G. AS_Path

Answer:A. Aggregator B. Community

Explanation: BGP has the following optional transitive attributes: - Aggregator - Community

Question:Which attribute can cause problems on a multiaccess network? A Community

Traducido al: español Mostrar texto original Más información

Página 23 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 24: Cisco 642 831 Cit Certificati

C. Aggregator D. Next hop E. AS_Path

Answer: D. Next hop

Explanation:

In eBGP, the next hop is the IP Address, specified in the neighbor command, of a router from outside the AS advertising into the AS. On a multiaccess network, if a route came from one router, it would be unwise for another router to advertise that route with its own IP Address as the source, this could lead to packets flooding the network before finding the true originator. The rule therefore is that the address of the router the originally sent the update onto the multiaccess network should remain the source address.

Question:

Which attributes are not required but if they are in an update all routers running BGP will recognize and act on the information contained? A. Next hop B. Aggregator C. Community D. Origin E. AS_Path F. Local Preference G. Atomic Aggregate

Answer:F. Local Preference G. Atomic Aggregate

Explanation:

A well-known discretionary attribute is not required but when its present in an update all routers running BGP will recognize and act on the information contained. There are the following well-known discretionary attributes: - local preference - atomic aggregate

Question:

We want to advertise an aggregate route route for 170.0.0.0 but surpress any specific routes. How do we achieve this? A. aggregate-address 170.0.0.0 255.0.0.0 B. aggregate-address 170.0.0.0 255.0.0.0 only C. aggregate-address 170.0.0.0 255.0.0.0 summary-only D. summary-address 170.0.0.0 255.0.0.0

Answer: C. aggregate-address 170.0.0.0 255.0.0.0 summary-only

Explanation: To advertise a summary route we use the aggregate-address IP_Address Mask command. Adding the summary-only keyword will surpress ther advertisment of more specific routes to all neighbors.

Question:

Which command will show the BGP routing table? A. show ip bgp route B. show bgp neighbors C. show ip route bgp D. show ip bgp

Answer: D. show ip bgp

Explanation: The show ip bgp command will display the BGP routing table.

Question:

Which command will show the BGP topology? A. show ip bgp paths B. show ip bgp C. show ip bgp topology D. show ip bgp database

Answer: A. show ip bgp paths

Explanation: The show ip bgp paths command will display the BGP topology.

Question:

Which of the following rules about policy based routing are true? A. Policy based routing affects the destination of the packet. B. Policy based routing examines the source address and should be configured on the outbound interface. C. Policy based routing examines the destination address only and should be configured on the inbound interface. D. Policy based routing can influence how a packet will be routed in a neighboring AS. E. Policy based routing affects only the next hop in the path to the destination. F. Policy based routing examines the source address and should be configured on the inbound interface.

Answer:E. Policy based routing affects only the next hop in the path to the destination. F. Policy based routing examines the source address and should be configured on the inbound interface.

Explanation:

Some rules of policy based routing: - traffic can be directed on source address or both source & destination address - affects only the next hop in the path to the destination - does not affect the destination of the packet, only that path to get there - does not allow traffic sent into another AS to take a different path from the one that would have been chosen by that AS - it is possible to influence traffic how to get to a neighboring AS not how it will be routed within that AS - examines the source address so its configured on the inbound interface

Question:

How can we simplify configuration of multiple neighbors? A. R1(config-router)#neighbor free-tests peer-group R1(config-router)#neighbor free-tests update-source loopback 0 R1(config-router)#neighbor 10.1.1.1 remote-as 123 peer-group R1(config-router)#neighbor 192.168.1.1 remote-as 456 peer-group B. R1(config-router)#neighbor peer-group free-tests R1(config-router)#neighbor 10.1.1.1 free-tests R1(config-router)#neighbor 10.1.1.1 remote-as 123 R1(config-router)#neighbor 192.168.1.1 free-tests R1(config-router)#neighbor 192.168.1.1 remote-as 456 C. R1(config-router)#neighbor 10.1.1.1 free-tests R1(config-router)#neighbor 10.1.1.1 remote-as 123 R1(config-router)#neighbor 192.168.1.1 free-tests R1(config-router)#neighbor 192.168.1.1 remote-as 456 D. R1(config-router)#neighbor free-tests peer-group R1(config-router)#neighbor free-tests update-source loopback 0 R1(config-router)#neighbor 10.1.1.1 remote-as 123 R1(config-router)#neighbor 10.1.1.1 peer-group free-tests R1(config-router)#neighbor 192.168.1.1 remote-as 456 R1(config-router)#neighbor 192.168.1.1 peer-group free-tests

Answer:D. R1(config-router)#neighbor free-tests peer-group R1(config-router)#neighbor free-tests update-source loopback 0 R1(config-router)#neighbor 10.1.1.1 remote-as 123 R1(config-router)#neighbor 10.1.1.1 peer-group free-tests R1(config-router)#neighbor 192.168.1.1 remote-as 456 R1(config-router)#neighbor 192.168.1.1 peer-group free-tests

Explanation:

We can simplify configuration by grouping neighbors that share the same update policy in a peer group. To use a peer group we follow these steps: - Create the peer group, neighbor peer_group_name peer-group - Assign options to the peer group, neighbor peer_group_name option - Make neighbors member of the peer group neighbor IP address peer-group peer group name

Traducido al: español Mostrar texto original Más información

Página 24 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 25: Cisco 642 831 Cit Certificati

Question:

Which command can we use to make sure that the source address of the route is the transmitting router in BGP? A. neighbor IP_Address always B. neighbor IP_Address mask mask next-hop-self C. neighbor IP_Address remote-as next-hop-self D. neighbor IP_Address next-hop-self

Answer: D. neighbor IP_Address next-hop-self

Explanation: The neighbor IP_Address next-hop-self router configuration command makes sure that the source address of the transmitting router will remain the same when the route is injected on a multiaccess network.

Question:

Besides having a fully meshed network what could be other reasons to turn off synchronization in BGP? A. When no routes are redistributed into the AS. B. When all routers in the AS are running BGP. C. When the AS is a transit AS. D. When the AS is not a transist AS. E. When the routers at the egress and ingress point are running BGP.

Answer:B. When all routers in the AS are running BGP. D. When the AS is not a transist AS.

Explanation:

Synchronization can be turned off in BGP when: - all routers in the AS run BGP - the AS is not a transit AS - all the routers inside the AS are meshed

Question:

How do we turn off synchronization in BGP? A. R1(config-router)#no summarization B. R1(config-if)#no synchronization C. R1(config-router)#no auto-summary D. R1(config-router)#no synchronization E. R1(config-router)#neighbor ip_address no synchronization

Answer: D. R1(config-router)#no synchronization

Explanation: To turn off synchronization we use the no synchronization router configuration command.

Question:

When there are multiple route reflectors which attribute is used to identify the originating router? A. Cluster-ID B. AS_Path C. MED D. Origin E. Originator-ID

Answer: A. Cluster-ID

Explanation: When there are multiple route reflectors in the cluster to provide redundancy the originating router is identified by the Cluster-ID attribute. This attribute is used to prevent routing loops.

Question:

When a router is configured to forward routing updates to neighbors or peers in the same BGP AS it is called a _____________ ? A. confederation B. BGP peering session C. adjacency D. route reflector

Answer: D. route reflector

Explanation: A route reflector is a router configured to forward routing updates to neighbors or peers within the same AS.

Question:

The split horizon rule in BGP states? A. Updates learned from eBGP peers are not send to other eBGP peers. B. Only prefixes are redistributed to other iBGP systems. C. There is no split horizon rule in BGP since all neighbors are configured manually. D. Updates learned from iBGP peers are not send to other iBGP peers.

Answer: D. Updates learned from iBGP peers are not send to other iBGP peers.

Explanation: The split horizon rule states that no updates learned from iBGP peers can be sent to other iBGP peers and therefore avoid routing loops.

Question:

What are benefits of the BGP synchronization rule? A. consistency within the AS B. reduces routing updates C. removes the need for an IGP D. reduces unnecessary traffic E. reduces network resources

Answer:A. consistency within the AS D. reduces unnecessary traffic

Explanation:

A few benefits of synchronization are: - prevents traffic from being forwarded to unreachable destinations - reduces unnecessary traffic - ensures consistency within the AS

Question:

When will an iBGP router propogate a route to a BGP neighbor? A. When the route is received from another iBGP router. B. When the route is summarized. C. When the route is redistributed from an IGP. D. When the network command is used. E. When the route has the longest prefix match of all paths to the destination.

Answer:C. When the route is redistributed from an IGP. D. When the network command is used.

Explanation:

An iBGP router will propagate a route to another BGP neighbor when:

- the advertised route was generated by the transmitting router via one of the following methods:

�� - via the network command

Traducido al: español Mostrar texto original Más información

Página 25 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 26: Cisco 642 831 Cit Certificati

�� - redistributed static routes

- the advertised route is a connected route

Question:

Which of the following are benefits of using route reflectors? A. no need for an IGP B. faster convergence C. no need for synchronization within the AS D. reduction of network traffic

Answer:B. faster convergence D. reduction of network traffic

Explanation:

Some benefits of route reflectors are:

- improved scalability of the network

- strong hierarchical design

- reduction of network traffic

- reduction of memory and CPU resources

- faster convergence

Question:

How do we configure a route reflector? A. R1(config-router)#neighbor ip_address route-reflector-client B. R1(config-router)#neighbor ip_address route-reflector C. R1(config-router)#neighbor ip_address route-reflector-client remote-as AS_number D. R1(config-router)#neighbor ip_address route-reflector remote-as AS_number E. R1(config-router)#network ip_address route-reflector-client remote-as AS_number

Answer: A. R1(config-router)#neighbor ip_address route-reflector-client

Explanation: To configure a route reflector we use the neighbor ip_address router-reflector-client router configuration command.

Question:

We want to send a full BGP update to a specific peer. How do we achieve this? A. R1#clear ip bgp * B. R1#clear ip route bgp C. R1#clear ip bgp ip_address out D. R1#clear ip bgp ip_address in

Answer: C. R1#clear ip bgp ip_address out

Explanation: In order to let the BGP routing process send a full update to a peer we use the clear ip bgp neighbor_address out command.

Question:

How do we configure the router so that BGP peering sessions are not torn down when new configurations are implemented? A. R1(config-router)#neighbor neighbor_address soft-configuration inbound B. R1(config-router)#neighbor neighbor_address soft-configuration C. R1(config-router)#neighbor neighbor_address configuration inbound D. R1(config-router)#neighbor neighbor_address soft-inbound

Answer: A. R1(config-router)#neighbor neighbor_address soft-configuration inbound

Explanation:

We can configure BGP to store the prefixes before the policy application. This requires more memory but allows new configurations to be implemented without tearing down the BGP peering sessions. In order to achieve this we use the neighbor neighbor_address soft-configuration inbound router configuration command. Because this is on a per-neighbor basis and only for inbound updates we use the inbound keyword.

Question:

Why would we use policy-based routing in BGP? A. To make decisions based on Next-Hop and Origin attribute. B. To make decisions based on router resources. C. To reject or accept selected routes. D. To set attributes to influence path selection.

Answer:C. To reject or accept selected routes. D. To set attributes to influence path selection.

Explanation:

Reasons for applying policy-based routing in BGP are: - to make decision based on AS Path, Community or the prefix - to reject or accept select routes - to set attributes to influence the path selection

Question:

Which of the following statements are true about prefix lists? A. If a route is permitted then the route is used. B. There is no implicit deny at the bottom of every prefix list. C. A sequence number does not need to be specified when removing an entry. D. When there are multiple entries in the prefix list that match the prefix the highest sequence number is used. E. Sequence numbers have to be manually configured.

Answer:A. If a route is permitted then the route is used. C. A sequence number does not need to be specified when removing an entry.

Explanation:

Prefix permitting or denying is based on the following rules: - if the route is permitted it is used - if the route is denied it is not used - there is an implicit deny any at the bottom of every prefix list - when multiple entries of a prefix list match a given prefix, the entry with the smallest sequence number is used - the router begins the search for a match at the top of the prefix list, if a match is made the search stop - sequence numbers are automatically generated by default - sequence numbers do not need to be specified when removing a configuraton entry

Question: Which prefix list parameter do we use when the prefix is greater than or equal to the value stated in the list? A. le

Traducido al: español Mostrar texto original Más información

Página 26 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 27: Cisco 642 831 Cit Certificati

C. ge D. seq

Answer: C. ge

Explanation: The ge parameter is used if the prefix is greater than or equal to the value stated in the list.

Question:

OSPF sends out the topology table every ___________ ? A. 60 minutes B. 60 seconds C. 90 minutes D. 90 seconds E. 30 minutes F. 30 seconds

Answer: E. 30 minutes

Explanation: OSPF exchanges the full topology table at least every 30 minutes between adjacent routers.

Question:

Which of the following statements are true when you configure OSPF point-to-multipoint? A. There is no DR/BDR election. B. The network uses 1 subnet. C. There is a DR/BDR election. D. The network has to be fully meshed. E. Each spoke in the network has its own subnet.

Answer:A. There is no DR/BDR election. B. The network uses 1 subnet.

Explanation: When using point-to-mulitpoint OSPF configuration the network is in one subnet and there is no DR/BDR election.

Question:

Integrated IS-IS supports which protocols? A. IP B. CLNP C. IPX D. AppleTalk E. DecNet

Answer:A. IP B. CLNP

Explanation: Integrated IS-IS supports IP and CLNP.

Question:

What is the range of multicast addresses in IPv6? A. FF00::/8 to FFFF::/8 B. FF00::/8 to FF99::/8 C. FF00::/16 to FFFF::/16 D. FF00::/8 to FFAA::/8 E. FF00::/16 to FFAA::16

Answer: A. FF00::/8 to FFFF::/8

Explanation: The multicast address range in IPv6 is FF00::/8 to FFFF::/8 because all IPv6 multicast addresses have the first 8 bits set to 1, 1111 1111 or FF.

Question:

Which command will display the DoNotAge external LSA? A. Show ip ospf process_id B. Show ip ospf interface C. Show ip ospf database D. Show ospf database E. Show ip ospf neighbor

Answer: A. Show ip ospf process_id

Explanation: The show ip ospf process_id command will display the DoNotAge External LSA used with OSPF demand circuits, like ISDN.

Question:

OSPF supports which forms of authentication? A. Simple passwords B. MD5 C. NTLM D. Radius E. Kerberos

Answer:A. Simple passwords B. MD5

Explanation: OSPF supports simple passwords and MD5 authentication to authenticate packets send between neighbors.

Question:

How do we configure R1 to allow 10.1.0.0/16 to be processed by BGP? A. R1(config-router)#neighbor ip_address prefix-list allowed in R1(config-if)#ip prefix-list allowed permit 10.1.0.0/16 B. R1(config-router)#neighbor ip_address prefix-list allowed in R1(config-router)#ip prefix-list allowed permit 10.1.0.0 255.255.0.0 C. R1(config-router)#neighbor ip_address prefix-list allowed in R1(config)#ip prefix-list allowed permit 10.1.0.0/16 D. R1(config-router)#neighbor ip_address prefix-list allowed in R1(config-router)#ip prefix-list permit 10.1.0.0/16

Answer: C. R1(config-router)#neighbor ip_address prefix-list allowed in R1(config)#ip prefix-list allowed permit 10.1.0.0/16

Explanation: To configure a router to use a prefix list as a filter in distributing routes we use the neighbor ip_address prefix-list prefix_list_name in | out router configuration command. To configure the prefix list we use the ip prefix-list name deny | permit network/len global configuration command.

Question:

We want to know if there are any matches against our configured prefix lists. Which command do we use? A. show ip bgp prefix-list B. show bgp prefix-list C. show ip prefix-list detail D. show bgp prefix-list detail E. show ip bgp prefix-list summary

Answer: C. show ip prefix-list detail

Explanation:

R1# show ip prefix-list detail allowed ip prefix-list allowed:

Traducido al: español Mostrar texto original Más información

Página 27 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 28: Cisco 642 831 Cit Certificati

count: 1, range entries: 0, sequences: 10 - 10, refcount: 3 seq 10 permit 10.0.0.0/8 (hit count: 0, refcount: 1)

Question:

We want to create a prefix list that denies all prefixes between 192.168.1.0/20 and 192.168.1.0/24. How do we achieve this? A. ip prefix-list test deny 192.168.1.0/20 le 24 B. ip prefix-list test deny 192.168.1.0/24 ge 20 C. ip prefix-list test deny 192.168.1.0/24 le 20 D. ip prefix-list test deny 192.168.1.0/20 ge 24 E. ip prefix-list test deny 192.168.1.0 ge 20 le 24

Answer: A. ip prefix-list test deny 192.168.1.0/20 le 24

Explanation: When there is no ge value specified the prefix list uses only the prefixes between the len value and the le value. If no ge and le value is specified an exact match is assumed.

Question:

If we want to allow all prefixes between /8 and /16 how do we configure the prefix-list? A. ip prefix-list test permit 0.0.0.0/0 ge 8 le 16 B. ip prefix-list test permit 0.0.0.0/0 le 16 ge 8 C. ip prefix-list test permit 0.0.0.0 ge 8 le 16 D. ip prefix-list test permit 0.0.0.0/0 le 16

Answer: A. ip prefix-list test permit 0.0.0.0/0 ge 8 le 16

Explanation: In order to allow all prefixes between /8 and /16 we use the ip prefix-list prefix_list_name permit 0.0.0.0/0 ge 8 le 16 router configuration command. The ge value is the lower limit so the allowed/denied prefixes have to be greater in value then the ge value but smaller then the le value. Therefore we can say the le value is the upper limit for the prefixes.

Question:

In a multihomed AS and accepting only the default route from the ISPs how does BGP select the best path to the external network? A. By using the AS_Path attribute that selects the exit path to the Internet. B. By using the Originator-ID attribute that selects the exit path to the Internet. C. By using the gateway that advertised the route. D. By using the gateway with highest local-preference attribute.

Answer: C. By using the gateway that advertised the route.

Explanation: In a multihomed AS and accepting only the default route from the ISPs BGP select the best path to the external network by using the gateway that is advertising the route.

Question:

If there are multiple paths to the same destination how can we influence them using the Ciscos proprietary attribute? A. R1(config-router)#neighbor ip_address remote-as as_number weight value B. R1(config-router)#neighbor ip_address med value C. R1(config-router)#neighbor ip_address weight value D. R1(config-router)#neighbor ip_address local-preference value

Answer: C. R1(config-router)#neighbor ip_address weight value

Explanation: Weight is Ciscos proprietary attribute in BGP. The higher the value of this attribute the better the path. We use the neighbor ip_address weight value router configuration command to change the weight attribute. The default value is 32768 and the range extends from 0 to 65535.

Question:

Besides the weight attribute we can use another attribute to influence the path out of the AS when we have multiple paths. How do we achieve this? A. bgp local-preference value B. bgp default AS_Path value C. bgp default next-hop ip_address D. bgp default local-preference value

Answer: D. bgp default local-preference value

Explanation: We can use the bgp default local-preference router configuration command to inform the routers iBGP peers of the preferred exit path from the AS when there are multiple paths. The default value is 100.

Question:

How can we verify that certain BGP attributes (e.g. weight) have changed after configuration? A. show ip bgp B. show bgp attributes C. show ip bgp attributes D. show ip bgp summary

Answer: A. show ip bgp

Explanation: The show ip bgp command shows the BGP attributes and their values. This will verify any configuration changes made to tweak the BGP configuration.

Question:

In the show ip bgp output what does a status code of d means? A. The route is dampened. B. The route is deleted. C. The route is deleted from the BGP table. D. The route is being distibuted amongst the iBGP peers.

Answer: A. The route is dampened.

Explanation: If a route in the BGP table has a status code of d it means that this entry has been dampened.

Question:

How do we redistribute a supernet in BGP without using the aggregate-address command? A. This can not be done because BGP does not support VLSM. B. By redistributing the supernet into a dynamic routing protocol. C. By creating a static route for the supernet to Null0 and redistribute this route into BGP. D. By creating a static route for the supernet to the BGP speaking router at the egress point of the AS and redistriute this route into BGP.

Answer: C. By creating a static route for the supernet to Null0 and redistribute this route into BGP.

Explanation: Using a static route for the supernet pointing to Null0 and then redistributing this into BGP will let BGP advertise this route to its peers. If how ever this route dissappears from the IGP routing table it will still be advertised from BGP and traffic for will enter into the AS but without a destination and travel around the AS untill the TTL is expired and the packet is dropped.

Question:

Which of the following BGP attributes are used in optimal path selection? A. Aggregator B. Community C. Originator ID D. Atomic Aggregate E. Next Hop F L l P f

Traducido al: español Mostrar texto original Más información

Página 28 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 29: Cisco 642 831 Cit Certificati

Answer:E. Next Hop F. Local Preference G. Origin

Explanation:

BGP uses the the following attributes in path selection: - Origin - AS_Path - Next Hop - Multiple Exit Discriminator - Local Preference - Weight

Question:

Which OSPF debug command can we use to view the DR selection? A. debug ospf events B. debug ip ospf summary C. debug ip ospf events D. debug ip ospf adjacencies

Answer: C. debug ip ospf events

Explanation: The debug ip ospf events command will display information on OSPF related events such as adjacencies, DR selection, flooding information, SPF calculation.

Question:

If we do not want to use an OSPF debug command but still want receive syslog messages when adjacencies are changed which command do we use? A. log-adjacency-changes ospf B. log-adjacency-changes C. log-adjacency D. log-adjacency-all

Answer: B. log-adjacency-changes

Explanation: The log-adjacency-changes router configuration command will send syslog messages when adjacencies are changed. This command requires less resources then the debug commands.

Question:

We want to know when the last time SPF was executed on our IS-IS router. Which command do we use? A. show clns spf-log B. show clns spf C. show log D. show is-is spf-log E. show is-is spf

Answer: D. show is-is spf-log

Explanation: The show is-is spf-log command will display the last 20 occurences that triggered a SPF calculation on the router.

Question:

How can we display Sequence Number Packets in IS-IS? A. debug is-is update-packets B. debug is-is statistics C. debug is-is events D. show is-is packet

Answer: A. debug is-is update-packets

Explanation: The debug is-is update-packets will display sequence number packets (CSNP and PSNP) and LSPs that are detected by the router.

Question:

We want to see the Hellos exchanged by our EIGRP router. How do we achieve this? A. debug ip eigrp B. show ip eigrp C. debug eigrp neighbors D. debug ip eigrp traffic E. debug ip eigrp neighbors

Answer: C. debug eigrp neighbors

Explanation: The debug eigrp neighbors command will display Hello packets sent and received by the router and neighbors discovered via this process.

Question:

We want to control the BGP traffic by filtering out autonomous systems. How can do this? A. Use of Extended access-lists B. Use of Autonomous System path prefix-lists C. Use of Autonomous System path distribute-lists D. Use of Autonomous System path access-lists

Answer: D. Use of Autonomous System path access-lists

Explanation: We can use AS Path access-list to filter on Autonomous Systems.

Question:

What can we minimize the effect of flapping BGP routes? A. Implement route dampening B. Implement prefix-lists C. Increase the time between Keepalive messages D. Nothing

Answer: A. Implement route dampening

Explanation: When a route starts flapping this a damaging to the BGP table because of the extra network traffic and CPU resources used by the router. By implementing route dampening a flapping route will be considered an ill-behaved route and will get a penalty every time it flaps. If the penalties exceed a configured limit that route will be dampened.

Question:

Which command can we use to verify the BGP peer is using the correct table version? A. show bgp ip_address B. show ip bgp table ip_address C. show bgp neighbors ip_address D. show ip bgp neighbors ip_address

Answer: D. show ip bgp neighbors ip_address

Explanation: The show ip bgp neighbors ip_address will display that the neighbors has been updated with that version of the primary BGP routing table.

If our BGP network consists of 15 routers and we want to make this a fully meshed network how many sessions would there be?

Traducido al: español Mostrar texto original Más información

Página 29 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 30: Cisco 642 831 Cit Certificati

C. 100 D. 110 E. 105

Answer: E. 105

Explanation: We use the following formula to calculate the amount of sessions in a fully meshed network: n(n-1)/2 in this case 15(15-1)/2 = 105 sessions.

Question:

Which command will advertise routes into the BGP process? A. network network mask network_mask B. network network C. neighbor network mask network_mask D. network network network_mask

Answer: A. network network mask network_mask

Explanation: The network network mask network_mask router configuration command will identify which networks to be advertised by BGP.

Question:

When there is no sharing of information between routing processes we call this ______________ ? A. Ships in the night B. Redistribution-less C. Autonomous systems D. Areas

Answer: A. Ships in the night

Explanation: When there is no sharing of network information between the routing processes it is referred to as ships in the night routing.

Question:

Why would there be more then 1 routing protocol running in the same organization? A. Transition between routing protocols B. Host based solutions that need a different protocol C. Faster convergence D. Smaller networks with different protocols are more stable

Answer:A. Transition between routing protocols B. Host based solutions that need a different protocol

Explanation:

Following are some reasons why an organization might run more then 1 routing protocol: - It is transitioning between routing protocols - It used to be a collection of small networks and are merging to 1 large network - Host based solutions might require a different protocol, e.g. Unix hosts needing RIP to find gateways - The organization has acquired another organization and the networks merge - Different network administrator implemented different routing protocols

Question:

The default seed metric of IS-IS is? A. 20 B. 10 C. 0 D. infinity

Answer: C. 0

Explanation:

Routing Protocol Default Seed Metric Action

RIPinfinity (since IOS 12.1) no routes entered in the routing table

IGRP infinity no routes entered in the routing table

EIGRP infintiy no routes entered in the routing table

IS-IS 0 routes entered in the routing table

OSPF 20 (type2) but from BGP 1(type 2) routes entered in the routing table

BGP MED is given the IGP metric routes entered in the routing table

Question:

When a route is redistributed into another routing protocol without metrics defined it is assigned? A. The metric remains the same B. The same metric as the receiving protocol C. The seed metric D. The metric assigned is the average of metrics used by the receiving routing protocol

Answer: C. The seed metric

Explanation: The seed metric is assigned to all routes received into another routing protocol through redistribution.

Question:

How can we change the administrative distance of a routing protocol? A. R1(config-if)#distance value B. R1(config-router)#distance value default C. R1(config-router)#administrative-distance value D. R1(config-router)#distance value

Answer: D. R1(config-router)#distance value

Explanation: To change the administrative distance of a routing protocol we use the distance value router configuration command.

Question:

Which of the following statements about redistribution are true? A. When a route is redistributed it inherits the administrative distance of the new routing protocol. B. When a route is redistributed it inherits the metrics of the new routing protocol. C. When more then 1 routing protocol is running on the router the route with the best administrative distance will be placed in the routing table. D. When a route is redistributed the new routing protocol considers this route as an internal route.

Answer:A. When a route is redistributed it inherits the administrative distance of the new routing protocol. C. When more then 1 routing protocol is running on the router the route with the best administrative distance will be placed in the routing table.

Explanation:

The following rules are important to consider when using redistribution: - When a route is redistributed it inherits the administrative distance of the new routing protocol. - When more then 1 routing protocol is running on the router the route with the best administrative distance will be placed in the routing table. - When a route is redistributed the new routing protocol considers this route as an external route. - In order for a route to be redistributed it must have an entry in the routing protocol from where it originates

Traducido al: español Mostrar texto original Más información

Página 30 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 31: Cisco 642 831 Cit Certificati

Question:

Which of the following could be problems occuring when using route redistribution? A. Faster convergence B. Suboptimal routing C. Optimal routing D. Routing loops E. Simple configuration

Answer:B. Suboptimal routing D. Routing loops

Explanation:

Some of the problems that can occur when using route redistribution: - Suboptimal routing could occur when the wrong or less efficient routing decision is made - Routing loops could occur - Convergence time of the network increases because of the different technologies used - The decision-making process and the information sent within the protocols could incompatible and could lead to errors and complex configuration

Question:

In RIP, an interface that listens to updates but doesnt send any is a __________ interface. A. dampened B. quiet C. silent D. passive

Answer: D. passive

Explanation: A passive interface is an interface that doesnt participate in the routing process. In RIP and IGRP it will listen to updates but wont send any, in EIGRP and OSPF it will not send or listen to Hellos so no adjacencies will be formed.

Question:

When redistributing in EIGRP and using the default-metric command, in what order are the composite metrics applied? A. Bandwidth,Delay,Reliability,Loading,MTU B. First,Second,Third,Fourth,Fifth

Answer: A. Bandwidth,Delay,Reliability,Loading,MTU

Explanation: When redistributing in EIGRP, composite metric is assigned with the default-metric bandwidth delay reliability loading mtu command.

Question:

How do we change the administrative distance of EIGRP? A. R1(config)#router eigrp 10 R1(config-router)#distance 80 150 B. R1(config)#router eigrp 10 R1(config-router)#distance eigrp 80 150 default C. R1(config)#router eigrp 10 R1(config-router)#eigrp-distance 80 D. R1(config)#router eigrp 10 R1(config-router)#distance eigrp 80 150

Answer: D. R1(config)#router eigrp 10 R1(config-router)#distance eigrp 80 150

Explanation: In order to change the administrative distance of EIGRP we use the distance eigrp internal-distance external-distance in router configuration mode.

Question:

When using the redistribute command we can specify the metric-type. For which routing protocol is this necessary? A. RIP B. EIGRP C. OSPF D. IS-IS E. BGP

Answer: C. OSPF

Explanation: The metric-type keyword of the redistribute command is used by OSPF. It is used to specify the external link type, type 1 or type 2, associated with the default route advertised into OSPF.

Question:

How do we configure R1 so that routes are being redistributed? [Click exhibit for topology] A. No mannual redistriubution configuration is necessary. B. R1(config)#router igrp 40 R1(config-router)#redistribute eigrp 40 C. R1(config)#router eigrp 40 R1(config-router)#redistribute igrp 40 D. R1(config)#router eigrp 40 R1(config-router)#redistribute igrp 40 metric 10000 100 255 1 1500 R1(config)#router igrp 40 R1(config-router)#redistribute eigrp 40 metric 10000 100 255 1 1500

Answer: A. No mannual redistriubution configuration is necessary.

Explanation: When the autonomous system numbers of IGRP and EIGRP are the same redistribution will happen automatically. If they are not the same then manual redistribution is required.

Question:

How do we configure a candidate default path? A. ip default network B. ip network network C. ip default-network network network_mask D. ip default-network network

Answer: D. ip default-network network

Explanation: When a router is not directly connected to the default network but does have a route to it, it is considered a candidate default path. We can configure multiple candidate paths with the ip default-network network global configuration command.

Question:

What can you use to filter routing updates out of the routing process? A. Distribute lists B. Passive-interface C. Static routes D. Default routes

Answer: A. Distribute lists

Explanation: Distribute lists are access-lists applied to the routing process to determine which networks are entered in the routing table or are send in updates.

Question:

Of the routes being redistributed in our network we do not want the 10.1.0.0/16 network for security reasons. How do we configure the router to achieve this? A. R1(config)#router ospf 10 R1(config-router)#redistribute eigrp metric-type 2 R1(config-router)#distribute-list 10 in R1(config)#access-list 10 deny 10.1.0.0 B. R1(config)#router ospf 10 R1(config-router)#redistribute eigrp metric-type 2 R1(config-router)#distribute-list 10 in C. R1(config)#router ospf 10 R1(config-router)#redistribute eigrp metric-type 2 R1(config-router)#distribute-list 10 out R1(config)#access-list 10 deny 10.1.0.0 D R1(config)#router ospf 10 R1(config router)#redistribute eigrp metric type 2 R1(config router)#distribute list 10 in R1(config)#access list 10 permit

Traducido al: español Mostrar texto original Más información

Página 31 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 32: Cisco 642 831 Cit Certificati

Answer:A. R1(config)#router ospf 10 R1(config-router)#redistribute eigrp metric-type 2 R1(config-router)#distribute-list 10 in R1(config)#access-list 10 deny 10.1.0.0

Explanation: We use a distribute-list to filter out the network. The distribute-list will refer to an access list that permits or denies a network to be entered in the routing table

Question:

Which of the following are part of the DSP in IS-IS? A. NSEL B. IDI C. System ID D. Area ID E. High Order DSP F. AFI

Answer:A. NSEL C. System ID E. High Order DSP

Explanation:

The DSP or Domain Specific Part consists of: - High Order DSP - System ID - NSEL

Question:

Which command do we use to view the parameters of the routing procotols active on the router? A. show protocols B. show route protocols C. show ip route protocols D. show ip protocols

Answer: D. show ip protocols

Explanation: The show ip protocols will display the parameters and current state of the active routing protocol process(es).

Question:

How do we enable WFQ on an interface with a speed higher then 2Mbps? A. Weighted-fair-queue B. Fair-queue enable C. Weighted-fair-queue enable D. Fair-queue

Answer: D. Fair-queue

Explanation: To enable weighted fair queueing (WFQ) for an interface, use the fair-queue interface configuration command. WFQ is enabled by default on interfaces that have a bandwidth of 2.048Mbps or less.

Question:

Which utility do we use to identify where a problem is in the network? A. Trace B. Ping C. Telnet D. Show ip route

Answer: A. Trace

Explanation: The trace utility will identify where there is a problem in the network. Where the trace utility fails indicates a good starting point to troubleshoot the problem.

Question:

When would you use route maps? A. To control bandwidth B. To define more granular access lists C. To implement BGP D. To control redistribution E. To define policies in policy-based routing

Answer:D. To control redistribution E. To define policies in policy-based routing

Explanation:

Route maps can be used for the following: - To control redistribution - To control and modify routing information - To define policies in policy-based routing - To add granularity in the configuration of NAT - To implement BGP policy-based routing

Question:

Which of the following statements are true about route maps? A. A route map has a list of criteria defined with the match statement. B. A route map checks the criteria from highest sequence number to lowest. C. At the end of a route map there is an implicit permit and not an implicit deny like access lists. D. When a match is made the route map stops, just like access lists. E. Only extended access lists can be used with route maps.

Answer:A. A route map has a list of criteria defined with the match statement. D. When a match is made the route map stops, just like access lists.

Explanation: Route maps can use standard and extended IP access list and just like access lists they have an implicit deny at the end. Again, like access list, route maps are checked sequencially starting at the lowest number.

Question:

When will a set command be applied in the route map? A. When the packet match the criteria and the criteria is set to permit. B. When the packet match the criteria and the criteria is set to deny. C. When the packet doesnt match the criteria but the criteria is set to deny. D. When there is no match criteria specified but the route map is a deny.

Answer: A. When the packet match the criteria and the criteria is set to permit.

Explanation: The set command will only be applied if the statement is marked as permit and the packet meets the criteria.

Question:

What are some disadvantages of policy-based routing? A. More powerfull routers mean a bigger financial cost. B Additional CPU and memory resources needed

Traducido al: español Mostrar texto original Más información

Página 32 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 33: Cisco 642 831 Cit Certificati

D. Extra configuration is needed. E. QoS can not be implemented

Answer:B. Additional CPU and memory resources needed. D. Extra configuration is needed.

Explanation:

Some disadvantages of policy-based routing are: - A backup path should be in place in case the defined next-hop router goes down - Additional CPU is required to examine every source address to effect the defined policy - Extra configuration is required - Possibility exists that other traffic will be affected

Question:

How do we "enable" a route map for incoming traffic? A. R1(config)#ip policy route-map route_map_name B. R1(config-router)#ip policy route-map route_map_name C. R1(config-if)#ip policy route-map route_map_name D. R1(config-if)#ip route-map route_map_name

Answer: C. R1(config-if)#ip policy route-map route_map_name

Explanation: When a route map has been configured we use the ip policy route-map route_map_name interface configuration command for to enable it for incoming traffic.

Question:

How do we enable fast-switched policy-based routing? A. R1(config-if)#ip route-cache policy B. R1(config-if)#ip policy route-map route_map_name fast-switched C. R1(config)#ip route-cache policy D. R1(config-router)#route-cache policy

Answer: A. R1(config-if)#ip route-cache policy

Explanation: To enable fast-switched policy-based routing we use the ip route-cache policy interface configuration command.

Question:

How do we change the next hop for routes coming from 192.168.1.1? A. route-map Free-Tests permit 10 match ip address 10 set ip next-hop next_hop access-list 10 permit 192.168.1.1 B. route-map Free-Tests permit 10 match ip address 10 set ip next-hop next_hop access-list 1 permit 192.168.1.1 C. route-map Free-Tests deny 10 match ip address 10 set ip next-hop next_hop access-list 10 permit 192.168.1.1 D. route-map Free-Tests permit 10 match ip address 10 set ip next-hop next_hop

Answer:A. route-map Free-Tests permit 10 match ip address 10 set ip next-hop next_hop access-list 10 permit 192.168.1.1

Explanation:We use the set ip next hop command to alter the next hop for routes coming from 192.168.1.1, there must be an entry for the destination network of the packet in the routing table.

Question:

How can we control redistribution by only allowing routes that have a certain metric? A. match tag B. match ip metric C. match metric D. match route-type E. match ip route-source

Answer: C. match metric

Explanation: The match metric will only redistribute routes with the metric specified.

Question:

How can we display a list of route maps used for policy-based routing on the routers interface? A. show ip policy B. show ip interface policy C. show ip interface route-map D. show route-map

Answer: A. show ip policy

Explanation: The show ip policy displays the route maps used for policy-based routing on the routers interface.

Question:

How can see the dynamic changes being made to the EIGRP routing table? A. debug ip eigrp neighbors B. debug eigrp route C. debug ip eigrp D. debug ip eigrp packet

Answer: C. debug ip eigrp

Explanation: When the debug ip eigrp command is issued it will default to debug ip eigrp route that will show the dynamic changes made to the routing table.

Question:

The administrative distance of IS-IS is? A. 110 B. 120 C. 90 D. 100 E. 160 F. 115

Answer: F. 115

Explanation:

Source Administrative Distance

Connected Interface 0

Static Route 1

EIGRP Summary Route 5

External BGP 20

Internal EIGRP 90

IGRP 100

OSPF 110

Traducido al: español Mostrar texto original Más información

Página 33 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 34: Cisco 642 831 Cit Certificati

IS-IS 115

RIP 120

EGP 140

On Demand Routing (ODR) 160

External EIGRP 170

Internal BGP 200

Question:

When an IS-IS LSP arrives on a router with the OL bit set what is the significance of this? A. The sending router had detected congestion on the link. B. The sending router is a L1/L2 router. C. The sending router has run out of memory for the link-state database. D. The sending router has run out of CPU cycles to calculate the SPF algorithm.

Answer: C. The sending router has run out of memory for the link-state database.

Explanation: When a LSP has the OL (overload) bit set it means that the generating router has run out of memory for the link-state database.

Question:

When there is no match in policy-based routing what happens to the packet? A. It is send to the normal routing process to be routed to the destination. B. It is discarded and the source receives an ICMP destination unreachable message. C. It is routed to the Null0 interface and the source does not receive an ICMP destination unreachable message. D. It is routed to the Null0 interface and the source receives an ICMP destination unreachable message.

Answer: A. It is send to the normal routing process to be routed to the destination.

Explanation: When the packet does not match any of the criteria of the route map it is send to the normal routing process to be routed by destination.

Question:

What is the difference between set ip default next-hop and set ip next-hop? A. There is no difference between the two set commands. B. IP default next-hop is used when there is no entry in the routing table for the destination network and ip next-hop there must be an entry for the destination network in the routing table. C. IP next-hop is used when there is no entry in the routing table for the destination network and ip default next-hop there must be an entry for the destination network in the routing table. D. The ip default next-hop is used to set the default route and ip next-hop is just used to alter the path to the destination.

Answer:B. IP default next-hop is used when there is no entry in the routing table for the destination network and ip next-hop there must be an entry for the destination network in the routing table.

Explanation: Set ip default next-hop>/b> is used when the routing table has no entry for the destination network of the packet. The set ip next-hop is used when there is an entry for the destination network in the routing table. Both must have the address of the adjacent router.

Question:

How do we apply policy-based routing to packets generated by the router? A. R1(config-if)#ip local policy route-map route_map_name B. R1(config-router)#ip local policy route-map route_map_name C. R1(config)#ip policy route-map route_map_name D. R1(config-if)#ip policy route-map route_map_name local E. R1(config)#ip local policy route-map route_map_name

Answer: E. R1(config)#ip local policy route-map route_map_name

Explanation: To apply policy-based routing on packets generated by the router we use the ip local policy route-map route_map_name global configuration command.

Question:

How do we change the percentage of bandwidth used by EIGRP for its traffic? A. R1(config)#ip bandwidth-percent eigrp eigrp_as percent B. R1(config)#interface ethernet 0 R1(config-if)#ip bandwidth-percent eigrp_as percent C. R1(config)#interface ethernet 0 R1(config-if)#ip bandwidth-percent eigrp eigrp_as percent D. R1(config)#router eigrp 10 R1(config-router)#ip bandwidth-percent percent interface

Answer: C. R1(config)#interface ethernet 0 R1(config-if)#ip bandwidth-percent eigrp eigrp_as percent

Explanation: To change the percentage of bandwidth used by EIGRP for its traffic we use the ip bandwidth-percent eigrp eigrp_as percent interface configuration command.

Question:

What is the difference between a NET and a NSAP address? A. A NSAP address is the address of the host where the value of the NSEL is set to 0x00. B. A NET address is the address of the host where the value of the NSEL is set to 0x01. C. A NET address is the address of the host where the value of the NSEL is set to 0x00. D. A NET address is the address of the host where the value of the AFI is set to 49.

Answer: C. A NET address is the address of the host where the value of the NSEL is set to 0x00.

Explanation: A NET address is the address of the host where the value of the NSEL is set to 0x00. The NSAP is the full ISO address, the NSEL field specifies the upper-layer protocol.

Question:

On which layer of the OSI model do we find a TCP Segment? A. Network B. Data Link C. Session D. Transport E. Presentation F. Physical

Answer: D. Transport

Explanation: TCP Segments are found on the Transport layer of the OSI Model.

Question:

Which of the following statements are true about Layer 2 devices? A. Bridges and switches use a routing protocol to avoid loops. B. Broadcasts and multicast frames are flooded out of all ports except the port it came from. C. Frames destined to an unknown location are send to the default gateway. D. Broadcasts and multicast frames are flooded out of all ports. E. Bridges and switches use spanning tree to avoid loops. F. Frames destined to an unknown location are discarded.

B. Broadcasts and multicast frames are flooded out of all ports except the port it came from.

Traducido al: español Mostrar texto original Más información

Página 34 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 35: Cisco 642 831 Cit Certificati

Explanation:

Layer 2 devices have the following functions: - MAC addresses are learned from incoming frames source address - A table of MAC addresses and their associated bridge and switch ports is build and maintained - Broadcast and multicast frames are flooded out of all ports except the one the frame came from - Frames destined to an unknown destination are flooded out of all ports except the one the frame came from - Bridges and switches use spanning tree to avoid loops

Question:

How does a switch provide isolation from other connected hosts? A. Each switchport notifies the other ports of errors being seen. B. Errors in frames are minimized because of the half-duplex operation of a port. C. Bandwidth is shared on the switching fabric. D. Errors in frames are not propagated. E. Each switchport offers dedicated bandwidth.

Answer:D. Errors in frames are not propagated. E. Each switchport offers dedicated bandwidth.

Explanation:

A switch provides isolation from other hosts by the following: - each switch port is a collision domain. - no contention on the media because of the full-duplex operation - each switch port offers dedicated bandwidth across a switching fabric to another switch port - errors in frames are not propagated - broadcast traffic can be limited to a treshold - other methods of filtering can be implemented

Question:

When a unicast frame enters the switch and the destination MAC address is not known what will happen to the frame? A. It will be discarded by the switch. B. It will be send to the default gateway. C. It will be discarded by the switch and an ICMP message will be send to the source. D. It will be flooded out of all ports.

Answer: D. It will be flooded out of all ports.

Explanation: When a unicast frame with an unknown destination MAC address enters the switch it will be flooded out of all ports, this is known as unknown unicast flooding.

Question:

The Layer 2 forwarding table is also called? A. Cached Addressable Memory B. Content Allocated Memory C. Content Access Memory D. Content Addressable Memory

Answer: D. Content Addressable Memory

Explanation: The Layer 2 forwarding table or Content Addressable Memory uses the frames destination MAC Address as an index. If the address is found, the egress switch port and the appropriate VLAN ID are read from the table.

Question:

When using a topology-based multilayer switching, this type is called? A. Netflow LAN switching B. Demand-based switching C. Netflow switching D. Cisco Express Forwarding

Answer: D. Cisco Express Forwarding

Explanation: When using topology-based MLS we also call it Cisco Express Forwarding.

Question:

Which of the following do we find in multilayer switching but not in Layer 2 switching? A. Security ACLs B. QoS ACLs C. Content Addressable Memory D. Forwarding Information Base

Answer: D. Forwarding Information Base

Explanation: The Forwarding Information Base, FIB, or Layer 3 forwarding table is found in MLS. It contains the current routing table database.

Question:

When can CEF be used to forward an IP Packet? A. When the source and destination address is known, both Layer 2 and 3. B. When no IP parameters have to be manipulated. C. When the Layer 2 source and destination address is known. D. When the packet is a CDP packet. E. When the packet is a routing protocol update.

Answer:A. When the source and destination address is known, both Layer 2 and 3. B. When no IP parameters have to be manipulated.

Explanation: When the source and destination address is known, both Layer 2 and 3, and no IP parameters have to be manipulated then CEF can directly forward most IP packets.

Question:

After how many seconds of idle time is an entry deleted from the CAM table? A. 60 B. 600 C. 900 D. 300 E. 90 F. 30

Answer: D. 300

Explanation: By default an entry is deleted from the CAM table after 300 seconds of idle time.

Question:

How do we change the time a switch waits before deleting an entry from the CAM table? A. S1(config)#mac address-table aging-time seconds B. S1(config-address-table)#aging-time seconds C. S1(config)#mac aging-time seconds D. S1(config)#cam-table aging-time seconds

Answer: A S1(config)#mac address-table aging-time seconds

Traducido al: español Mostrar texto original Más información

Página 35 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 36: Cisco 642 831 Cit Certificati

Explanation: The mac address-table aging-time seconds global switch configuration command enables us to change the default aging time from 300 seconds to a more appropriate value if necessary. Prior to Catalyst IOS version 12.1 the command used to be mac-address-table aging-time seconds, the newer version omit the first hyphen.

Question:

Which of the following are part of the Ternary Content Addressable Memory? A. Feature Manager B. Routing Database Manager C. Switching Database Manager D. Filter Manager E. Forwarding Information Base

Answer:A. Feature Manager C. Switching Database Manager

Explanation: The 2 components part of the TCAM operation are: - Feature Manager, compiles or merges ACE into entries in the TCAM table - Switching Database Manager, when the TCAM is partitioned into different functions this configures or tunes those partitions

Question:

How do we configure a permanent entry in the CAM table? A. S1(config)#mac address-table mac_address vlan vlan_id interface type mod/port permanent B. S1(config)#mac address-table mac_address vlan vlan_id interface type mod/port C. S1(config-address-tabel)#mac_address vlan vlan_id interface type mod/port D. S1(config)#mac address-table static mac_address vlan vlan_id interface type mod/port

Answer: D. S1(config)#mac address-table static mac_address vlan vlan_id interface type mod/port

Explanation:

To enter a permanent entry in the CAM table we use the mac address-table static mac_address vlan vlan_id interface type mod/port global switch configuration command. Prior to Catalyst IOS version 12.1 the command used to be mac-address-table static mac_address vlan vlan_id interface type mod/port, the newer version omit the first hyphen.

Question:

Which of the following are part of a TCAM entry? A. Result B. Weight C. Mask D. Length E. MAC Address F. Value G. Age

Answer:A. Result C. Mask F. Value

Explanation: TCAM entries are composed of Value, Mask and Result combinations.

Question:

How do we display the CAM table? A. show address-table B. show cam C. show mac-table D. show mac address-table dynamic

Answer: D. show mac address-table dynamic

Explanation: The show mac address-table dynamic command will display the CAM table.

Question:

Which command can we use to display the TCAM partitions? A. show sdm partitions B. show tcam partitions C. show memory partitions D. show sdm prefer

Answer: D. show sdm prefer

Explanation: The show sdm prefer command will display the current TCAM partitioning.

Question:

How do we change the name of the switch? A. S1(config)>hostname name B. S1#hostname name C. S1(config-switch)#hostname name D. S1(config)#hostname name

Answer: D. S1(config)#hostname name

Explanation: As on a Cisco router, the hostname global configuration command will change the name of the switch.

Question:

How do we set a password on all vty lines? A. S1(config)#line vty 0 4 S1(config-line)#password password B. S1(config)#line vty S1(config-line)#password password C. S1(config)#line vty all S1(config-line)#password password D. S1(config)#line vty 0 15 S1(config-line)#password password

Answer: D. S1(config)#line vty 0 15 S1(config-line)#password password

Explanation: To set a login password on all the vty lines, 0 15, we use the password password line configuration command.

Question:

Which are of the following are part of the DSCP value? A. 3 bit Class Selector B. 3 bit IP Presedence C. 3 bit Drop Presedence D. 3 bit ToS value E. 3 bit CoS value

Answer:A. 3 bit Class Selector C. 3 bit Drop Presedence

Explanation: The DSCP value is divided into a 3 bit Class Selector and 3 bit Drop Presedence.

Traducido al: español Mostrar texto original Más información

Página 36 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 37: Cisco 642 831 Cit Certificati

Question: Match the IP Presedence value with the name A. 0,1,2,3,4,5,6,7 B. Routine, Priority, Immediate, Flash, Flash override, Critical, Internetwork Control, Network Control

Answer: B. Routine, Priority, Immediate, Flash, Flash override, Critical, Internetwork Control, Network Control

Explanation:

Name Value

Routine 0

Priority 1

Immediate 2

Flash 3

Flash Override 4

Critical 5

Internetwork Control 6

Network Control 7

Question:

How do we assign a default gateway to the default management VLAN? A. S1(config)#interface vlan 1 S1(config-vlan)#ip default-gateway ip_address B. S1(config)#interface vlan 1 S1(config-if)#ip route 0.0.0.0 0.0.0.0 next_hop C. S1(config)#interface vlan 1 S1(config-if)#ip default-gateway ip_address D. S1(config)#ip default-gateway ip_address

Answer: C. S1(config)#interface vlan 1 S1(config-if)#ip default-gateway ip_address

Explanation: The default management VLAN is VLAN 1. We use the ip default-gateway ip_address interface configuration command to assign a default gateway to the switch. Together with an IP_Address this will allow for remote access of the switch.

Question:

How do we disable CDP on a switch port? A. S1(config-if)#no cdp run B. S1(config-if)#cdp disable C. S1(config-if)#no cdp enable D. S1(config)#no cdp run interface type mod/port

Answer: C. S1(config-if)#no cdp enable

Explanation: CDP is enabled by default on all switch interfaces. To disable CDP we use the no cdp enable interface configuration command.

Question:

If the flash memory is corrupted what can be done to repair it? A. format flash: B. erase flash: C. delete flash: D. defrag flash: E. sqeeze flash:

Answer: A. format flash:

Explanation: Using the format flash command will reformat the flash memory, destroying all files. This could be appropriate when the flash memory has been corrupted.

Question:

What command can we use to check that an IOS image is not corrupted after being copied into flash memory? A. check flash:filename B. more flash:filename C. show flash:filename D. verify flash:filename

Answer: D. verify flash:filename

Explanation: The verify flash:filename command will check the checksum of the file, e.g.IOS name to ensure that this hasnt been corrupted after it has been copied into flash memory.

Question:

How do we display a summary of the neighbor switch names and management IP addresses? A. show cdp neighbors * B. show cdp entry * protocol C. show cdp entry summary D. show cdp neighbors summary E. show cdp neighbors brief

Answer: B. show cdp entry * protocol

Explanation: The show cdp entry * protocol command will display a brief summary of only the neighbors switch names and management IP Addresses.

Question:

In MLS, what is used for the traditional Layer 3 routing function? A. Cisco Express Forwarding B. Store-and-Forward C. Cut-Through D. BGP E. MPLS

Answer: A. Cisco Express Forwarding

Explanation: In MLS, Multilayer Switching, the traditional Layer 3 routing function is provided by Cisco Express Forwarding (CEF). A database of routes to every destination network is maintained and distributed to switching ASICs for very high forwarding performance.

Question:

How can we divide a broadcast domain? A. Implement Layer 2 switching B. Implement Layer 2 bridging C. Implement Layer 3 bridging D. Implement VLANs E. Implement Layer 3 routing

Answer:D. Implement VLANs E. Implement Layer 3 routing

Explanation: We can divide broadcast domains by implementing VLANs or by segmenting the network using routers or Layer 3 switches.

Traducido al: español Mostrar texto original Más información

Página 37 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 38: Cisco 642 831 Cit Certificati

B. 20 percent of network traffic is unicast traffic and 80 percent is broadcast/multicast traffic. C. 80 percent of network traffic is local to the segment and 20 percent is to be routed via the network backbone. D. 20 percent of network traffic is local to the segment and 80 percent is to be routed via the network backbone.

Answer: C. 80 percent of network traffic is local to the segment and 20 percent is to be routed via the network backbone.

Explanation: The 80/20 rule specifies that 80 percent of the network traffic on a segment is local (switched) traffic and 20 percent of the network traffic needs to be routed via the network backbone.

Question:

What can we do if the network backbone becomes congested because of the traditional 80/20 rule? A. Implement faster links between the different networks B. Move users logically (VLANs) and physically to stay near their workgroup C. Implement MLS D. Move all resources to 1 big datacentre E. Bring resources closer to the users

Answer:B. Move users logically (VLANs) and physically to stay near their workgroup E. Bring resources closer to the users

Explanation:

The following are a few solutions a network administrator can implement to reduce the traffic of the network backbone: - reassign resources to bring the users and servers closer together - move applications and files to a different server to stay within the workgroup - move users logically and physically to stay near their workgroup - add more servers, which can bring resources closer to the workgroups

Question:

What are the three layers of Ciscos Hierarchical Network Design? A. Backbone B. Host-to-Host C. Internetwork D. Network E. Core F. Distribution G. Access

Answer:E. Core F. Distribution G. Access

Explanation:

The three layers are:

core backbone

distribution routing takes place here

access switching takes place here

Question:

Which of the following functions relate to the Access layer of Ciscos hierarchical network design? A. High throughput at Layer 3 B. Advanced QoS C. Security D. High port density E. Low cost per switch port

Answer:D. High port density E. Low cost per switch port

Explanation:

The following are some capabilities of the Access layer: - low cost per switch port - high port density - scalable uplinks to higher layers - user access functions, e.g. VLAN membership, traffic and protocol filtering - resiliency through multiple uplinks

Question:

Which of the following functions relate to the Core layer of Ciscos hierarchical network design? A. High availability B. High troughput on Layer 2 and 3 C. Advanced QoS D. Security and Policy-Based connectivity E. VLAN membership F. High port density G. Low cost per switch port

Answer:A. High availability B. High troughput on Layer 2 and 3 C. Advanced QoS

Explanation:

The following are some capabilities of the Core layer: - very high througput on Layer 2 and 3 - no costly or unnecessary packet manipulations, e.g. access lists - redundancy and resilience for high availability - advanced QoS functions

Question:

Which of the following switches would you find at the Access layer of Ciscos hierarchical network? A. Catalyst 6500 B. Catalyst 3550 (SMI) C. Catalyst 3550 (EMI) D. Catalyst 2950 E. Catalyst 4006

Answer:B. Catalyst 3550 (SMI) D. Catalyst 2950

Explanation:

The following Catalyst switches can be found at the Access layer: - Catalyst 2950 - Catalyst 3550 SMI - Catalyst 4000/4500 (Sup III or IV)

Traducido al: español Mostrar texto original Más información

Página 38 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 39: Cisco 642 831 Cit Certificati

Question:

If we have a remote service, i.e. different segments/VLANs, how does the traffic flows through the Cisco hierarchical network design model? A. Access layer only. B. From Access layer to Core layer. C. From Distribution layer to Core layer. D. From Access layer to Distribution layer.

Answer: D. From Access layer to Distribution layer.

Explanation:

Based on the location of the network service in relation to the end user we have the following types:

Service Type Location of Service Traffic Flow

Local Same segment/VLAN Access layer only

Remote Different segment/VLAN Access to distribution layers

Enterprise Central to all campus users Access to distribution to core layers

Question:

A switch/bridge is found at Layer ___ of the OSI model? A. 3 B. 1 C. 6 D. 2 E. 4

Answer: D. 2

Explanation: Switches and bridges are found on Layer 2, the data link layer, of the OSI model.

Question:

In a modular network design a collection of services related to external network access is called? A. Management block B. Service Provider edge block C. Core block D. Enterprise edge block

Answer: D. Enterprise edge block

Explanation: A enterprise edge block is a collection of services related to the external network access, along with the access and distribution switches.

Question:

A switch block contains which of the following Ciscos hierarchical network design layers? A. Access only B. Acccess to distribution to core layers C. distribution to core layers D. Access and distribution

Answer: D. Access and distribution

Explanation: A switching block contains the access and distribution layers of Ciscos hierarchical network design model.

Question:

Which of the following factors should be considered when designing a switch block? A. Speed of the uplinks B. Size and number of workgroups C. If the core is a dual or collapsed backbone D. Traffic types E. Type of spanning tree used

Answer:B. Size and number of workgroups D. Traffic types

Explanation:

When sizing a switch block take in consideration some of the following: - traffic types and patterns - number of users to the access layer switches - size of spanning tree domains - size and number of common workgroups - geographical boundaries of subnets or VLANs

Question:

Click on the exhibit. What type of core does this represents? A. Collapsed Core B. Redundant Core C. Backbone Core D. Dual Core

Answer: D. Dual Core

Explanation: In a Dual Core topology the core block provide two or more redundant link to the switch block.

Question:

When we design the core block what are some designs we could use? A. Backbone Core B. ATM Core C. Layer 3 Core D. Dual Core E. Collapsed Core F. Redundant Core

Answer:D. Dual Core E. Collapsed Core

Explanation: There are 2 basic designs of core blocks: - Collapsed Core - Dual Core

Question:

Which of the following resources would we find in the network management block? A. Syslog servers B. IDS management applications C. WAN access D. Enterprise Resource Planning servers E. Mainframe systems F. Intranet services

A S slog ser ers

Traducido al: español Mostrar texto original Más información

Página 39 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 40: Cisco 642 831 Cit Certificati

Explanation:

Some of the following resources can be found in the network management block: - network monitoring applications - system logging servers - authentication, authoriation and accounting servers - policy management applications - system administration and remote control services - intrustion detection management applications

Question:

Which of the following resources would we find in the enterprise edge block? A. Corporate email B. Internet access C. Intranet access D. WAN access E. Syslog servers

Answer:B. Internet access D. WAN access

Explanation:

The enterprise services that are in the enterprise edge block are usually divided in the following categories: - internet access - remote access and vpn - E-commerce - WAN access

Question:

What are some implications of using Layer 2 switches in the distribution layer? A. STP must only run in the distribution layer. B. The use of redundant Layer 3 links in the core is forfaited. C. There is no need for a Layer 3 connection in the core. D. STP must run in all layers to prevent bridging loops. E. STP could increase the downtime when a link fails due to the unblocking or redundant links.

Answer:D. STP must run in all layers to prevent bridging loops. E. STP could increase the downtime when a link fails due to the unblocking or redundant links.

Explanation:

Some implications of using a Layer 2 distribution layer are: - redundant Layer 3 gateways can still be used in the core - each VLAN propogates across the redundant link from the access to the core layer, this could produce Layer 2 bridging loops - STP must run in all layers to prevent bridging loops - STP could increase the downtime when a link fails due to the unblocking or redundant links - broadcast traffic reaches the core layer so bandwidth on uplinks and within the core is waisted

Question:

How do we clear the CDP cache? A. clear cdp entries * B. clear cdp cache C. clear cdp neighbors D. clear cdp table

Answer: D. clear cdp table

Explanation: The clear cdp table command will clear the CDP cache to see what new information is being received from the neighbors.

Question:

What command will display the current running environment and IOS version? A. show version B. show history C. show config D. show module E. show running-config

Answer: A. show version

Explanation: The show version command will display the current running environment and the IOS version.

Question:

When using LRE over a distance of 5000 feet what is the maximum full-duplex bandwidth? A. 100 Mbps B. 15 Mbps C. 1000 Mbps D. 5 Mbps E. 10 Mbps

Answer: D. 5 Mbps

Explanation:

LRE or Long Reach Ethernet has to the following bandwidth restrictions: - 5 Mbps full-duplex up to 5000 feet - 10 Mbps full-duplex up to 4000 feet - 15 Mbps full-duplex up to 3000 feet

Question:

In autonegotiation 100Base-TX uses which priority? A. 3 B. 1 C. 2 D. 4 E. 5 F. 6 G. 7

Answer: A. 3

Explanation:

Priority Ethernet media

7 100BASE-T2 Full Duplex

6 100BASE-TX Full Duplex

5 100BASE-T2 Half Duplex

4 100BASE-T4

3 100BASE-TX

2 10BASE-T Full Duplex

Traducido al: español Mostrar texto original Más información

Página 40 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 41: Cisco 642 831 Cit Certificati

Question:

1000BASE-T is based on which IEEE standard? A. 802.3 B. 802.1Q C. 802.3ab D. 802.3z

Answer: C. 802.3ab

Explanation: 1000BASE-T or "Gigabit over copper" is based on the IEEE 802.3ab standard.

Question:

We want to disable a port when an error is detected. How do we configure the switch? A. S1(config-if)#errdisable detect cause all B. S1(config-if)#disable detect cause all C. S1(config)#errdisable cause all D. S1(config)#errdisable detect cause all

Answer: D. S1(config)#errdisable detect cause all

Explanation: We use the errdisable detect cause [all | cause_name] global configuration command to disable a switchport when an error condition is detected.

Question:

How can we see a list of all ports that are in errdisable state? A. show interface errdisabled B. show errdisabled C. show interface status err-disabled D. show status errdisabled

Answer: C. show interface status err-disabled

Explanation: To view a list of all ports in errdisable state we use the show interface status err-disabled command.

Question:

Which of the following will not trigger a errdisable state? A. all B. duplex-flap C. rootguard D. colguard E. pagp-flap

Answer:B. duplex-flap D. colguard

Explanation:

An errdisable state can be triggered by one of the following: - all - bpduguard - dtp-flap - link-flap - pagp-flap - rootguard - udld

Question:

How can we bring a switch port manually out of errdisable state? A. Use the no errdisable command. B. Perform a clear interface command. C. Perform a shutdown and no shutdown on the interface. D. If errdisable is configured it has to remain in that state untill the recovery time interval has elapsed.

Answer: C. Perform a shutdown and no shutdown on the interface.

Explanation: To manually recover a switch port from an errdisable state we use the shutdown and no shutdown interface configuration command to "bounce" the interface.

Question:

How can we assign common configuration settings to multiple switch ports? A. S1(config)#interface range type module/first_port last_port B. S1(config-if)#interface range type module/first_port last_port C. S1(config)#interface-range type module/first_port last_port D. S1(config-if)#range type module/first_port last_port E. S1(config)#port range type module/first_port last_port

Answer: A. S1(config)#interface range type module/first_port last_port

Explanation: To assign common configuration settings to multiple switchports we use the interface range type module/first_port last_port global configuration command.

Question:

For testing purposes we need to change the configuration numerous times on multiple switch ports. How can we make do and undo these changes easily? A. Create a macro with the command with the define interface range macro_name int_type/first_port last_port command. B. Create a macro with the command with the define macro_name interface range int_type/first_port last_port command. C. Create a macro with the command with the define macro_nameint_type/first_port last_port command. D. Create a macro with the command with the macro interface range macro_name int_type/first_port last_port command.

Answer: A. Create a macro with the command with the define interface range macro_name int_type/first_port last_port command.

Explanation: If we need to make multiple configuration changes on the same switch for testing purposes and undo them we can define macros that contain those commands. We use the define interface range macro_name int_type/first_port last_port global configuration command.

Question:

When a switch port is configured for being disabled on an error condition and automatic recovery how do assign the time that the port is disabled? A. S1(config)#recovery interval seconds B. S1(config)#errdisable recovery interval seconds cause all C. S1(config-if)#errdisable recovery interval seconds D. S1(config)#errdisable recovery interval seconds

Answer: D. S1(config)#errdisable recovery interval seconds

Explanation: When a errdisable causes are configured for automatic recovery we can set the time a swith port remains disable with the errdisable recovery interval seconds global configuration command. The default time is 300 seconds.

Question: Static VLANs offer membership based on? A. host-based B MAC address based

Traducido al: español Mostrar texto original Más información

Página 41 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 42: Cisco 642 831 Cit Certificati

C. port-based D. Priority based

Answer: C. port-based

Explanation: Static VLAN membership is port-based, switch ports are assigned to a specific VLAN.

Question:

How do we configure a static VLAN on S1? A. S1#vlan vlan_numb B. S1(config)#vlan S1(config-vlan)#vlan vlan_numb C. S1(config)#vlan vlan_numb D. S1(config-if)#switchport access vlan vlan_numb

Answer: C. S1(config)#vlan vlan_numb

Explanation: To configure a static VLAN we use the vlan vlan_number global configuration command.

Question:

Dynamic VLANs use __________ to provide membership. A. Hostnames B. Switch ports C. IP Addresses D. MAC Addresses

Answer: D. MAC Addresses

Explanation: Dynamic VLANs provide membership based on MAC Addresses. These MAC Addresses have to be entered in the database of the VMPS, VLAN Membership Policy Server.

Question:

Which type of VLANs should we implement if we want to follow the 80/20 rule? A. Local B. Transparent C. Dynamic D. End-to-End

Answer: D. End-to-End

Explanation: End-to-End VLANs group the users by common requirements, i.e. the users have the same traffic flow pattern. The 80/20 rule states that 80 percent of the traffic is local to the workgroup so end-to-end VLANs are ideal for this situation. It is worth mentioning that end-to-end VLANs are not recommended because broadcast traffic will traverse the entire network.

Question:

Which protocols can we use to identify VLANs? A. ISL B. 802.1Q C. STP D. VTP E. 802.1D

Answer:A. ISL B. 802.1Q

Explanation: VLAN identification can use one of the following protocols: - ISL, Inter-Switch Link [Cisco proprietary] - 802.1Q, an IEEE standard

Question:

Which of the following statements are true? A. 802.1Q adds a new header to the frame. B. ISL encapsulates the whole frame between its header and trailer. C. 802.1Q encapsulates the whole frame between its header and trailer. D. 802.1Q adds a 4 byte-tag to the frame. E. ISL adds a 4 byte-tag to the frame. F. 802.1Q adds a 6 byte-tag to the frame. G. ISL adds a 6 byte-tag to the frame. H. ISL adds a new header to the frame.

Answer:B. ISL encapsulates the whole frame between its header and trailer. D. 802.1Q adds a 4 byte-tag to the frame.

Explanation: ISL encapsulates the whole frame between its header and trailer while 802.1Q adds a 4 byte-tag to the frame.

Question:

When using 802.1Q and there is no tagging on the frame, the frame belongs to the ______ VLAN. A. default B. common C. native D. first E. universal

Answer: C. native

Explanation: When using 802.1Q, frames that belong to the native VLAN are not encapsulated with any tagging information.

Question:

Which of the following are part of the 4 bytes that 802.1Q adds to the frame? A. DSCP B. CRC C. FIB D. CoS E. TPID F. TCI

Answer:E. TPID F. TCI

Explanation: The first two bytes are used for the Tag Protocol Identifier (TPID) and the last 2 bytes are used for the Tag Control Information (TCI).

Question:

How do we configure a switch port to be a 802.1Q trunk? A. S1(config-if)#switchport trunk encapsulation dot1q S1(config-if)#switchport mode access B. S1(config-if)#switchport trunk encapsulation dot1q S1(config-if)#switchport mode trunk C. S1(config-if)#switchport trunk encapsulation 802.1Q S1(config-if)#switchport mode trunk D. S1(config-if)#trunk encapsulation dot1q S1(config-if)#switchport mode trunk

A B S1( fi if)# it h t t k l ti d t1 S1( fi if)# it h t d t k

Traducido al: español Mostrar texto original Más información

Página 42 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 43: Cisco 642 831 Cit Certificati

Explanation: In order to configure a switchport as a trunk we set the encapsulation type with the switchport trunk encapsulation {isl | dot1q | negotiate} interface configuration command. Still in interface configuration mode we use the switchport mode trunk command to tell the swith that this port is a trunk.

Question:

How do we configure the trunk to allow only vlan 5 to be trunked? A. S1(config-if)#switchport trunk allowed vlan 5 B. S1(config-if)#switchport trunk vlan 5 C. S1(config-if)#switchport trunk except vlan 5 D. S1(config-if)#switchport mode trunk allowed vlan 5

Answer: A. S1(config-if)#switchport trunk allowed vlan 5

Explanation: The switchport trunk allowed vlan vlan_list interface configuration command defines which VLANs can be trunked over the link, by default all VLANs, 1 to 4094, are allowed over the link.

Question:

If switchport mode dynamic auto is configured the port will become a trunk when _______. A. The other end is configured as dynamic auto. B. Only when the other end is configured as trunk. C. When the other end is configured as nonegotiate. D. The other end is configured as trunk or dynamic desirable.

Answer: D. The other end is configured as trunk or dynamic desirable.

Explanation: When switchport mode dynamic auto is configured the port will become a trunk when the far-end switchport is set to trunk or dynamic desirable.

Question:

Which control protocol PDUs are sent over VLAN 1 on a trunk? A. VTP B. TPID C. STP D. SSP E. DSCP F. SLB G. CDP H. GLBP

Answer:A. VTP C. STP G. CDP

Explanation: STP, VTP and CDP are also known as Layer 2 Control Protocol Data Units and are sent over VLAN 1 on a trunk.

Question:

Which 2 requirements have to be fulfilled when using EoMPLS? A. EoMPLS has to be configured only on the interior label switch routers. B. The service provider must have VPNs in the MPLS core network. C. EoMPLS has to be configured on all MPLS routers. D. EoMPLS has to be configured only on the edge routers. E. The service provider must have a MPLS core network.

Answer:D. EoMPLS has to be configured only on the edge routers. E. The service provider must have a MPLS core network.

Explanation:An EoMPLS tunnel requires 2 things to be fulfilled: - The service provider must have a MPLS core network - EoMPLS must be configured only on the edge routers that interface with the customer networks

Question:

Which of the following parameters have to be negotiated before a trunk operates correctly? A. STP timers B. trunking mode C. trunk speed D. trunk encapsulation E. DTP timers

Answer:B. trunking mode D. trunk encapsulation

Explanation:For a trunk to operate correctly the following parameters have to be agreed on: - trunking mode (trunk, negotiated, nonnegotiate) - encapsulation (ISL, 802.1Q, DTP negotiated) - native VLAN (802.1Q only) - allowed VLANs

Question:

Which command do we use to view the allowed VLANs on a trunk? A. show trunk B. show trunk vlan C. show interface type mod/num trunk D. show interface trunk E. show trunk interface type mod/num trunk

Answer: C. show interface type mod/num trunk

Explanation: The show interface type mod/num trunk command will display information about allowed VLANs, encapsulation, native VLAN,...

Question:

Which of the following are NOT VTP modes? A. Transitional B. Transparent C. Native D. Slave E. Server F. Master G. Client

Answer:

A. Transitional C. Native D. Slave F. Master

Explanation:

VTP has 3 modes: - Server - Client - Transparent

Traducido al: español Mostrar texto original Más información

Página 43 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 44: Cisco 642 831 Cit Certificati

Question:

In which VTP mode can you create locally significant VLANs? A. Transparent B. Server C. Client D. Native

Answer: A. Transparent

Explanation: In transparent mode you can create VLANs on the switch but the switch does not synchronize its database with received VTP advertisments nor will it advertise its own VLAN configuration.

Question:

How can we reset the VTP revision number back to zero? A. By using the clear vtp counters command. B. Change the switch to client mode then change it back to server mode. C. By using the clear vtp command. D. Change the switch to transparent mode then change it back to server mode. E. Change the switchs VTP domain name and then change it back to the original VTP domain name.

Answer:D. Change the switch to transparent mode then change it back to server mode. E. Change the switchs VTP domain name and then change it back to the original VTP domain name.

Explanation: We can change the VTP revision number back to zero using one of the following methods: - change the switch to transparent mode then change it back to server mode - change the switchs VTP domain name and then change it back to the original VTP domain name

Question:

What are the 3 types of VTP advertisments? A. Synchronization advertisments B. Advertisment requests from transparent C. Update advertisments D. Keepalive advertisments E. Summary advertisments F. Subset advertisments G. Advertisment requests from clients

Answer:E. Summary advertisments F. Subset advertisments G. Advertisment requests from clients

Explanation:

VTP advertisments can occur in the following forms: - summary advertisments, send every 300 seconds and when a database change occurs - subset advertisments, send after a VLAN configuration change has occured - advertisment requests from clients, clients requesting VLAN information

Question:

We want to configure the VTP domain Free-tests on our switch and advertisments have to be send secure using a password. How do we achieve this? A. S1(config)#vtp domain Free-tests S1(config)#vtp mode server S1(config)#vtp password password MD5 B. S1(config)#vtp domain Free-tests S1(config-vtp)#mode server S1(config-vtp)#password password C. S1(config)#vtp domain Free-tests S1(config)#vtp mode server S1(config-vtp)#password password D. S1(config)#vtp domain Free-tests S1(config)#vtp mode server S1(config)#vtp password password

Answer: D. S1(config)#vtp domain Free-tests S1(config)#vtp mode server S1(config)#vtp password password

Explanation: We use the vtp domain domain_name configuration command to name the VTP domain. Using the vtp mode [server | client | transparent] command we set the mode of the switch and the vtp password password will set the domain to secure mode by using a password to send advertisments and validate received advertisments.

Question:

What are some of the benefits that VTP version 2 has over version 1? A. Version independant transparent mode B. Unrecognized TLV support C. Mixed mode support D. Authentication support E. Token ring support F. Encryption support

Answer:B. Unrecognized TLV support E. Token ring support

Explanation:

VTP version 2 offers the following additional features over version 1: - version-dependant transparent mode - token ring support - consistency checks - unrecognized TLV (type, length, value) support

Question:

Which command do we use to display the amount of VTP advertisments send? A. show vtp status B. show vtp advertisments C. show vtp summary D. show vtp counters

Answer: D. show vtp counters

Explanation: The show vtp counters command will display error counters and VTP messages.

Question:

By default which VLANs are eligible for pruning? A. 2 to 1001 B. 1 to 4094 C. 1002 to 1005 D. 2 to 4094 E. 1 to 1005

Answer: A. 2 to 1001

Explanation: By default, VLANs 2 to 1001 are eligible for pruning, 1002 to 1005 are reserved for token ring and FDDI VLANs and are never eligible for pruning.

Question:

In a good network design the root bridge is placed where? A. On the busiest segment. B. Closest to the server farm. C. Closest to the users.

Traducido al: español Mostrar texto original Más información

Página 44 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 45: Cisco 642 831 Cit Certificati

Answer: D. In the center of the network.

Explanation: In a good network design the root bridge is placed in the center of the Layer 2 network.

Question:

In our new network we dont want VLAN 5 to be pruned ever. How do we achieve this? A. S1(config-if)#switchport mode trunk pruning vlan remove 5 B. S1(config)#switchport trunk pruning vlan except 5 C. S1(config)#switchport trunk pruning vlan remove 5 D. S1(config-if)#switchport trunk pruning vlan except 5 E. S1(config-if)#switchport mode trunk pruning vlan except 5 F. S1(config-if)#switchport trunk pruning vlan remove 5

Answer: D. S1(config-if)#switchport trunk pruning vlan except 5

Explanation:

When pruning is enabled we can modify the default list of eligibility by using the switchport trunk pruning vlan {add | except | none | remove } vlan_list interface configuration command. The keywords are defined as follows: - all, all active VLANs are eligible - add vlan_list, adds VLANs to an already configured list - except vlan_list, all VLANs are eligible for pruninng except the VLANs listed - remove vlan_list, removed VLANs from an already configued list

Question:

Which command will display the VTP pruning state? A. show interface type mod/num pruning B. show vtp pruning C. show pruning D. show pruning vlan

Answer: A. show interface type mod/num pruning

Explanation: The show interface type mod/num pruning command will display the VTP pruning state.

Question:

Which of the following statements are true about EtherChannels? A. All bundled ports have to be in the same VLAN. B. All ports in the EtherChannel have to be trunks. C. When trunks are used they must pass the same VLANs. D. When trunks are used they can carry different VLANs. E. Duplex settings have to be identical but speed settings can vary.

Answer:A. All bundled ports have to be in the same VLAN. C. When trunks are used they must pass the same VLANs.

Explanation: When using ports to build the EtherChannel they need to belong to the same VLAN, trunks must carry the same VLANs and have the same native VLAN. The speed and duplex settings of the ports have to be same as before the creation of the EtherChannel and Spanning Tree settings have to be identical.

Question:

How do we configure EtherChannel load balancing based on destination IP Address? A. S1(config)#port-channel load-balance dst-ip IP_Address B. S1(config)#port-channel load-balance dst IP_Address C. S1(config)#port-channel load-balance dst-ip D. S1(config)#port-channel load-balance

Answer: C. S1(config)#port-channel load-balance dst-ip

Explanation:

To configure load balancing on an EtherChannel we use the port-channel load-balance method configuration command. The following methods can be used: - src-ip, source IP Address - dst-ip, destination IP Address - src-dst-ip, source and destination IP Address - src-mac, source MAC Address (Default) - dst-mac, destination MAC Address - src-dst-mac, source and destination MAC Address - src-port, source port - dst-port, destination port - src-dst-port, source and destination port

Question:

Which protocols can be used to provide automatic EtherChannel configuration? A. DSCP B. IGMP C. NBAR D. DTP E. PAgP F. LACP

Answer:E. PAgP F. LACP

Explanation: The two protocols used for automatic EtherChannel configuration are: - PAgP, Port Aggregation Protocol (Cisco proprietary) - LACP, Link Aggregation Control Protocol, IEEE802.3d

Question:

How do we configure a LACP EtherChannel? A. S1(config)#lacp system-priority priority S1(config)#interface type mod/num S1(config-if)#channel-protocol lacp S1(config-if)#channel-group number mode active B. S1(config)#lacp system-priority priority S1(config)#interface type mod/num S1(config-if)#channel-protocol lacp S1(config-if)#channel-group number mode auto C. S1(config)#interface type mod/num S1(config-if)#lacp system-priority priority S1(config-if)#channel-protocol lacp S1(config-if)#channel-group number mode active D. S1(config)#interface type mod/num S1(config-if)#lacp system-priority priority S1(config-if)#channel-protocol lacp S1(config-if)#channel-group number mode desirable

Answer:A. S1(config)#lacp system-priority priority S1(config)#interface type mod/num S1(config-if)#channel-protocol lacp S1(config-if)#channel-group number mode active

Explanation:

When configuring a LACP EtherChannel the first thing we do is set the LACP system priority with the lacp system-priority priority global configuration command. We then use the channel-protocol lacp interface command to set the protocol. We use the channel-group number mode [on | passive | active] interface configuration command to assign the channel group number to the interface. The key words on unconditional LACP channel no negotiation passive listens passively and waits to be asked or active actively ask are used to

Traducido al: español Mostrar texto original Más información

Página 45 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 46: Cisco 642 831 Cit Certificati

Question:

In LACP the system priority is made up of? A. 2-byte port number B. 6-byte switch MAC Address C. 4-byte priority value D. 6-byte priority value E. 4-byte switch value F. 2-byte priority value G. 2-bit priority value

Answer:B. 6-byte switch MAC Address F. 2-byte priority value

Explanation: In LACP the switch priority consists of a 2-byte priority value followed by a 6-byte switch MAC Address.

Question:

Which command do we use to verify EtherChannel negotiation? A. show etherchannel port B. show etherchannel negotiation C. show etherchannel D. show etherchannel interface

Answer: A. show etherchannel port

Explanation: The show etherchannel port command will display the channel negotiation mode.

Question:

Which command will display the LACP system ID? A. show lacp system-id B. show lacp C. show lacp sys-id D. show lacp system

Answer: C. show lacp sys-id

Explanation: The show lacp sys-id command will display the LACP system ID.

Question:

When an unknown unicast is received on a bridge port. What will the bridge do with that frame? A. It will send it out of all the bridge ports. B. It will return an icmp unreachable to the source. C. It will send it out of all its ports except the one it received the frame on. D. It will drop the frame.

Answer: C. It will send it out of all its ports except the one it received the frame on.

Explanation: When an unknown unicast, the destination address is not in the bridge table, the frame will be send out all of the bridge ports except the port it was received on.

Question:

Which of the following are BPDUs? A. Configuration Change Notification BPDU B. Topology Control BPDU C. Hello BPDU D. Topology Change Notification BPDU E. Configuration BPDU

Answer:D. Topology Change Notification BPDU E. Configuration BPDU

Explanation: There are 2 type of BPDUs: - Configuration BPDU - Topology Change Notifications

Question:

What do we call the manipulation of packets to obtain different QoS values? A. Scheduling B. Policing C. Marking D. Classification

Answer: C. Marking

Explanation: When we need to manipulate the QoS value of classified packets to obtain different values we call it marking.

Question:

How do we enable QoS on a switch? A. switch(config)#qos enable B. switch(config)#enable qos C. switch(config)#mls qos D. no configuration needed, qos is enabled by default

Answer: C. switch(config)#mls qos

Explanation: The mls qos global configuration command will enable QoS on a switch.

Question:

The default bridge priority on a Catalyst switch is? A. 65535 B. 65534 C. 0 D. 32768 E. 32769

Answer: D. 32768

Explanation: The default bridge priority is 32768 and can have a value between 0 and 65535.

Question:

What are the 2 components of the Bridge ID? A. VLAN1 IP Address B. Highest IP Address configured on the switch. C. Highest MAC Address in the CAM table D. Bridge Priority E. MAC Address

Answer:D. Bridge Priority

Traducido al: español Mostrar texto original Más información

Página 46 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 47: Cisco 642 831 Cit Certificati

Explanation: The bridge ID consists of: - Bridge Priority - MAC Address

Question:

A root port is a port that has _________ . A. the highest port cost B. the lowest root path cost C. the highest root path cost D. the lowest port cost

Answer: B. the lowest root path cost

Explanation: A root port is the port that has the lowest root path cost to the root bridge. The root path cost is the cummalative cost of all links leading to the root bridge.

Question:

Using the new STP cost scale, what is the STP cost of a 622 Mbps link? A. 19 B. 2 C. 14 D. 4 E. 6

Answer: E. 6

Explanation:

Link Bandwidth Old STP cost New STP cost

4 Mbps 250 250

10 Mbps 100 100

16 Mbps 63 62

45 Mbps 22 39

100 Mbps 10 19

155 Mbps 6 14

622 Mbps 2 6

1 Gbps 1 4

10 Gbps 0 2

Question:

When there is more then 1 switch on the same segment, they will elect besides a root port also a ________ port. A. designated B. backup C. standby D. nominated

Answer: A. designated

Explanation: When there is more then 1 switch that have ports connected to the same network segment they will elect a designated port to forward traffic from that segment.

Question:

Associate each state with its description A. Blocking, Listening, Forwarding, Learning, Disabled B. the port cannot add send or receive data,the port is allowed to send and receive BPDUs,the port can send and receive data,the port can add MAC addresses,the port is administratively shutdown

Answer: A. Blocking, Listening, Forwarding, Learning, Disabled

Explanation:

State Description

Disabled In this state the port is administratively shutdown

Blocking In this state the port cannot add send or receive data

Listening In this state the port is allowed to send and receive BPDUs

Learning In this state the port can add MAC addresses,

Forwarding In this state the port can send and receive data

Question:

Which debug command will show the transitioning of the port states? A. debug spanning-tree state B. debug spanning-tree bpdu C. debug spanning-tree root D. debug spanning-tree switch state

Answer: D. debug spanning-tree switch state

Explanation: The debug spanning-tree switch state will display the transistioning between the port states. The show spanning-tree interface command is not fast enough to display the transistioning.

Question:

The default Max Age value is? A. 15 seconds B. 2 seconds C. 10 seconds D. 20 seconds E. 30 seconds F. 50 seconds

Answer: D. 20 seconds

Explanation: The default Max Age time is 20 seconds, default Forwarding Delay is 15 seconds and Hellos are send every 2 seconds by default.

Question:

The default timers of STP (Hello, Forwarding Delay and Max Age) are based on an assumption of the diameter of the network. How much is that diameter? A. 9 B. 3 C. 10 D. 15 E. 7

Traducido al: español Mostrar texto original Más información

Página 47 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 48: Cisco 642 831 Cit Certificati

Answer: E. 7

Explanation: The timers are based on the assumption that the network has a diameter of 7 switches.

Question:

This is the time a port is in both listening and learning state. A. Forward Delay B. Hello C. Transition Delay D. Max Age

Answer: A. Forward Delay

Explanation: The Forward Delay is the time that a port is in both Listening and Learning state. The default value is 15 seconds.

Question:

When is TCN BPDU sent? A. When a port moves into Forwarding state. B. When a port moves from Blocking into Listening state. C. When a port moves from Forwarding or Learning state into Blocking state. D. When a port moves from Listening to Learning state.

Answer:A. When a port moves into Forwarding state. C. When a port moves from Forwarding or Learning state into Blocking state.

Explanation: A topology change occurs when a port is put into Forwarding state or a port that is in Forwarding or Learning state goes into Blocking state. Both these events will trigger a TCN (Topology Change Notification) BPDU to be send.

Question:

Which of the following Spanning Tree types is Cisco Proprietary? A. CST B. STP C. RSTP D. PVST

Answer: D. PVST

Explanation: PVST or Per-VLAN Spanning Tree is Ciscos proprietary version of the Spanning Tree protocol.

Question:

Which of the following statements are correct? A. PVST can use both ISL and 802.1Q. B. PVST can coexist with CST. C. PVST requires ISL. D. Multiple Spanning Trees allows for load balancing over redundant links.

Answer:C. PVST requires ISL. D. Multiple Spanning Trees allows for load balancing over redundant links.

Explanation: Due to the PVST being Cisco proprietary it requires ISL for trunking. Multiple Spanning Trees allows for load balancing over redundant links when the links are assigned to different VLANs. PVST+ was developped to coexist with CST.

Question: When root path cost is the same for 2 ports what sequence will be used to determine the root port? A. 1,2,3,4 B. lowest root bridge ID, lowest root path cost, lowest sender bridge ID, lowest sender port ID

Answer: B. lowest root bridge ID, lowest root path cost, lowest sender bridge ID, lowest sender port ID

Explanation:

All STP decisions are based on the following sequence of four conditions: 1. Lowest Root Bridge ID 2. Lowest Root Path Cost 3. Lowest Sender Bridge ID 4. Lowest Sender Port ID

Question:

How do we enable spanning tree on a new switch? A. switch(config)#spanning-tree vlan 1 B. switch(config)#spanning-tree enable C. switch(config)#spanning-tree vlan enable D. Spanning tree is enabled by default.

Answer: D. Spanning tree is enabled by default.

Explanation: On a new switch spanning tree is enabled by default. If for some reason spanning was disabled we use the spanning-tree vlan vlan id global configuration command to re-enable spanning tree.

Question:

Which two methods can we use to configure the root bridge? A. switch(config)#spanning-tree vlan vlan id root B. switch(config)#spanning-tree vlan vlan id root-priority bridge-priority C. switch(config)#spanning-tree vlan vlan id priority bridge-priority D. switch(config)#spanning-tree priority bridge-priority

Answer:A. switch(config)#spanning-tree vlan vlan id root C. switch(config)#spanning-tree vlan vlan id priority bridge-priority

Explanation: We can use the following commands to configure a root bridge: - switch(config)#spanning-tree vlan vlan id priority bridge-priority - switch(config)#spanning-tree vlan vlan id root {primary|secondary}

Question:

When using the primary keyword with the following command spanning-tree vlan vlan id root primary on our new 3550 switch what will be its bridge priority if you know that the current bridge has a priority of 20000. A. 0 B. 1 C. 19999 D. 15904

Answer: D. 15904

Explanation: When we use the primary keyword the bridge priority will become 24576 if the current root bridge has a priority higher then that. If the current root bridge has a priority less then that, the new bridge priority will become 4096 less then the current root bridge priority.

Question: When want to change the root path for a switch in Vlan 5. How do we achieve this? Be aware that this switch is also a member of other Vlans. A. switch(config-vlan)#spanning-tree cost cost

Traducido al: español Mostrar texto original Más información

Página 48 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 49: Cisco 642 831 Cit Certificati

C. switch(config-if)#spanning-tree vlan 5 cost cost D. switch(config-if)#spanning-tree vlan 5 cost

Answer: C. switch(config-if)#spanning-tree vlan 5 cost cost

Explanation: The spanning-tree [vlan vlan id] cost cost interface configuration command will change the cost of a port on a switch. The vlan keyword the port cost is only modified for that vlan.

Question:

What is the default port priority on a switch? A. 255 B. 128 C. 0 D. 256

Answer: B. 128

Explanation: The port priority is a value between 0 and 255, by default it is 128.

Question:

How do we change the port priority on a switch? A. switch(config-if)#spanning-tree port-priority value B. switch(config-vlan)#spanning-tree port-priority value C. switch(config-if)#spanning-tree priority value D. switch(config)#spanning-tree port-priority value

Answer: A. switch(config-if)#spanning-tree port-priority value

Explanation:To change the switch port priority we use the spanning-tree [vlan vlan id] port-priority value interface configuration command. If the vlan keyword is omitted the port priority is set for all active VLANs.

Question:

How do we change the Hello timer of Spanning Tree? A. switch(config)#spanning-tree hello-time seconds B. switch(config)#spanning-tree hello-interval seconds C. switch(config-if)#spanning-tree hello-time seconds

Answer: A. switch(config)#spanning-tree hello-time seconds

Explanation: We use the global spanning-tree [vlan vlan id] hello-time seconds configuration command to change the interval.

Question:

When modifying the Spanning Tree timers we make these changes on ______. A. the root bridge only. B. every switch in the network. C. any switch in the network, not necessarly the root bridge. D. on the fastest switch.

Answer: A. the root bridge only.

Explanation: Modifying the Spanning Tree timers only has to be done on the root bridge. The timers will be propagated through the network via Configuration BPDUs.

Question:

The default value of the Max Age timer is 20 seconds, what is the minimum and maximum value? A. 1 B. 6 C. 20 D. 50 E. 40 F. 15

Answer:B. 6 E. 40

Explanation: The Max Age timer can be set between 6 and 40 seconds.

Question:

What can we enable on an access switch to put a port immediately in forwarding state? A. UplinkFast B. BackboneFast C. Portfast D. RSTP

Answer: C. Portfast

Explanation: PortFast is used to bring a port on an access switch immediately to forwarding state.

Question:

When we have a redundant path to the root bridge how can we speed up the process to get the next root port start forwarding traffic? A. Implement UplinkFast B. Implement BackboneFast C. Implement PortFast D. This can not be done

Answer: A. Implement UplinkFast

Explanation:When using UplinkFast the switch keeps a records of all parallel paths to the root bridge, if the primary uplink fails it will bring the next-lowest cost rooth path out of blocking state and into forwarding state.

Question:

How do we enable UplinkFast on a switch? A. switch(config-if)#spanning-tree uplink-fast B. switch(config-vlan)#spanning-tree uplinkfast C. switch(config-vlan)#spanning-tree uplink-fast D. switch(config-if)#spanning-tree uplinkfast E. switch(config)#spanning-tree uplink-fast F. switch(config)#spanning-tree uplinkfast

Answer: F. switch(config)#spanning-tree uplinkfast

Explanation: To enable UplinkFast we use the spanning-tree uplinkfast global configuration command.

Question:

When enabling the UplinkFast feature what will be done on the switch? A. The bridge priority is raised to 49152. B. The bridge priority is lowered to 32767. C. The port cost is increased by 3000. D. The port cost is increased to 3000.

A The bridge priority is raised to 49152

Traducido al: español Mostrar texto original Más información

Página 49 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 50: Cisco 642 831 Cit Certificati

Explanation: When enabling the UplinkFast feature the bridge priority is raised to 49152 so it becomes unlikely that the switch will become the root bridge. Port cost is increased by 3000 making them undesirable for downstream neighbors to use them as paths to the root.

Question:

BackboneFast uses which protocol to determine if upstream neighbors have a stable path to the root bridge? A. Root Link Query B. BPDUs C. Discovery Protocol D. Root Discovery Protocol

Answer: A. Root Link Query

Explanation: BackboneFast uses the Root Link Query protocol to determine if upstream neighbors have a stable path to the root bridge.

Question:

BackboneFast has to be enabled on ______________. A. the root bridge B. the core switches only C. every switch in the network D. nowhere, it is enabled by default

Answer: C. every switch in the network

Explanation: BackboneFast has to be enabled on every switch in the network because it relies on the Root Link Query request and reply mechanism. BackboneFast is disabled by default.

Question:

Which command will display the designated ports? A. show spanning-tree summary B. show spanning-tree port C. show spanning-tree D. show spanning-tree brief

Answer: D. show spanning-tree brief

Explanation: The show spanning-tree [vlan vlan id] brief will show the designated ports and designated bridge IDs on each port.

Question:

Which command will display the total number of switch ports in each STP state? A. show spanning-tree port B. show spanning-tree ports detail C. show spanning-tree summary D. show spanning-tree brief

Answer: C. show spanning-tree summary

Explanation: The show spanning-tree [vlan vlan id] summary will display the total number of switch ports in each STP state.

Question:

In STP which best describes a blocked port? A. A port that is not running spanning tree. B. A port that has a normal end user connection. C. A port that is administratively shutdown. D. A port that neither the root or designated port.

Answer: D. A port that neither the root or designated port.

Explanation: A blocked port is a port that is not the root port or a designated port.

Question:

How do we enable the Root Guard feature? A. switch(config-if)#spanning-tree rootguard B. switch(config-if)#spanning-tree root guard C. switch(config-if)#spanning-tree guard root D. switch(config-if)#spanning-tree root guard enable

Answer: C. switch(config-if)#spanning-tree guard root

Explanation: To enable the Root Guard feature we use the spanning-tree guard root interface configuration command.

Question:

What does the Root Guard feature provide? A. A port will only be able to receive BPDUs and not forward them. B. A port will always become the root port. C. A port will only be able to relay BPDUs not receive them. D. A port will always become a designated port.

Answer: C. A port will only be able to relay BPDUs not receive them.

Explanation: Root Guard designates that a port can only relay BPDUs and not receive them.

Question:

When BPDU Guard is enabled what will happen to the port when a BPDU is received on that port? A. The port is put into errdisable state. B. The port is put into blocking state. C. The port is sending the BPDU back to the sender. D. The port is put into listening state.

Answer: A. The port is put into errdisable state.

Explanation: When a BPDU is received on a port with BPDU guard enabled the port is put into errdisable state.

Question:

Which STP feature is described by the following: "The measurement of the amount of time that elapses from the time a BPDU is expected to when it actually arrives". A. Rapid Spanning Tree B. Loop Guard C. BPDU skew detection

Answer: C. BPDU skew detection

Explanation: BPDU skew detection measures the amount of time that elapses from the time a BPDU is expected to when it actually arrives. This time difference is called the skew time.

Question:

What can we put in place to prevent the following: A blocked port is receiving BPDUs, the flow of BPDUs stop and the last BPDU is flushed and goes through the STP states and starts forwarding traffic. A. Loop Guard B. BPDU Guard C Link Guard

Traducido al: español Mostrar texto original Más información

Página 50 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 51: Cisco 642 831 Cit Certificati

Answer: A. Loop Guard

Explanation: To prevent the following behaviour that a blocked port is receiving BPDUs and the flow of BPDUs stop then the last BPDU is flushed and goes through the STP states and starts forwarding traffic we can implement Loop Guard.

Question:

The message interval of the UDLD feature can be configured between which values? A. 10 seconds B. 2 seconds C. 30 seconds D. 20 seconds E. 15 seconds F. 7 seconds G. 90 seconds

Answer:F. 7 seconds G. 90 seconds

Explanation: The default message interval of UDLD (unidirectional link detection) is 15 seconds on a Catalyst 4500 and 6500, 7 seconds on Catalyst 3550. The interval can be configured between 7 and 90 seconds.

Question:

Which of the following are UDLD modes of operation? A. Normal B. Aggressive C. Quiet D. Silent E. Desirable

Answer:A. Normal B. Aggressive

Explanation: The two modes of UDLD operation are: - Normal - Aggressive

Question:

How do we enable UDLD in normal mode on our fibre optic switch (ie all ports are fibre optic)? A. switch(config)#udld enable B. switch(config-if)#udld mode normal C. switch(config)#udld mode normal D. switch(config)#udld mode normal enable

Answer: A. switch(config)#udld enable

Explanation: If all our ports are fibre optic ports then we can enable udld in global configuration mode using the udld enable command.

Question:

On a Catalyst 3550 switch the default UDLD message time interval is? A. 15 seconds B. 2 seconds C. 10 seconds D. 30 seconds E. 7 seconds F. 5 seconds

Answer: E. 7 seconds

Explanation: By default the UDLD message time interval is 7 seconds on a Catalyst 3550 on Catalyst 4500 and 6500 the default is 15 seconds.

Question:

How do we enable ports that are put in errdisable state by UDLD? A. clear udld B. udld enable C. udld reset D. clear udld *

Answer: C. udld reset

Explanation: To re-enable ports that UDLD aggressive mode has put into errdisable state we use the udld reset command.

Question:

How do we display the global BPDU guard state? A. show spanning-tree bpduguard B. show spanning-tree interface C. show spanning-tree summary D. show spanning-tree guard

Answer: C. show spanning-tree summary

Explanation: The show spanning-tree summary command will display the global BPDU guard state.

Question:

What is described by the following: "This is the variation in the amount of delay so packets are not arriving at predictable times" A. Delay B. Loss C. Jitter D. Variance

Answer: C. Jitter

Explanation: The variation in delay is called Jitter.

Question:

Which of the following are QoS types? A. Integrated DiffServ B. DSCP value manipulation C. Differential Services D. Best Effort E. Differentiated Services

Answer:D. Best Effort E. Differentiated Services

Explanation:

The three types of QoS are: - Best Effort

Traducido al: español Mostrar texto original Más información

Página 51 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 52: Cisco 642 831 Cit Certificati

Question:

Integrated Services is associated with which protocol? A. TCP B. CGMP C. ATM D. RSVP E. RSTP

Answer: D. RSVP

Explanation: Integrated services is associated with RSVP, Resource Reservation Protocol, described in RFC 1633.

Question:

Using ISL the CoS is entered where? A. The upper three bytes of the User Field B. Three bytes are added to the User Field C. The lower three bits of the User Field D. The upper three bits of the User Field E. Three bits are added to the User Field F. The lower three bytes of the User Field

Answer: C. The lower three bits of the User Field

Explanation: The lower three bits of the User Field are used as a CoS value.

Question:

The ToS byte is divided into? A. 4 bit IP Presedence B. 3 bit ToS value C. 5 bit ToS value D. 5 bit IP Presedence E. 3 bit IP Presedence F. 4 bit ToS value

Answer:E. 3 bit IP Presedence F. 4 bit ToS value

Explanation: The ToS byte [Type of Service] is divided into a 3 bit IP Presedence value and 4 bit ToS value.

Question:

DSCP is the abbreviation of? A. Differentiated Service Code Point B. Differentiated Service Classification Point C. Differentiated Service Classification Protocol D. Differentiated Service Code Protocol

Answer: A. Differentiated Service Code Point

Explanation: DSCP stands for Differentiated Services Code Point

Question:

An IP Presedence value of 3 corresponds with? A. Flash B. Network Control C. Immediate D. Critical

Answer: A. Flash

Explanation:

Name Value

Routine 0

Priority 1

Immediate 2

Flash 3

Flash Override 4

Critical 5

Internetwork Control 6

Network Control 7

Question:

When using the Class Selector field, a value of 5 is also known as? A. Internetwork Control B. Expedited Forwarding C. Best Effort D. Assured Forwarding

Answer: B. Expedited Forwarding

Explanation:

The Class Selector is divided into: Class 0, Best Effort Class 1 through 4 are Assured Forwarding Class 5, Expedited Forwarding Class 6 & 7 or Internetwork Control & Network Control

Question:

What methods can we use to rate-limit traffic? A. Weighted Round Robin B. Aggregate Policers C. Weighted Fair Queue D. Microflow Policers E. Weighted Policers

Answer:B. Aggregate Policers D. Microflow Policers

Explanation: We use traffic policers to rate-limit traffic. We can use either microflow policers or aggregate policers.

Question:

Which two methods can we use for congestion avoidance? A. Weighted Round Robin B. Weighted Random Early Detection

Traducido al: español Mostrar texto original Más información

Página 52 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 53: Cisco 642 831 Cit Certificati

D. Tail Drop E. FIFO

Answer:B. Weighted Random Early Detection D. Tail Drop

Explanation: A switch can avoid congestion using one of the following methods: - Tail Drop - Weighted Random Early Detection

Question:

Scheduling, in a QoS way is also known as? A. Tail Drop B. Egress Queueing C. Ingress Queueing D. Congestion Avoidance E. Congestion Management

Answer:B. Egress Queueing E. Congestion Management

Explanation: Congestion Management or Egress Queueing is also known as Scheduling.

Question:

When a switch port has the following queue type notation, 1p2q2t. What are its queues? A. 1 strict priority 2 standard queues 2 WRR B. 1 strict priority 2 WRR 2 WRED C. 1 strict priority 2 standard queues 2 Tail drop D. 1 strict priority 2 standard queues 2 WRED

Answer: D. 1 strict priority 2 standard queues 2 WRED

Explanation:

The switch queue type notation consists of the following: - p, the number of strict priority queues - q, the number of standard queues - t, the number of configurable WRED thresholds per standard queue

Question:

Which command do we use to view what type of egress queues are available? A. show interface type/mod switchport B. show interface type/mod flowcontrol C. show interface type/mod capabilities D. show interface type/mod summary

Answer: C. show interface type/mod capabilities

Explanation: The show interface type/mod capabilities command will display the available types of egress queueing on IOS based switches.

Question:

How do we make sure only the DSCP value is used for QoS on a switchport? A. switch(config-if)#mls qos dscp B. switch(config-if)#qos trust dscp C. switch(config-if)#mls qos scp trust D. switch(config-if)#mls qos trust dscp

Answer: D. switch(config-if)#mls qos trust dscp

Explanation: The mls qos trust {cos | dscp | ip-presendence} is used to define consistent QoS trust.

Question:

How do we convert IP Presedence settings to our desired DSCP values? A. switch(config)#mls qos map ip-prec-dscp dscp values B. switch(config)#mls qos map ip-presedence dscp dscp values C. switch(config)#mls qos ip-prec-dscp dscp values D. switch(config)#mls qos map dscp-ip-prec dscp values

Answer: A. switch(config)#mls qos map ip-prec-dscp dscp values

Explanation: We use the mls qos map ip-prec-dscp dscp values global configuration command to map the IP Presedence values to internal (non-default) DSCP values.

Question:

How do we classify traffic with an access-list? A. switch(config-cmap)#match access-group name access-list B. switch(config-cmap)#match access-list C. switch(config-cmap)#match access-list name access-list D. switch(config-cmap)#match access-group access-list

Answer: A. switch(config-cmap)#match access-group name access-list

Explanation: When we use an access-list to classify traffic we use the match access-group name access-list in class map configuration mode.

Question:

How do we classify traffic using NBAR? A. switch(config-pmap)#match protocol protocol name B. switch(config-cmap)#match protocol protocol name C. switch(config)#match protocol protocol name D. switch(config-cmap)#match nbar protocol name

Answer: B. switch(config-cmap)#match protocol protocol name

Explanation: When we use NBAR to classify traffic we use the match protocol protocol name in class map configuration mode.

Question:

What command will define a QoS policy? A. switch(config)#policy-map policy-name B. switch(config-pmap)#policy-map policy-name C. switch(config)#class-map class-name D. switch(config-cmap)#policy-map policy-name

Answer: A. switch(config)#policy-map policy-name

Explanation: To define a QoS policy we use the policy-map policy-name global configuration command.

Question:

How do we apply a QoS policy to an interface? A. switch(config-if)#service-policy policy-name B. switch(config-if)#policy policy-name C. switch(config-if)#service-policy policy-name inbound

Traducido al: español Mostrar texto original Más información

Página 53 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 54: Cisco 642 831 Cit Certificati

Answer: A. switch(config-if)#service-policy policy-name

Explanation: To apply a QoS policy to an interface we use theservice-policy [input | output] policy-name interface configuration command.

Question:

What are the two default weights of the standard queues of an interface? A. 1 B. 256 C. 255 D. 64 E. 16 F. 128 G. 4 H. 32

Answer:C. 255 G. 4

Explanation: The default value of the weight of standard queues on an interface are 4 and 255.

Question:

How can we change the weight of the standard queues on an interface? A. switch(config-if)#wrr-queue bandwidth weight1 weight 2 B. switch(config-if)#wrr-queue weight1 weight 2 C. switch(config-if)#qos-queue bandwidth weight1 weight 2 D. switch(config-if)#default-queue bandwidth weight1 weight 2

Answer: A. switch(config-if)#wrr-queue bandwidth weight1 weight 2

Explanation: In order to change the default weights of the standard queues on an interface we use the wrr-queue bandwidth weight1 weight 2 interface configuration command. The values can vary between 1 and 255.

Question:

How do we enable tail drop on an interface? A. switch(config-if)#mls qos tail-drop B. switch(config-if)#wrr-queue random-detect queue id C. switch(config-if)#no wrr-queue random-detect queue id D. switch(config-if)#mls qos tail-drop enable

Answer: C. switch(config-if)#no wrr-queue random-detect queue id

Explanation: To enable tail drop we use the following interface configuration command no wrr-queue random-detect queue id.

Question:

How do we enable the egress expedite queue? A. switch(config-if)#mls priority-queue out B. switch(config-if)#priority-queue out C. switch(config-if)#strict-priority-queue out D. switch(config-if)#mls qos priority-queue out

Answer: B. switch(config-if)#priority-queue out

Explanation: To enable the strict-priority queue or egress expedite queue we use the priority-queue out interface configuration command.

Question:

How do we verify the QoS settings on an interface? A. show interface B. show mls interface C. show mls qos interface D. show mls interface detail

Answer: C. show mls qos interface

Explanation: To verify the QoS settings on an interface we use the show mls qos interface type mod/num command.

Question:

RSTP is defined by which IEEE standard? A. 802.1d B. 802.5 C. 802.1s D. 802.1w

Answer: D. 802.1w

Explanation: RSTP or Rapid Spanning Tree is defined by IEEE 802.1w.

Question:

In RSTP what is the name of a port that has a less desirable but redundant path to a segement where another switch port already connects? A. Alternate port B. Designated port C. Redundant port D. Backup port

Answer: D. Backup port

Explanation:A backup port is the name of a port that has a less desirable but redundant path to a segement where another switch port already connects when using RSTP.

Question:

When a port is in Discarding state in RSTP that same port would be in which state(s) using STP? A. Listening B. Learning C. Blocking D. Forwarding E. Disabled

Answer:A. Listening C. Blocking E. Disabled

Explanation: When a port is in Discarding state in RSTP that same port would be in Disabled, Blocking and Learning state when using STP.

Question:

When portfast and RSTP is enabled on a switch port we call that port? A. Alternate port B. Point-to-point port C. Backup port D. Edge port

Traducido al: español Mostrar texto original Más información

Página 54 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 55: Cisco 642 831 Cit Certificati

Explanation: An edge port is is a switch port where a single host connects and has been identified by enabling the STP portfast feature.

Question:

When RSTP is synchronizing what type of messages are sent using configuration BPDUs? A. configuration message B. acceptance message C. information message D. proposal message E. agreement message

Answer:D. proposal message E. agreement message

Explanation: During the synchronization process of RSTP proposal and agreements are send using configuration BPDUs.

Question:

When does RSTP detect a topology change? A. When an edge port changes to forwarding state. B. When an edge port changes to blocking state. C. When a nonedge port changes to forwarding state. D. When an nonedge port changes to blocking state.

Answer: C. When a nonedge port changes to forwarding state.

Explanation: RSTP detects a topology change only when a nonedge port changes to forwarding state.

Question:

When a switch receives a BPDU with a TC bit set what will happen? A. MAC addresses are flushed from the CAM. B. BPDUs with the TC bit set are sent out for 4 times the hello time. C. BPDUs with the TC bit set are sent out for 6 times the hello time. D. MAC addresses associated with designated port the BPDU are flushed from the CAM.

Answer: A. MAC addresses are flushed from the CAM.

Explanation: When a switch receives a BPDU with the TC bit set it flushes all the MAC addresses associated with those nonedge designated ports.

Question:

How can we change a half-duplex port to a point-to-point port in RSTP? A. switch(config-if)#spanning-tree port-type point-to-point B. switch(config-if)#spanning-tree port point-to-point C. switch(config-if)#spanning-tree link-type point-to-point D. switch(config-if)#spanning-tree point-to-point

Answer: C. switch(config-if)#spanning-tree link-type point-to-point

Explanation: To configure a half-duplex to be a point-to-point link we use the spanning-tree link-type point-to-point interface configuration command.

Question:

Using PVST+, 500 VLANs and 350 are active how many instances of spanning tree are running? A. 500 B. 1 C. Can not tell D. 350

Answer: D. 350

Explanation: When using PVST+ an instance of spanning will be running for each active VLAN.

Question:

Which attributes have to be indentical on each switch running MST region? A. instance-to-Vlan mapping table B. Vlan-to-instance mapping table C. configuration name D. region name E. revision number F. domain name

Answer:A. instance-to-Vlan mapping table C. configuration name E. revision number

Explanation:

Within a region all switches must run the instance of MST that is defined by the following attributes: - MST configuration name - MST configuration revision number - MST instance-to-Vlan mapping table

Question:

How do we enable MST on a switch? A. switch(config)#spanning-tree mode mst B. switch(config)#spanning-tree mst C. switch(config)#mst enable D. switch(config)#spanning-tree mst configuration

Answer: A. switch(config)#spanning-tree mode mst

Explanation: To enable MST on a switch we use the spanning-tree mode mst global configuration command.

Question:

How do we assign the mst revision number? A. switch(config-mst)#spanning-tree mst revision version B. switch(config-mst)#revision version C. switch(config)#spanning-tree mst revision version D. switch(config-mst)#spanning-tree revision version

Answer: B. switch(config-mst)#revision version

Explanation: In order to assign the MST revision number we use the revision version MST configuration command.

Question:

What is used in a single, loop-free topology inside a MST region? A. Common Spanning Tree B. Instance Spanning Tree C. Internal Spanning Tree D. Per Vlan Spanning Tree

Answer: C. Internal Spanning Tree

Explanation: Internal Spanning Tree (IST) is used like CST (Common Spanning Tree) to maintain a single, loop-free topology inside a MST region.

Traducido al: español Mostrar texto original Más información

Página 55 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 56: Cisco 642 831 Cit Certificati

Question:

How do we change the bridge priority in mst? A. switch(config)#spanning-tree mst instance_id priority bridge_priority B. switch(config)#spanning-tree mst priority bridge_priority instance instance_id C. switch(config)#spanning-tree mst priority bridge_priority D. switch(config-mst)#instance_id priority bridge_priority

Answer: A. switch(config)#spanning-tree mst instance_id priority bridge_priority

Explanation: To change the bridge priority we use the spanning-tree mst instance_id priority bridge_priority global configuration command.

Question:

How do we change the forward delay timer in MST? A. switch(config)#spanning-tree mst forward-time seconds B. switch(config)#spanning-tree mst instance instance_id forward-delay seconds C. switch(config-mst)#spanning-tree mst forward-time seconds D. switch(config)#spanning-tree mst forward-delay seconds E. switch(config-mst)#spanning-tree mst forward-delay seconds F. switch(config)#spanning-tree mst instance instance_id forward-time seconds

Answer: A. switch(config)#spanning-tree mst forward-time seconds

Explanation: To change the forward delay timer in MST we use the spanning-tree mst forward-time seconds global configuration command. Changing timers are for MST as a whole not for individual MST instances.

Question:

When a multilayer switch assigns a layer 3 address to a logical interface that represents an entire VLAN it is called a _____________. A. Switched Virtual Interface B. Switched VLAN Interface C. Stacked Virtual Interface D. Integrated Routing & Bridging Interface

Answer: A. Switched Virtual Interface

Explanation: When a multilayer switch assigns a layer 3 address to a logical interface that represents an entire VLAN it is called a switched virtual interface.

Question:

On our Catalyst 3550 we used one of the ports as a layer 3 port. We do not need this requirement anymore and want to change it back to a layer 2 port. How do we achieve this A. switch(config-if)#switchport B. switch(config-if)#switchport mode layer-2 C. switch(config-if)#no switchport D. switch(config-if)#switchport layer-2

Answer: A. switch(config-if)#switchport

Explanation: In order to return a switchport back to be a layer 2 port we use the switchport interface configuration command.

Question:

How do we configure a Catalyst 3550 interface to provide Layer 3 functionality? A. switch(config)#interface type mod/num switch(config-if)#ip address ip address mask B. switch(config)#interface type mod/num switch(config-if)#switchport mode layer3 switch(config-if)#ip address ip address mask C. switch(config)#interface type mod/num switch(config-if)#no switchport switch(config-if)#ip address ip address mask D. switch(config)#interface type mod/num switch(config-if)#switchport access ip switch(config-if)#ip address ip address mask

Answer:C. switch(config)#interface type mod/num switch(config-if)#no switchport switch(config-if)#ip address ip address mask

Explanation:After specifying the correct interface we use the no switchport interface configuration command to remove Layer 2 functionality and then assign an IP Address with the ip address ip_address mask interface configuration command.

Question:

How do we assign an IP Address to a SVI? A. switch(config)#interface vlan vlan_id switch(config-if)#ip address ip address mask B. switch(config)#interface vlan vlan_id switch(config-vlan)#ip address ip address mask C. switch(config)#interface svi type mod/num switch(config-if)#ip address ip address mask D. switch(config)#interface vlan vlan_id switch(config-if-svi)#ip address ip address mask

Answer: A. switch(config)#interface vlan vlan_id switch(config-if)#ip address ip address mask

Explanation: Because a SVI, switched virtual interface, can represent an entire VLAN we assign the IP address to the logical VLAN interface.

Question:

Mulitlayer switching consists of which two parts? A. Route processor B. Switching engine C. SVI D. Routing engine

Answer:A. Route processor B. Switching engine

Explanation: Multilayer switching uses a switching engine and route processor to perform the basics of route once, switch many.

Question:

Which are conditions that can cause a packet to be marked as "CEF Punt"? A. Encapsulation type is not supported. B. MTU is exceeded and there is need for fragmentation. C. IP TTL is less then 10. D. More then one entry to the destination in the FIB Table

Answer:A. Encapsulation type is not supported. B. MTU is exceeded and there is need for fragmentation.

Explanation: none

Question: What is the portion of the FIB table called that contains the Layer 2 information for the next-hop? A. CAM B TCAM

Traducido al: español Mostrar texto original Más información

Página 56 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 57: Cisco 642 831 Cit Certificati

C. MAC table D. Adjacency table

Answer: D. Adjacency table

Explanation: The portion of the FIB that contains the Layer 2 information about the next-hop is called the adjacency table.

Question:

What is the CEF Glean state? A. An ARP entry was not found in the adjacency table, then the packet is sent to the Layer 3 engine so an ARP request can be generated. B. When a packet arrives and the next-hop address has an ARP entry in the adjacency table that packet is said to be in CEF Glean state. C. When further processing is needed by the Layer 3 engine, like fragment the packet, compress the packet,... D. An IP entry was not found in the adjacency table, then the packet is sent to the Layer 3 engine so an ARP request can be generated.

Answer: A. An ARP entry was not found in the adjacency table, then the packet is sent to the Layer 3 engine so an ARP request can be generated.

Explanation: When an ARP entry was not found in the adjacency table, then the packet is sent to the Layer 3 engine so an ARP request can be generated, this is known as the CEF Glean state.

Question:

When the FIB table is replicated across any number of independent Layer 3 forwarding engines, we are using ____________. A. Accelerated CEF B. Expedited CEF C. Distributed CEF D. Assured CEF

Answer: C. Distributed CEF

Explanation: When the FIB table is replicated across any number of independent Layer 3 forwarding engines, we are using distributed CEF.

Question:

When the FIB entry is the CEF Glean state waiting for an ARP response, subsequent packets to that host are dropped so there is no need for duplicate ARP requests. This is called? A. ARP throttling B. ARP limiting C. ARP queueing D. ARP discarding

Answer: A. ARP throttling

Explanation: When the FIB entry is the CEF Glean state waiting for an ARP response, subsequent packets to that host are dropped so there is no need for duplicate ARP requests, this is called ARP throttling or throttling adjacency.

Question:

On a Catalyst 3550 how do we enable CEF? A. CEF is enabled by default B. switch(config)#cef enable C. switch(config0#ip cef D. switch(config)#mls cef

Answer: A. CEF is enabled by default

Explanation: On Catalyst 3550, 4500 and 6500 (with a Supervisor 720) CEF is enabled by default and can never be disabled.

Question:

What can we configure on a switch for protocols that cannot be switched or routed by CEF, eg IPX, LAT? A. Integrated Routing & Bridging B. Router-on-a-stick C. Translational bridging D. Fallback bridging

Answer: D. Fallback bridging

Explanation: We can configure fallback bridging for protocols that cannot be routed or switched by CEF, some examples of protocols are AppleTalk, IPX, SNA, LAT,..

Question:

How do we configure fallback bridging? A. switch(config)#bridge-group bridge-group protocol protocol_name B. switch(config)#bridge-group bridge-group protocol vlan-bridge C. switch(config)#bridge-group bridge-group vlan-bridge D. switch(config-vlan)#bridge-group bridge-group protocol protocol_name

Answer: B. switch(config)#bridge-group bridge-group protocol vlan-bridge

Explanation: The first step is to enable fallback bridging using the bridge-group bridge-group protocol vlan-bridge global configuration command. We then use the bridge-group bridge-group interface configuration command underneath the VLAN SVI where the nonroutable traffic will be bridged.

Question:

What is the maximum amount of fallback bridgegroups you can configure on a switch? A. 64 B. 128 C. 8 D. 31 E. 1 F. 16 G. 32

Answer: D. 31

Explanation: You can configure up to 31 bridgegroups on a switch.

Question:

How can we verify the configuration of a SVI? A. show interface svi B. show interface type mod/num switchport C. show interface summary D. show interface vlan vlan_id

Answer: D. show interface vlan vlan_id

Explanation: To verify the configuration of a SVI interface we use the show interface vlan vlan_id command.

Question:

How do we show the entire FIB? A. show cef B. show cef fib C. show cef detail D. show ip cef

Answer: D show ip cef

Traducido al: español Mostrar texto original Más información

Página 57 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 58: Cisco 642 831 Cit Certificati

Question:

When issueing the show cef not-cef-switched counters are shown for CEF Punt packets. Which of the following are not valide counters A. Send B. No_adj C. Access-List D. Receive E. Redirect F. Encap G. Options

Answer:A. Send C. Access-List F. Encap

Explanation:

The counters for the CEF punts are: - No_adj - No_encap - Unsuppted - Redirect - Receive - Option - Accecss - Frag

Question:

How can we verify the STP state of the active fallback bridge groups? A. show bridge group stp B. show bridge group detail C. show bridge group D. show bridge group summary

Answer: C. show bridge group

Explanation: The show bridge group command will display a summary of all active fallback bridge groups and their STP states.

Question:

In an HSRP group a router can be in what states? A. passive B. backup C. learning D. active E. standby F. listen

Answer:D. active E. standby F. listen

Explanation: In a HSRP group is elected to be the primary or active router, a standby router is also elected. The remaining routers remain in listen state.

Question:

How do we set the HSRP priority? A. switch(config)#standby group priority priority B. switch(config-if)#standby priority group priority C. switch(config-if)#standby group priority priority D. switch(config-if)#standby priority priority

Answer: C. switch(config-if)#standby group priority priority

Explanation: To set the HSRP priority we use the standby group priority priority interface configuration command.

Question:

How can we configure a router to immediately take over the active role if its priority is higher? A. switch(config-if)#standby group active B. switch(config-if)#standby-priority group high C. switch(config)#standby group preempt D. switch(config)#standby group active E. switch(config-if)#standby group preempt

Answer: E. switch(config-if)#standby group preempt

Explanation: We use the standby group preempt interface configuration command if we want the switch to take the active role when its priority is the highest at any time.

Question:

How can we record, using aaa, reloads of a device? A. switch(config)#aaa accounting reload B. switch(config)#aaa accounting events C. switch(config)#aaa accounting system D. switch(config)#aaa accounting exec

Answer: C. switch(config)#aaa accounting system

Explanation: To record reload we use the aaa accounting system global configuration command.

Question:

What can we configure the switch to make the HSRP group more secure? A. switch(config-if)#standby group authentication md5 string B. switch(config)#stanby group authentication md5 string C. switch(config-if)#standby group md5-authentication string D. switch(config-if)#standby group authentication string E. switch(config)#standby group authentication string

Answer: D. switch(config-if)#standby group authentication string

Explanation: We can use the standby group authentication string interface configuration command to add clear text authentication to the group to prevent devices with a default configuration to participate.

Question:

The default hello timer of HSRP is? A. 10 seconds B. 5 seconds C. 3 seconds D. 2 seconds

Traducido al: español Mostrar texto original Más información

Página 58 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 59: Cisco 642 831 Cit Certificati

Explanation: By default hello messages are sent every 3 seconds.

Question:

What is the virtual MAC address generated by HSRP? A. C000.0c07.acxx where xx is the HSRP group nr represented in hex B. 0000.5e00.01xx where xx is the HSRP group nr represented in hex C. 0000.0c07.acxx where xx is the HSRP group nr represented in hex D. C000.abcd.acxx where xx is the HSRP group nr represented in hex

Answer: C. 0000.0c07.acxx where xx is the HSRP group nr represented in hex

Explanation: The virtual MAC address generated by HSRP is 0000.0c07.acxx where xx is the HSRP group nr represented in hex.

Question:

The default VRRP priority is? A. 254 B. 0 C. 255 D. 100 E. 1

Answer: D. 100

Explanation: The default router priority in VRRP is 100.

Question:

VRRP-advertisments are sent by default every __________ seconds. A. 20 B. 30 C. 1 D. 2 E. 5 F. 10

Answer: C. 1

Explanation: By default, VRRP-advertisments are sent every second.

Question:

What could cause a router to be elected as the Active Virtual Gateway? A. Lowest MAC Address B. Highest priority C. Lowest IP Address D. Highest MAC Address E. Highest IP Address

Answer:B. Highest priority E. Highest IP Address

Explanation: The Active Virtual Gateway is the router that has the highest priority or the highest IP Address.

Question:

Which of the following are GLBP load-balancing methods? A. Host-dependent B. Weighted Random Early Detection C. Weighted D. Network-dependent E. Round Robin F. Weighted round robin

Answer:A. Host-dependent C. Weighted E. Round Robin

Explanation:

GLBP, Gateway Load Balancing Protocol can use following load-balancing methods: - Round robin - Weighted - Host-dependent

Question:

Which of the following are SLB load-balancing methods? A. Weighted B. Host-dependent C. Round robin D. Weighted round robin E. Weighted least connection

Answer:D. Weighted round robin E. Weighted least connection

Explanation: SLB, Server Load Balancing, can use the following load-balancing methods: - weighted round robin - weighted least connection

Question:

How do we configure the load-balancing method that SLB uses? A. switch(config-slb-sfarm)#predictor {roundrobin | leastconns} B. switch(config-slb)#predictor {roundrobin | leastconns} C. switch(config)#predictor {roundrobin | leastconns} D. switch(config-slb-vserver)#predictor {roundrobin | leastconns}

Answer: A. switch(config-slb-sfarm)#predictor {roundrobin | leastconns}

Explanation: After configuring a server farm we use the predictor {roundrobin | leastconns} configuration command to set the load-balancing method. This is done underneath the server farm configuration.

Question:

How can we check the status of HSRP? A. show standby brief B. show ip hsrp detail C. show ip hsrp status D. show hspr status

Answer: A. show standby brief

Explanation: The show standby brief command will display the status of HSRP.

Traducido al: español Mostrar texto original Más información

Página 59 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 60: Cisco 642 831 Cit Certificati

Question:

What is the range of adminstratively scoped addresses? A. 224.0.0.0 - 239.255.255.255 B. 224.0.1.0 - 238.255.255.255 C. 224.0.0.0 - 224.0.0.255 D. 239.0.0.0 - 239.255.255.255

Answer: D. 239.0.0.0 - 239.255.255.255

Explanation:

complete multicast space: 224.0.0.0 - 239.255.255.255 link-local addresses: 224.0.0.0 - 224.0.0.255 administratively scoped: 239.0.0.0 - 239.255.255.255 globally scoped: 224.0.1.0 - 238.255.255.255

Question:

What can we use to make sure that packets are not injected back into the tree? A. Split Horizon B. Split Horizon with Poison Reverse C. Reverse Path Forwarding D. Apply access-lists

Answer: C. Reverse Path Forwarding

Explanation: Reverse Path Forwarding is a means to make sure packets are not being injected back into the tree at an unexpected location.

Question:

IGMPv2 uses which multicast address to send a Leave Group message? A. 224.0.0.1 B. 224.0.0.5 C. 224.0.0.2 D. 224.0.0.16

Answer: C. 224.0.0.2

Explanation: A Leave Group message is sent to the all-routers multicast address of 224.0.0.2

Question:

In IGMPv1 queries are sent every ________ seconds. A. 60 B. 10 C. 30 D. 90 E. 180

Answer: A. 60

Explanation: IGMPv1 sends out queries every 60 seconds to see if there are still hosts interested in receving the multicast on a specific segment.

Question:

In PIM Sparse mode the root router is called? A. Rendezvous Point B. Master C. Reference Point D. Root

Answer: A. Rendezvous Point

Explanation: In PIM Sparse mode the root router is called the Rendezvous Point.

Question:

How do we configure PIM Dense Mode? A. switch(config-if)#no ip pim mode sparse B. switch(config-if)#pim mode dense C. switch(config-if)#ip pim dense-mode D. switch(config-if)#ip pim mode dense E. switch(config-if)#pim dense-mode

Answer: C. switch(config-if)#ip pim dense-mode

Explanation: To configure PIM dense mode we use the ip pim dense-mode interface configuration command.

Question:

How do we configure a mapping agent? A. switch(config-if)#ip pim send-rp-discovery scope ttl B. switch(config-if)#ip pim send-discovery scope ttl C. switch(config)#ip pim send-rp-discovery D. switch(config)#ip pim send-rp-discovery scope ttl

Answer: D. switch(config)#ip pim send-rp-discovery scope ttl

Explanation: To configure a mapping agent we use the ip pim send-rp-discovery scope ttl global configuration command.

Question:

How do we enable IGMP snooping on a new switch? A. switch(config)#ip igmp snooping B. switch(config-if)#ip igmp snooping C. switch(config)#no ip cgmp D. IGMP snooping is enabled by default

Answer: D. IGMP snooping is enabled by default

Explanation: On switch platforms that support IGMP snooping, IGMP is enabled by default.

Question:

In PIMv2, what is the dynamic RP-to-group mapping called? A. auto-rp method B. dynamic-rp method C. bootstrap router method D. rendezvous point method

Answer: C. bootstrap router method

Explanation: The bootstrap router method is used by PIMv2 to dynamically map RP-to-groups.

Question:

Which IETF standard defines inline power? A. 802.3b B. 802.3af C. 802.3de D. 802.5

Traducido al: español Mostrar texto original Más información

Página 60 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 61: Cisco 642 831 Cit Certificati

Explanation: The IETF standard 802.3af defines inline power.

Question:

What is the voltage that an IP Phone uses and can be provided via inline power or external adapter? A. 48V DC B. 24V AC C. 12V AC D. 12V DC E. 48V AC F. 24V DC

Answer: A. 48V DC

Explanation: IP Phones use 48V DC.

Question:

Inline power is provided over which pairs of a Cat5 wiring? A. pair 1 B. pair 3 C. pair 4 D. pair 2

Answer:B. pair 3 D. pair 2

Explanation: Inline power use pairs 2 and 3, RJ-45 pin 1,2 and 3,6.

Question:

How do we configure a voice VLAN? A. switch(config-if)#voice vlan vlan_id B. switch(config-vlan)#voice vlan vlan_id C. switch(config-if)#switchport voice vlan vlan_id D. switch(config)#voice vlan vlan_id

Answer: C. switch(config-if)#switchport voice vlan vlan_id

Explanation: To configure a voice vlan we use the voice vlan {vlan_id | dot1q | untagged | none} interface configuration command.

Question:

When using the untagged keyword in the voice vlan configuration, voice packets are placed into which vlan? A. vlan 1 B. vlan specified in the configuration C. vlan 0 D. native vlan

Answer: D. native vlan

Explanation: When using the untagged keyword in the voice vlan configuration, voice packets are placed into vlan 0.

Question:

The Skinny Gateway Protocol uses which tcp port? A. 2000 B. 2001 C. 2003 D. 2002

Answer: D. 2002

Explanation: Skinny Gateway Protocol uses TCP port 2002.

Question:

RTP voice packets receive which CoS value from an IP Phone? A. 3 B. 4 C. 1 D. 5 E. 2

Answer: D. 5

Explanation: RTP voice bearer packets receive CoS value 5, IP Presedence 5 and DSCP 46 (EF) according to the QoS rules of a Cisco IP Phone.

Question:

How can we verify the inline power for a switch port? A. show inline-power B. show ip inline-power C. show power inline D. show ip power-inline

Answer: C. show power inline

Explanation: We use the show power inline command to verify the inline power of a switchport.

Question:

How do we instruct an IP Phone to extend the QoS trust to its own switchport? A. switch(config-if)#switchport extend trust B. switch(config-if)#switchport priority extend trust C. switch(config-if)#switchport qos extend trus D. switch(config-if)#switchport mls qos extend trust

Answer: B. switch(config-if)#switchport priority extend trust

Explanation: To instruct an IP Phone to extend the QoS trust to its own switchport we use the switchport priority extend {cos value | trust} interface configuration command.

Question:

TCP port 2001 is used by which protocol? A. Skinny Voice Protocol B. Skinny Station Protocol C. Skinny Client Control Protocol D. Skinny Gateway Protocol

Answer: B. Skinny Station Protocol

Explanation: Skinny Station Protocol used TCP port 2001.

Question: A multicast MAC address always starts with? A. 0100.5e B C000 5e

Traducido al: español Mostrar texto original Más información

Página 61 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 62: Cisco 642 831 Cit Certificati

C. 1000.5e D. 0000.5e

Answer: A. 0100.5e

Explanation: A multicast MAC address always starts with 0100.5e

Question:

How do manually assign a RP in PIMv1? A. switch(config-if)#ip pim rp-address ip_address B. switch(config)#ip pim rendezvouspoint-address ip_address C. switch(config)#ip pim version1 rp-address ip_address D. switch(config)#ip pim rp-address ip_address

Answer: D. switch(config)#ip pim rp-address ip_address

Explanation: To manually assign a Rendezvous point we use the ip pim rp-address ip_address global configuration command.

Question:

How do we enable authentication, authorization and accounting on a switch? A. switch(config-aaa)#name name B. switch(config)#aaa new-model enable C. switch(config)#aaa new-model D. switch(config)#aaa enable

Answer: C. switch(config)#aaa new-model

Explanation: To enable AAA we use the aaa new-model global configuration command.

Question:

What is the multicast MAC address of the following 224.0.10.15? A. 0100.5e00.0a0f B. 0100.5e00.0b0f C. 0100.5e00.0a0d D. 0100.5e00.0b0d

Answer: A. 0100.5e00.0a0f

Explanation:

Multicast MAC addresses are formed using the 0100.5exx.xxx ethernet address where xx.xxxx are the lower 23 bits of the IP Address. If we apply that theory here we end up with the following: 224.0.10.15 in binary 11100000.00000000.00001010.00001111 We convert the last 23 bits to hex 0.0.0a.0f Giving us an ethernet MAC address of 0100.5e00.0a0f

Question:

How do we configure the use of Tacacs+ authentication? A. switch(config)#aaa login tacacs+ B. switch(config-aaa)#authentication login tacacs+ C. switch(config)#authentication login tacacs+ D. switch(config)#aaa authentication login tacacs+

Answer: D. switch(config)#aaa authentication login tacacs+

Explanation: To use Tacacs+ authentication we use the aaa authentication login tacacs+ global configuration command.

Question:

How do we create a user database on the switch? A. switch(config-aaa)#username name password password B. switch(config-database)#username name password password C. switch(config-line)#username name password password D. switch(config)#username name password password

Answer: D. switch(config)#username name password password

Explanation: To create a user database on a switch we use the username name password password global configuration command for each user that needs access to the switch.

Question:

We want to make sure that a user is allowed to use configuration commands. How do we achieve this? A. switch(config)#aaa authorization config-commands allow B. switch(config)#aaa authorization config-commands enable C. switch(config)#aaa authorization config-commands D. switch(config)#aaa authorization commands

Answer: C. switch(config)#aaa authorization config-commands

Explanation: We can use the aaa authorization config-commands to make sure a user is authorized to use configuration commands.

Question:

We want to shutdown the switchport when a MAC address is discovered on that port that is not allowed. How do we achieve this? A. switch(config-if)#switchport port-security shutdown B. switch(config-if)#switchport port-security errdisable shutdown C. switch(config-if)#switchport port-security violation shutdown D. switch(config-if)#switchport violation shutdown

Answer: C. switch(config-if)#switchport port-security violation shutdown

Explanation:In order to shutdown a switchport when a MAC address is discovered that is not allowed to be on that port we use the switchport port-security violation shutdown interface configuration command.

Question:

When using the port-security violation command, which conditions can we set? A. shutdown B. restrict C. protect D. disable E. timed F. system G. reverse-access

Answer:A. shutdown B. restrict C. protect

Explanation:

We can use the following keywords with the switchport port-security violation interface configuration command: - shutdown, the port is put into errdisable state

Traducido al: español Mostrar texto original Más información

Página 62 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 63: Cisco 642 831 Cit Certificati

Question:

In order to use port-based authentication the switch and the end-user PC must support which protocol? A. WEP B. AAA C. EAPOL D. EAP

Answer: C. EAPOL

Explanation: In order to use port-based authentication the switch and the end-user PC must support EAPOL, Extensible Authentication Protocol over LANs.

Question:

How do we enable 802.1x on a switch? A. switch(config)#system-auth-control 8021x B. switch(config)#aaa dot1x authentication C. switch(config)#dot1x system-auth-control D. switch(config)#dot1x authentication

Answer: C. switch(config)#dot1x system-auth-control

Explanation: We use the dot1x system-auth-control global configuration command to enable 802.1x on a switch.

Question:

What is the first step in configuring a VACL? A. switch(config)#vlan access-map map_name B. switch(config-vlan)#access-map map_name C. switch(config-vlan)#vlan access-map map_name D. switch(config-if)#vlan access-map map_name

Answer: A. switch(config)#vlan access-map map_name

Explanation: We first define the VACL using the vlan access-map map_name global configuration command.

Question:

Which of the following are actions that can be done by a VACL? A. allow B. set QoS/CoS value C. block D. drop E. forward F. redirect

Answer:D. drop E. forward F. redirect

Explanation: A VACL can either drop a matching packet, forward it or redirect it to another interface.

Question:

When using a Private VLAN a secondary VLAN can be configured as? A. Public B. Promiscuous C. Isolated D. Community E. Secondary

Answer:C. Isolated D. Community

Explanation: When using a Private VLAN a secondary VLAN can be configured as one of the following: - Isolated - Community

Question:

How do we associate the primary VLAN to all of the component secondary VLANs? A. switch(config-vlan)#secondary-vlan association primary-vlan-list B. switch(config-vlan)#private-vlan association primary-vlan-list C. switch(config-vlan)#primary-vlan association secondary-vlan-list D. switch(config-vlan)#private-vlan association secondary-vlan-list

Answer: D. switch(config-vlan)#private-vlan association secondary-vlan-list

Explanation: in order to associate the primary VLAN to all of the component secondary VLANs we use the private-vlan association secondary-vlan-list vlan configuration command.

Question:

Which of the following are methods of switch port monitoring? A. Local SPAN B. VLAN SPAN C. Remote SPAN D. Host SPAN E. Distributed SPAN

Answer:A. Local SPAN B. VLAN SPAN C. Remote SPAN

Explanation:

We can use one of the following methods to do switch port monitoring: - Local SPAN - VLAN SPAN or VSPAN - Remote SPAN

Question:

How do we define the source for Local SPAN? A. switch(config)#monitor-span session session source interface type mod/num both B. switch(config)#span session session source interface type mod/num both C. switch(config)#monitor span source interface type mod/num both D. switch(config)#monitor session session source interface type mod/num both

Answer: D. switch(config)#monitor session session source interface type mod/num both

Explanation: The first step we do when configuring a SPAN session is define the source. We use the monitor session session source {interface type mod/num | vlan vlan_id} [rx | tx | both] global configuration command to define that required source.

Question:How do we display the active SPAN sessions? A sho span acti e

Traducido al: español Mostrar texto original Más información

Página 63 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp

Page 64: Cisco 642 831 Cit Certificati

Site Navigation

Home

Cisco

Extreme

Foundry

Force10

HP

Nortel

Refurbished Compaq

Used Compaq

F5 Networks

Juniper

Search

Contact

Forums

Definitions

We Ship in the United States

Copyright © 2010 Network Liquidators ®. All rights reserved.

Contact Information

Office: 813.852.6400

Email: [email protected]

Oldsmar, FL 34677

C. show span D. show monitor

Answer: D. show monitor

Explanation: The show monitor command will display the active SPAN sessions.

Cisco CCNP Certification Articles

Cisco CCNP Certification Articles Cisco CCNP Certification Articles Cisco CCNP Certification ArticlesCisco CCNA CCNP Home Lab Tutorial Assembling your Home Cisco Lab

Cisco CCNP BCMSN Exam Tutorial Multicasting and the RPF Check

Cisco CCNP BSCI Exam Tutorial Route Summarization

Certification Suggested Topologies for your Home CCNA CCNP Lab

Cisco CCNP BCMSN Exam Tutorial Spanning Tree Protocol STP Timers

Cisco CCNP BSCI Exam Tutorial the BGP Attribute MED

Cisco CCNA CCNP BCMSN Exam Tutorial Configuring Portfast and BPDU Guard

Cisco CCNP BCMSN Exam Tutorial Static VLANSCisco CCNP BSCI Exam Tutorial the Passive Interface Command and OSPF

Cisco CCNA CCNP Certification Exam Attending a Video Boot Camp

Cisco CCNP BCMSN Exam Tutorial the Core Layer of Cisco's Three Layer Model

Cisco CCNP BSCI Exam Tutorial Using Distribute Lists

Cisco CCNA CCNP Certification Exam Creating a Study Plan

Cisco CCNP BCMSN Exam Tutorial the Four or Five STP Port States

Cisco CCNP BSCI Exam Tutorial Using OSPF's Summary Address Command

Cisco CCNA CCNP Certification How and Why to Build an Etherchannel

Cisco CCNP BCMSN Exam Tutorial VLAN Trunking Protocol

Cisco CCNP BSCI Exam Tutorial Using the OSPF Command Area Range

Cisco CCNA CCNP Certification Introduction to BGP Attributes

Cisco CCNP BCMSN Tutorial Switches QOS and Cisco's Networking Model

Cisco CCNP BSCI Tutorial BGP Attribute Next_Hop

Cisco CCNA CCNP Certification OSPF E2 vs E1 Routes

Cisco CCNP BSCI Certification BGP Route Reflector Tutorial

Cisco CCNP BSCI Tutorial Comparing OSPF ISIS Hellos

Cisco CCNA CCNP Exam Tutorial Five Debugs you Must Know

Cisco CCNP BSCI Certification Exam Five OSPF Details you must Know

Cisco CCNP BSCI Tutorial Route Summarization with RIP and EIGRP

Cisco CCNA CCNP Home Labs Developing Troubleshooting Skills

Cisco CCNP BSCI Certification Introduction to ISIS Terminology

Cisco CCNP BSCI Tutorial the Role of the OSPF ASBR

Cisco CCNA CCNP Home Lab Setup How to Configure Reverse Telnet

Cisco CCNP BSCI Certification Route Redistribution and the Seed Metric

Cisco CCNP Certification BCMSN Exam Tutorial Uplinkfast

Cisco CCNA CCNP Home Lab Tutorial Cabling your Access Server

Cisco CCNP BSCI Certification the BGP Attribute MED

Cisco CCNA CCNP Home Lab Tutorial Configuring an Access Server

Cisco CCNP BSCI Certification the Local Preference BGP Attribute

Cisco CCNP Certification BSCI Exam Tutorial Floating Static Routes

Cisco CCNA CCNP Home Lab Tutorial many Cable Types

Cisco CCNP BSCI Exam Tutorial a Guide to IPV6 Addressing

Cisco CCCP Certification BSCI Exam Tutorial ISIS Hellos and Adjacencies

Cisco CCNA CCNP Home Lab Tutorial Planning Ahead for IE Study

Cisco CCNP BSCI Exam Tutorial BGP Adjancey StatesCisco CCNP Certification BSCI Exam Tutorial Route Summarization Basics

Cisco CCNA CCNP Home Lab Tutorial Starting OverCisco CCNP BSCI Exam Tutorial Broadcasts and the IP Helper address Command

Cisco CCNP Certification FAQ

Cisco CCNA CCNP Home Lab Tutorial the 2501 Router

Cisco CCNP BSCI Exam Tutorial Configuring and Troubleshooting OSPF Virtual Links

Cisco CCNP Certification Introduction to BGP

Cisco CCNA CCNP Home Lab Tutorial the 2503 Router

Cisco CCNP BSCI Exam Tutorial Configuring EIGRP Packet Authentication

Cisco CCNP Certification the BGP Weight Attribute

Cisco CCNA CCNP Home Lab Tutorial the 2520 Router

Cisco CCNP BSCI Tutorial EIGRP Stub Routing Passing the CCNA and CCNP Cisco Home Lab Faq

Cisco CCNA CCNP Tutorial Home Lab Assembly Case Study

Cisco CCNP BSCI Exam Tutorial Filtering BGP Updates with Prefix Lists

Cisco CCNP Certification Using the BGP Command Source

Certification Suggested Topologies for you Home CCNA CCNP Lab

Cisco CCNP BSCI Exam Tutorial Introduction to Policy Routing

Cisco CCNP Home Lab Tutorial on a Frame Relay Switch

Cisco CCNP Certification OSPF ASBRS Explained and Illustrated

Cisco CCNP BSCI Exam Tutorial IP Version 6 Zero Compression

Cisco Certification in What Order shoud you Take your CCNP Exams

Cisco CCNP BCMSN Exam Tutorial BPDU Skew Detection and Cisco Switches

Cisco CCNP BSCI Exam Tutorial ISIS Router Types Cisco Certification Recertifying your CCNA and CCNP

Cisco CCNP BCMSN Exam Tutorial Changing Root Bridge Election Results

Cisco CCNP BSCI Exam Tutorial Leading Zero Compression

Cisco Certification the Secret Key to Getting your CCNA and CCNP

Cisco CCNP BCMSN Exam Tutorial Configuring CGMP on Routers Switches

Cisco CCNP BSCI Exam Tutorial Not all Static Routes are Created Equal

Four Important Commands for your CCNA CCNP Home Lab

Cisco CCNP BCMSN Exam Tutorial Dynamic Trunking Protocol DTP

Cisco CCNP BSCI Exam Tutorial OSPF Route Redistribution Review

How to Become a Cisco CCNP

Cisco CCNP BCMSN Exam Tutorial Dynamic VLANS VMPS

Cisco CCNP BSCI Exam Tutorial OSPF Router TypesCisco CCNA and CCNP Exam Five Tipes for Exam Day Success

Cisco CCNP BCMSN Exam Tutorial Multicasting and Reserved Addresses

Cisco CCNP BSCI Exam Tutorial RIP Update Packet Authentication

Passing Cisco's CCNA and CCNP Exams the VLAN Dat File

Passing Cisco's CCNA and CCNP Exams TraceroutePassing Cisco's CCNA and CCNP Ping and Extended Ping

Passing the CCNA and CCNP Cisco Home Lab FAQ

Passing the CCNA and CCNP Exams Setup ModePassing the CCNA and CCNP Home Lab Shopping on EBAY

Passing you CCNA and CCNP COnfiguring and Troubleshooting Router on a Stick

You are Viewing cisco 642 831 cit certification exam

Traducido al: español Mostrar texto original Más información

Página 64 de 64Cisco 642-831 CIT Certification Exam

09/11/2010http://www.networkliquidators.com/cisco-642-831-cit-certification-exam.asp