1. Which value determines if a switch becomes the central point of reference in the spanning tree topology?
xxxlowest bridge ID
highest revision number
lowest numeric IP address
highest numeric MAC address
2. Refer to the exhibit. What is the purpose of the configuration commands that are shown?
to activate port Fa0/10
xxxto make the port a member of VLAN 30
to activate port security on port Fa0/10
to add VLAN 30 to the trunk that is connected to port Fa0/10
Sabtu, 01 Mei 2010
Jumat, 30 April 2010
Final CCNA 2 (L)
1. What are two functions of a router? (Choose two.)
xxxIt connects multiple IP networks.
It controls the flow of data via the use of Layer 2 addresses.
xxxIt determines the best path to send packets.
It manages the VLAN database.
It increases the size of the broadcast domain
2. When a router boots, what is the default order to locate the Cisco IOS if there is no boot system command?
ROM, TFTP server, flash
xxxflash, TFTP server, ROM
flash, NVRAM, TFTP server
NVRAM, TFTP server, flash
xxxIt connects multiple IP networks.
It controls the flow of data via the use of Layer 2 addresses.
xxxIt determines the best path to send packets.
It manages the VLAN database.
It increases the size of the broadcast domain
2. When a router boots, what is the default order to locate the Cisco IOS if there is no boot system command?
ROM, TFTP server, flash
xxxflash, TFTP server, ROM
flash, NVRAM, TFTP server
NVRAM, TFTP server, flash
Final CCNA 3 (G)
01. Refer to the exhibit. Hosts B and C attempt to transmit a frame at the same time, but a collision occurs. Which hosts will receive the collision jamming signal?
all hosts that are shown
only hosts B and C
xxxonly hosts A, B, and C
only hosts A, B, C, and D
only hosts A, D, E, and F
only hosts D, E, and F
02. What is an efficient and cost effective way to minimize the frequency and effects of broadcast storms on an Ethernet LAN?
Connect each PC directly to a router port
Use access control lists to filter broadcasts from the network.
xxxDivide the computers into separate VLANs on the existing switches.
Divide the computers into separate workgroups using different physical switches.
all hosts that are shown
only hosts B and C
xxxonly hosts A, B, and C
only hosts A, B, C, and D
only hosts A, D, E, and F
only hosts D, E, and F
02. What is an efficient and cost effective way to minimize the frequency and effects of broadcast storms on an Ethernet LAN?
Connect each PC directly to a router port
Use access control lists to filter broadcasts from the network.
xxxDivide the computers into separate VLANs on the existing switches.
Divide the computers into separate workgroups using different physical switches.
Kamis, 29 April 2010
Part II: Cisco IOS Tips and Tricks
Timestamping Messages
When the router displays log or debug messages, it defaults to showing you how long the router had been up when the event occurred. Many times, it is more helpful instead to know the date and time when the event occurred. The command for this is service timestamps [log | debug] datetime localtime in global configuration mode. If you use this mode of logging, you should set the clock and date as shown in the next section.
Example:
Router(config)#^Z
Router#
00:39:40: %SYS-5-CONFIG_I: Configured from console by console
Router(config)#service timestamps log datetime localtime
Router(config)#^Z
Mar 2 15:47:04: %SYS-5-CONFIG_I: Configured from console by console
Setting the Clock and Time Zone
You can set the clock on the router with the privileged mode command: clock set . When issuing this command, you must use the actual name of the month, not its number.
You may also want to set the time zone and daylight savings time adjustments. This is done in global configuration mode. The commands are: clock timezone , and clock summer-time recurring.
When the router displays log or debug messages, it defaults to showing you how long the router had been up when the event occurred. Many times, it is more helpful instead to know the date and time when the event occurred. The command for this is service timestamps [log | debug] datetime localtime in global configuration mode. If you use this mode of logging, you should set the clock and date as shown in the next section.
Example:
Router(config)#^Z
Router#
00:39:40: %SYS-5-CONFIG_I: Configured from console by console
Router(config)#service timestamps log datetime localtime
Router(config)#^Z
Mar 2 15:47:04: %SYS-5-CONFIG_I: Configured from console by console
Setting the Clock and Time Zone
You can set the clock on the router with the privileged mode command: clock set
You may also want to set the time zone and daylight savings time adjustments. This is done in global configuration mode. The commands are: clock timezone
Part I: Cisco IOS Tips and Tricks
Auto-Completion of Commands
When typing a command, it is only necessary to type enough letters to make the command unique at your current configuration mode. Once you have enough letters that the IOS can understand what command you mean, you can stop typing. Type a few letters, then press the TAB key – if the router understands the command, it will complete it for you. If the router doesn’t understand the command, type another letter or two, press TAB again, and see if that’s enough. Typing fewer letters per command speeds up your configuration, and creates fewer changes for typos!
Disable DNS Server Lookup
When you type something (at the user or privileged prompt) that the router doesn’t recognize as a command, it assumes that you want to telnet there. So it telnets there if it’s an IP address, or looks in the config for a host table if you typed a word. If the word can’t be resolved to an IP address via a host table, the router broadcasts for a DNS server. This is good if what you typed was an IP address or host name that you want to telnet to – it means you don’t have to type the word “telnet.” This is bad if you just mistyped a command. It ties up the router until the DNS request times out. You can turn off the DNS request with the command no ip domain-lookup at the global config mode.
When typing a command, it is only necessary to type enough letters to make the command unique at your current configuration mode. Once you have enough letters that the IOS can understand what command you mean, you can stop typing. Type a few letters, then press the TAB key – if the router understands the command, it will complete it for you. If the router doesn’t understand the command, type another letter or two, press TAB again, and see if that’s enough. Typing fewer letters per command speeds up your configuration, and creates fewer changes for typos!
Disable DNS Server Lookup
When you type something (at the user or privileged prompt) that the router doesn’t recognize as a command, it assumes that you want to telnet there. So it telnets there if it’s an IP address, or looks in the config for a host table if you typed a word. If the word can’t be resolved to an IP address via a host table, the router broadcasts for a DNS server. This is good if what you typed was an IP address or host name that you want to telnet to – it means you don’t have to type the word “telnet.” This is bad if you just mistyped a command. It ties up the router until the DNS request times out. You can turn off the DNS request with the command no ip domain-lookup at the global config mode.
TestInside 642-845 ONT
1. Which three characteristics of the traffic flow are taken into consideration when the QoS-for-VPNs feature (QoS pre-classify) provides packet classification and applies appropriate QoS service on tunnel interfaces? (Choose three.)
A. IP precedence bits
B. DSCP bits
C. original port numbers
D. DE bits
E. source IP address
F. destination IP address
Answer: CEF
2. Which two QoS statements are true about the use of the SDM QoS wizard? (Choose two.)
A. Business-critical traffic includes VoIP and voice signaling packets.
B. SDM can be used to configure a basic QoS policy for incoming traffic on WAN interfaces and IPsec tunnels.
C. SDM can provide QoS for real-time traffic and business-critical traffic.
D. SDM creates a custom-queuing (CQ) or a priority-queuing (PQ) policy.
E. SDM creates a low latency queuing (LLQ) service policy with its associated classes.
F. When allocating bandwidth, values can be entered in either bandwidth percentage or kilobytes per second (kBps).
Answer: CE
A. IP precedence bits
B. DSCP bits
C. original port numbers
D. DE bits
E. source IP address
F. destination IP address
Answer: CEF
2. Which two QoS statements are true about the use of the SDM QoS wizard? (Choose two.)
A. Business-critical traffic includes VoIP and voice signaling packets.
B. SDM can be used to configure a basic QoS policy for incoming traffic on WAN interfaces and IPsec tunnels.
C. SDM can provide QoS for real-time traffic and business-critical traffic.
D. SDM creates a custom-queuing (CQ) or a priority-queuing (PQ) policy.
E. SDM creates a low latency queuing (LLQ) service policy with its associated classes.
F. When allocating bandwidth, values can be entered in either bandwidth percentage or kilobytes per second (kBps).
Answer: CE
Rabu, 28 April 2010
Final CCNA 4 (H)
1. Which encapsulation protocol when deployed on a Cisco router over a serial interface is only compatible with another Cisco router?
PPP
SLIP
xxxHDLC
Frame Relay
2. What is a characteristic feature of a worm?
xxxexploits a known vulnerability
attaches to executable programs
masquerades as a legitmate program
lies dormant until triggered by an event, time, or date
3.An administrator is configuring a dual stack router with IPv6 and IPv4 using RIPng. The administrator receives an error message when trying to enter the IPv4 routes into RIPng. What is the cause of the problem?
PPP
SLIP
xxxHDLC
Frame Relay
2. What is a characteristic feature of a worm?
xxxexploits a known vulnerability
attaches to executable programs
masquerades as a legitmate program
lies dormant until triggered by an event, time, or date
3.An administrator is configuring a dual stack router with IPv6 and IPv4 using RIPng. The administrator receives an error message when trying to enter the IPv4 routes into RIPng. What is the cause of the problem?
Selasa, 27 April 2010
The Evolving Network Model - The Hierarchical Design Model
Cisco used the three-level Hierarchical Design Model for years. This older model provided a high-level idea of how a reliable network might be conceived, but it was largely conceptual because it didn’t provide specific guidance. Figure 1-1 shows the Hierarchical Design Model.
Senin, 26 April 2010
TestKing v22 CCNA 640-802
QUESTION NO: 1
Both switches and hubs are being utilized within the TestKing network. Which of the following is true regarding the use of switches and hubs for network connectivity in this network?
A. Switches take less time to process frames than hubs take
B. Hubs can filter frames
C. Switches do not forward broadcasts
D. Switches increase the number of collision domains in the network
E. Using hubs can increase the amount of bandwidth available to hosts
F. None of the above
Both switches and hubs are being utilized within the TestKing network. Which of the following is true regarding the use of switches and hubs for network connectivity in this network?
A. Switches take less time to process frames than hubs take
B. Hubs can filter frames
C. Switches do not forward broadcasts
D. Switches increase the number of collision domains in the network
E. Using hubs can increase the amount of bandwidth available to hosts
F. None of the above
Langganan:
Postingan (Atom)