Question 111: Which of the following EXEC commands will reset LLDP traffic error counters?
A. clear lldp
B. clear lldp all
C. clear table lldp
D. clear lldp table
E. clear lldp counters
Correct Answer: E. clear lldp counters
Explanation: The correct syntax to reset Link Layer Discovery Protocol (LLDP) traffic and error counters to zero is clear lldp counters. The clear lldp table command will delete the LLDP table of any information about learned neighbors. All other answers have incorrect or incomplete syntax.
Question 112: One of the routers in your company has just received information about network 172.16.10.0/24 from multiple sources. Which of the below will the router consider as the most reliable source for network 172.16.10.0/24?
A. An EIGRP update for network 172.16.10.0/24
B. An OSPF update for network 172.16.10.0/24
C. A static route to network 172.16.10.0/24
D. A default route with a next hop address of 172.16.0.1
E. A directly connected interface with an IP address of 172.16.10.254/24
F. None of the above. The router will discard the update.
Correct Answer: E. A directly connected interface with an IP address of 172.16.10.254/24
Explanation: The administrative distance is used by a router to determine which routing protocol to use if two or more protocols provide routing information for the same destination network. The smaller the administrative distance is, the higher the preference.
Directly connected interfaces have an AD of 0 and are always preferred. Static routes have an AD of 1, while the Enhanced Interior Gateway Routing Protocol (EIGRP) has an AD of 90, and Open Shortest Path First (OSPF) has an AD of 110.
Question 113: In the network diagram above, which path will packets take when traveling from host 192.168.50.126 to host 192.168.50.5?
A. Packets will travel from R3 to R2 to R1.
B. Packets will travel from R1 to R3 to R2.
C. Packets will travel from R3 to R1 and return back to R3.
D. Packets will travel from R3 to R1 and from R3 to R2 to R1.
E. Packets will travel from R1 to R2 and back.
Correct Answer: D. Packets will travel from R3 to R1 and from R3 to R2 to R1.
Explanation: We begin by identifying to which network host 192.168.50.126 belongs. IP address 192.168.50.126 is the last usable address for network 192.168.50.64/26, which means it is directly connected to Router 3.
Next, we need to identify where 192.168.50.5 is located. By examining the diagram, we can see IP 192.168.50.5 is Router 1’s interface that connects directly with Router 2.
Finally, to understand the path packets will take, we examine the output of Router 3’s routing table and discover there are two equal cost links to network 192.168.50.4/30. So, EIGRP will load-balance between both paths.
Question 114: Which of the following options are used in standard access lists?
A. Destination address and subnet mask
B. Source address and subnet mask
C. Destination address and wildcard mask
D. Source address and wildcard mask
Correct Answer: D. Source address and wildcard mask
Explanation: Standard access lists provide a simple set of options: the source address and wildcard mask. Extended access lists offer additional options — source address, destination address, wildcard mask, protocol and ports — thus providing greater granularity.
In both cases, it’s important to remember access lists always use the wildcard mask, which is the reverse of a subnet mask.
Question 115: When configuring NAT, what is the purpose of the overload command, as used in the following example:
Router(config)#ip nat inside source list 1 interface gi0/2 overload
A. It translates a single local address into many global addresses by tracking the connection’s UDP port number.
B. It indicates a one-to-one translation on the interface by tracking the connection’s TCP port number.
C. It translates many local addresses into a single global address by tracking the connection’s TCP port number.
D. It translates a single local address into many global addresses by tracking the connection’s TCP port number.
E. It translates many local addresses into a single global address by tracking the connection’s UDP port number.
Correct Answer: C. It translates many local addresses into a single global address by tracking the connection’s TCP port number.
Explanation: The example configuration will use the single IP address assigned to interface gi0/2. Any internal — local — IP that attempts to communicate with a device on the other side of gi0/2 will be translated to this single address.
The router will maintain a NAT table for this connection. This table contains the local IP address of the internal device, the single IP to which it is translated and a unique TCP port number that is used to identify packets within that particular conversation.
Question 116: Which statement about NTP is true?
A. A stratum 2 NTP server is directly attached to an authoritative time source.
B. NTP must be configured to synchronize with one of a handful of atomic clocks available on the internet.
C. NTP authentication is disabled by default.
D. You must configure two or more NTP sources for times to be accurate.
Correct Answer: C. NTP authentication is disabled by default.
Explanation: By default, NTP authentication is disabled. To configure it, you must set the authentication-key, trusted-key number and then enable the features using the ntp authenticate command.
Question 117: What actions does the DHCP server take when there is an IP address conflict, as shown above?
A. The DHCP server will automatically resolve all conflicts after their lease is over.
B. The IP addresses are removed from the DHCP pool until the conflicts are resolved.
C. The IP addresses detected by gratuitous Address Resolution Protocol are removed from the pool.
D. The IP addresses detected by ping are removed from the pool.
E. The DHCP server needs to be restarted in order to automatically clear all conflicts.
Correct Answer: B. The IP addresses are removed from the DHCP pool until the conflicts are resolved.
Explanation: When a Cisco DHCP server discovers a conflict, it will place the IP address into the conflict table, stating the address was conflicting and how it came to that conclusion, as noted under the detection method column.
The administrator must examine each IP address and detection method and, when ready, clear the IP addresses from the conflict pool.
Question 118: What would the result be when the following commands are executed on a Cisco Catalyst switch:
TechTarget-SW1 (config-if)# switchport port-security
TechTarget-SW1 (config-if)# switchport port-security mac-address sticky
A. The MAC address learned dynamically is saved in the switch’s running-configuration.
B. The MAC address learned dynamically is saved in the switch’s startup configuration.
C. The MAC address learned dynamically is saved permanently in the VLAN database.
D. The statically configured MAC address is saved in the switch’s running configuration when frames from that address are received.
E. The first MAC address seen on the specific port is allowed to access the network until the port security timer expires.
Correct Answer: A. The MAC address learned dynamically is saved in the switch’s running-configuration.
Explanation: When the
switch port-security mac-address sticky command is used without specifying a MAC address at the end, the MAC address of the attached device is dynamically learned and placed in the running configuration of the switch.
Question 119: Which of the following is not an IPv6 address type?
Correct Answer: A. Broadcast
Explanation: Unlike IPv4, the IP version 6 (IPv6) protocol does not use a broadcast address type. For bandwidth efficiency purposes, the duties of IPv4’s broadcast addressing have been incorporated into IPv6 multicast addressing.
Question 120: A router has two identical default routes to 10.0.0.0/24. One route is learned via EIGRP, and the other is a static route. Which of the following commands will set the static route so it’s only used in the event the EIGRP route is no longer available?
A. ip route 10.0.0.0 255.0.0.0 192.168.1.254 10
B. ip route 10.0.0.0 255.0.0.0 192.168.1.254 100
C. ip route 10.0.0.0 255.0.0.0 192.168.1.254 distance 10
D. ip route 10.0.0.0 255.0.0.0 192.168.1.254 distance 100
Correct Answer: B. ip route 10.0.0.0 255.0.0.0 192.168.1.254 100
Explanation: Adjusting the administrative distance so it is higher than a dynamically learned AD is known as a floating static route. Floating static routes are often used as a failover mechanism in the event the dynamically learned path fails. The proper syntax to change the AD is to simply type it at the end of the next-hop route. The distance can be set to anything between 1 and 255. In this example, the AD must be set higher than 90, as this is the default AD used by internal EIGRP.