Q101.  - (Topic 3)

What is the default administrative distance of OSPF?

A. 90

B. 100

C. 110

D. 120

Answer: C


Administrative distance is the feature that routers use in order to select the best path when there are two or more different routes to the same destination from two different routing protocols. Administrative distance defines the reliability of a routing protocol. Each routing

protocol is prioritized in order of most to least reliable (believable) with the help of an administrative distance value.

Default Distance Value Table

This table lists the administrative distance default values of the protocols that Cisco supports:

Route Source

Default Distance Values

Connected interface 0

Static route 1

Enhanced Interior Gateway Routing Protocol (EIGRP) summary route 5

External Border Gateway Protocol (BGP) 20

Internal EIGRP 90

IGRP 100 OSPF 110

Intermediate System-to-Intermediate System (IS-IS) 115

Routing Information Protocol (RIP) 120

Exterior Gateway Protocol (EGP) 140

On Demand Routing (ODR) 160

External EIGRP 170

Internal BGP 200

Unknown* 255

Q102.  - (Topic 5)

What levels will be trapped if the administrator executes the command router(config)# logging trap 4 (Choose four)

A. Emergency

B. Notice

C. Alert

D. Error

E. Warning

Answer: A,C,D,E


The Message Logging is divided into 8 levels as listed below: Level Keyword Description

0 emergencies System is unusable 1 alerts Immediate action is needed 2 critical Critical conditions exist

3 errors Error conditions exist

4 warnings Warning conditions exist

5 notification Normal, but significant, conditions exist 6 informational Informational messages

7 debugging Debugging messages

If you specify a level with the “logging trap level” command, that level and all the higher levels will be logged. For example, by using the “logging trap 4 command, all the logging of emergencies, alerts, critical, errors, warnings will be logged.

Q103.  - (Topic 4)

What are three reasons that an organization with multiple branch offices and roaming users might implement a Cisco VPN solution instead of point-to-point WAN links? (Choose three.)

A. reduced cost

B. better throughput

C. broadband incompatibility

D. increased security

E. scalability

F. reduced latency

Answer: A,D,E


IPsec offer a number of advantages over point to point WAN links, particularly when multiple locations are involved. These include reduced cost, increased security since all traffic is encrypted, and increased scalability as s single WAN link can be used to connect to all locations in a VPN, where as a point to point link would need to be provisioned to each location.

Q104.  - (Topic 5)

On which options are standard access lists based?

A. destination address and wildcard mask

B. destination address and subnet mask

C. source address and subnet mask

D. source address and wildcard mask

Answer: D


Standard ACL’s only examine the source IP address/mask to determine if a match is made. Extended ACL’s examine the source and destination address, as well as port information.

Q105.  - (Topic 8)

Which network topology allows all traffic to flow through a central hub?

A. bus

B. star

C. mesh

D. ring

Answer: B

Q106.  - (Topic 8)

Which destination IP address can a host use to send one message to multiple devices across different subnets?





Answer: D

Explanation: Multicast is a networking protocol where one host can send a message to a special multicast IP address and one or more network devices can listen for and receive those messages.

Multicast works by taking advantage of the existing IPv4 networking infrastructure, and it does so in something of a weird fashion. As you read, keep in mind that things are a little

confusing because multicast was "shoe-horned" in to an existing technology.

For the rest of this article, let's use the multicast IP address of We'll not worry about port numbers yet, but make a mental note that they are used in multicast. We'll discuss that later.

Q107.  - (Topic 4)

What is the purpose of Inverse ARP?

A. to map a known IP address to a MAC address

B. to map a known DLCI to a MAC address

C. to map a known MAC address to an IP address

D. to map a known DLCI to an IP address

E. to map a known IP address to a SPID

F. to map a known SPID to a MAC address

Answer: D


Dynamic address mapping relies on the Frame Relay Inverse Address Resolution Protocol (Inverse ARP), defined by RFC 1293, to resolve a next hop network protocol (IP) address to a local DLCI value. The Frame Relay router sends out Inverse ARP requests on its Frame Relay PVC to discover the protocol address of the remote device connected to the Frame Relay network. The responses to the Inverse ARP requests are used to populate an address-to-DLCI mapping table on the Frame Relay router or access server. The router builds and maintains this address-to-DLCI mapping table, which contains all resolved Inverse ARP requests, including both dynamic and static mapping entries.

Q108.  - (Topic 8)

What is the best way to verify that a host has a path to other hosts in different networks?

A. Ping the loopback address.

B. Ping the default gateway.

C. Ping the local interface address.

D. Ping the remote network.

Answer: D


Ping is a tool that helps to verify IP-level connectivity; PathPing is a tool that detects packet loss over multiple-hop trips. When troubleshooting, the ping command is used to send an ICMP Echo Request to a target host name or IP address. Use Ping whenever you want to verify that a host computer can send IP packets to a destination host. You can also use the Ping tool to isolate network hardware problems and incompatible configurations.

If you call ipconfig /all and receive a response, there is no need to ping the loopback address and your own IP address — Ipconfig has already done so in order to generate the report.

It is best to verify that a route exists between the local computer and a network host by first using ping and the IP address of the network host to which you want to connect. The command syntax is:

ping < IP address >

Perform the following steps when using Ping:

✑ Ping the loopback address to verify that TCP/IP is installed and configured correctly on the local computer.


If the loopback step fails, the IP stack is not responding. This might be because the TCP drivers are corrupted, the network adapter might not be working, or another service is interfering with IP.

✑ Ping the IP address of the local computer to verify that it was added to the network

correctly. Note that if the routing table is correct, this simply forwards the packet to the loopback address of

ping < IP address of local host >

✑ Ping the IP address of the default gateway to verify that the default gateway is functioning and that you can communicate with a local host on the local network.

ping < IP address of default gateway >

✑ Ping the IP address of a remote host to verify that you can communicate through a router.

ping < IP address of remote host >

✑ Ping the host name of a remote host to verify that you can resolve a remote host name.

ping < Host name of remote host >

✑ Run a PathPing analysis to a remote host to verify that the routers on the way to the destination are operating correctly.

pathping < IP address of remote host >

Q109.  - (Topic 4)

What occurs on a Frame Relay network when the CIR is exceeded?

A. All TCP traffic is marked discard eligible.

B. All UDP traffic is marked discard eligible and a BECN is sent.

C. All TCP traffic is marked discard eligible and a BECN is sent.

D. All traffic exceeding the CIR is marked discard eligible.

Answer: D


Committed information rate (CIR): The minimum guaranteed data transfer rate agreed to by the Frame Relay switch. Frames that are sent in excess of the CIR are marked as discard eligible (DE) which means they can be dropped if the congestion occurs within the Frame Relay network.

Note: In the Frame Relay frame format, there is a bit called Discard eligible (DE) bit that is used to identify frames that are first to be dropped when the CIR is exceeded.

Q110.  - (Topic 5)

What are three benefits of GLBP? (Choose three.)

A. GLBP supports up to eight virtual forwarders per GLBP group.

B. GLBP supports clear text and MD5 password authentication between GLBP group members.

C. GLBP is an open source standardized protocol that can be used with multiple vendors.

D. GLBP supports up to 1024 virtual routers.

E. GLBP can load share traffic across a maximum of four routers.

F. GLBP elects two AVGs and two standby AVGs for redundancy.

Answer: B,D,E