Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Cisco.doc
Скачиваний:
55
Добавлен:
13.03.2015
Размер:
7.6 Mб
Скачать

Explanation

When powered on, the router first checks its hardware via Power-On Self Test (POST). Then it checks the configuration register to identify where to load the IOS image from. In the output above we learn that the Configuration register value is 0×2102 so the router will try to boot the system image from Flash memory first.

But we also see a line “System image file is “tftp://112.16.1.129/hampton/nitro/c7200-j-mz”. Please notice that this line tells us the image file that the device last started. In this case it is from a TFTP server. Therefore we can deduce that the router could not load the IOS image from the flash and the IOS image has been loaded from TFTP server.

Note:

If the startup-config file is missing or does not specify a location, it will check the following locations for the ios image:

+ Flash (the default location) + TFTP server + ROM (used if no other source is found)

Question 8

Host 1 is trying to communicate with Host 2. The e0 interface on Router C is down. Which of the following are true? (Choose two)

A. Router C will use ICMP to inform Host 1 that Host 2 cannot be reached. B. Router C will use ICMP to inform Router B that Host 2 cannot be reached. C. Router C will use ICMP to inform Host 1, Router A, and Router B that Host 2 cannot be reached.  D. Router C will send a Destination Unreachable message type. E. Router C will send a Router Selection message type. F. Router C will send a Source Quench message type.

 

Answer: A D

Explanation

The last known good router will try to inform you that the destination cannot be reached (with a Destination Unreachable message type) so from that information you can learn how far your packets can travel to and where the problem is.

Question 9

How is an EUI-64 format interface ID created from a 48-bit MAC address?

A. by appending 0xFF to the MAC address. B. by prefixing the MAC address with 0xFFEE. C. by prefixing the MAC address with 0xFF and appending 0xFF to it. D. by inserting 0xFFFE between the upper three bytes and the lower three bytes of the MAC address  E. by prefixing the MAC address with 0xF and inserting 0xF after each of its first three bytes.

 

Answer: D

Explanation

We convert a 48-bit MAC address (IEEE 802) to a 64-bit value by breaking the MAC address into its two 24-bit halves. The first part is the Organizationally Unique Identifier (OUI) and the next part is the NIC specific part. Then the 16-bit hex value 0xFFFE is inserted between them to create a 64-bit value.

Just for your information, to obtain an IPv6 interface identifier from EUI-64 address, we have to complement the U/L bit (the seventh bit of the first byte and is used to determine whether the address is universally or locally administered). This means if it is a 1, it is set to 0; and if it is a 0, it is set to 1. In the above example, the U/L bit is 0 (from 00 = 0000 0000). Therefore we have to set this bit to 1 to create an IPv6 interface address.

Question 10

Refer to the exhibit:

A network administrator is adding two new hosts to SwitchA. Which three values could be used for the configuration of these hosts? (Choose three)

A. host A IP address: 192.168.1.79 B. host A IP address: 192.168.1.64 C. host A default gateway: 192.168.1.78 D. host B IP address: 192.168.1.128 E. host B default gateway: 192.168.1.129 F. host B IP address: 192.168.1.190

 

Answer: A C F

CCNA Operation 2

Question 1

Refer to the exhibit. A network technician is asked to design a small network with redundancy. The exhibit represents this design, with all hosts configured in the same VLAN. What conclusions can be made about this design?

A. The design will function as intended B. Spanning-tree will need to be used. C. The router will not accept the addressing scheme. D. The connection between switches should be a trunk. E. The router interfaces must be encapsulated with the 802.1Q protocol.

 

Answer: C

Explanation

Each interface on a router must be in a different network. If two interfaces are in the same network, the router will not accept it and show error when the administrator assigns it.

Question 2

Refer to the exhibit. What can be determined about the router from the console output?

1 FastEthernet/IEEE 802.3 interface(s) 125K bytes of non-volatile configuration memory. 65536K bytes of ATA PCMCIA card at slot 0 (Sector size 512 bytes) .  8192K bytes of Flash internal SIMM (Sector size 256K).

———-System Configuration Dialog ———-

Would you like to enter the initial configuration dialog? [yes/no]:

A. No configuration file was found in NVRAM. B. No configuration file was found in flash. C. No configuration file was found in the PCMCIA card. D. Configuration file is normal and will load in 15 seconds.

 

Answer: A

Explanation

When no startup configuration file is found in NVRAM, the System Configuration Dialog will appear to ask if we want to enter the initial configuration dialog or not.

Question 3

Which command displays CPU utilization?

A. show protocols B. show process C. show system D. show version

 

Answer: B

Explanation

The “show process” (in fact, the full command is “show processes”) command gives us lots of information about each process but in fact it is not easy to read. Below shows the output of this command (some next pages are omitted)

A more friendly way to check the CPU utilization is the command “show processes cpu history”, in which the total CPU usage on the router over a period of time: one minute, one hour, and 72 hours are clearly shown:

+ The Y-axis of the graph is the CPU utilization. + The X-axis of the graph is the increment within the period displayed in the graph

For example, from the last graph (last 72 hours) we learn that the highest CPU utilization within 72 hours is 37% about six hours ago.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]