|
Question 1. A QoS STA is permitted to send which frame types of a Hybrid Coordinator? A. QoS Data + CF-ACK + CF-Poll B. Data + CF - Poll C. QoS Null D. PS-Poll E. CF-End + CF -Ack Answer: C, D Question 2. WMM-PS trigger frames can be what type of IEEE 802.11 frames? A. Reassociation B. PS-Poll C. QoS Data D. QoS + CF-Poll E. QoS Null F. CTS Answer: C, E Question 3. Given: ITCertKeys.com has an IEEE 802.11 WLAN secured by strong authentication (PEAP-EAP-MSCHAPv2) and encryption (CCMP/AES). They wish to implement wVoIP phones but have notices that the phones they have selected only supports WPA-Personal using TKIP/RC4. How can ITCertKeys.com maintain their current level of data security while allowing the wVoIP phones network access? A. Enable application layer encryption for the voice protocol and implement a wireless intrusion prevention system (WIPS) on the wVoIP network segment B. Use a secure DHCP server that can restrict access to layer 3 addresses based on user authentication C. Use MAC filtering to the network segment where the wVoIP phones will be used D. Use a separate SSID for the wVoIP phones and map this new SSID to a separate VLAN on the wired infrastructure E. Using RBAC, allow only the appropriate voice protocol (SIP, H.323 etc) to a specific destination address on the network segment where the wVoIP phones will be used Answer: D, E Question 4: On an Enterprise IEEE 802.11 WLAN supporting both voice and data, why is WPA2-Personal security often preferred over WPA2-Enterprise Security for voice-enabled devices? A. WPA2-Personal imposes less encryption overhead than WPA2-Enterprise, resulting in better performance B. WPA2-Personal is more easily configured on the voice-enabled client devices than WPA2- Enterprise C. WPA2-Personal supports IEEE 802.11 fast/secure roaming between access points, whereas WPA2-Enterpise deployments may not D. Voice-enabled devices uses application layer (L7) security mechanism, minimizing the need for scalable data link (L2) security E. WPA2-Enterprise voice-enabled devices consume battery life at rate of almost double that of WAP2-Personal Answer: C Question 5. Given: An ingress frame arrives on the Ethernet port of an autonomous AP marked with an IEEE 802.1D user priority value: Which IEEE 802.1D user priority values (by name) will assure the data payload carried by the Ethernet frame gets assigned to the highest priority WMM queue? A. Voice B. Network Control C. Best Effort D. Controlled Load E. Video Answer: A, B Question 6. A QoS STA obtains a TXOP for an access category (AC) after what two parameters are met? A. After a Block ACK Response B. After a scheduled service period ends C. The medium is idle at the AIFS[AC] slot boundary D. After a Target Beacon Transmission Time (TBTT) E. The backoff time for that AC has expired Answer: C, E Question 7. Given: An EDCA QoS BSS is operating as a Robust Security Network (RSN). Two QoS STAs in the QoS BSS are using a Direct Link to communicate. When the RTS/CTS threshold is exceeded for a frame to be transmitted between the two QoS STAs, what is the frame exchange sequence, including interframe spaces? A. AIFS-RTS-SIFS-CTS-SIFS-DATA-SIFS-ACK B. AIFS-RTS-SIFS-CTS-DIFS-DATA-SIFS-ACK C. DIFS-RTS-CTS-SIFS-DATA-SIFS-ACK D. RIFS-RTS-SIFS-CTS-SIFS-DATA-SIFS-ACK E. DIFS-RTS-SIFS-ACK-SIFS-CTS-SIFS-ACK-SIFS-DATA-SIFS-ACK Answer: A Question 8. All successful frame transmissions within an EDCA TXOP are separated by what IEEE 802.11 entity? A. TBTT B. ACK C. SIFS D. AIFS E. PIFS F. CAP Answer: C Question 9. Given: ITCertKeys.com has recently installed its first access point. The access point is an ERP unit and both ERP and HR-DSSS client stations will be used on the wireless network simultaneously. The network administrator has appropriately configured the access point and all of the company's HR-DSSS wireless client stations to use short preambles for CCK transmissions. A visitor begins using a Personal Data Assistant (PDA) with an integrated HR-DSSS radio configured for use of long preambles on ABC's wireless network Which statement describes what the network administrator will se with a wireless protocol analyzer? A. Once the visitor's PDA is associated to the access point, all HR-DSSS stations associated to the access point will being using long preambles B. The visitor's PDA will communicate with the access point using long preambles and the access point will communicate with all other client stations using short preambles C. The visitor's PDA will not be able to associate to the wireless network and it will cause significant interference for other wireless stations D. The visitor's PDA will associate to the access point using MMPDUs with long preambles but then begin sending Data frames using short preambles since data frames can't use long preambles Answer: A Question 10. Given: Shown are frames captured from an IEEE 80.1X/LEAP authentication. This WLAN is a Robust Security network (RSN) using the CCMP cipher suite. Exhibit: Using the information given in the screenshot, calculate how long it takes for only the frames that are part of the 4-Way handshake to complete. A. 210.443 ms B. 243.743 ms C. 3.018 ms D. 5.820 ms E. 237.753 ms Answer: D
|
Question 1. ITCertKeys uses EIGRP as the primary routing protocol in their network. How does EIGRP advertise subnet masks for each destination network? A. EIGRP advertises a fixed length subnet mask for each destination network. B. EIGRP advertises only a classful subnet mask for each destination network. C. EIGRP, like IGRP and RIP, does not advertise a subnet mask for each destination network. D. EIGRP advertises a prefix length for each destination network. E. None of the above Answer: D Explanation: Enhanced Interior Gateway Routing Protocol (EIGRP) is a Cisco-proprietary routing protocol based on IGRP. Unlike IGRP, which is a classful routing protocol, EIGRP supports CIDR, allowing network designers to maximize address space by using CIDR and VLSM. Compared to IGRP, EIGRP boasts faster convergence times, improved scalability, and superior handling of routing loops. The prefix length field signifies the subnet mask to be associated with the network number specified in the destination field. Thus, if an EIGRP router is configured as follows: 1. ip address 172.16.1.1 255.255.255.0 it will advertise 172.16.1.0 with a prefix length of 24. Likewise, if the router is configured as follows: 1. ip address 172.16.250.1 255.255.255.252 it will advertise 172.16.250.0 with a prefix length of 30. Question 2. The ITCertKeys network uses EIGRP. Identify three characteristics of EIGRP feasible successors? (Select three) A. Traffic will be load balanced between feasible successors with the same advertised distance. B. If the advertised distance of the non-successor route is less than the feasible distance of best route, then that route is identified as a feasible successor. C. If the successor becomes unavailable, then the feasible successor can be used immediately without recalculating for a lost route. D. The feasible successor can be found in the routing table. E. A feasible successor is selected by comparing the advertised distance of a non-successor route to the feasible distance of the best route. Answer: B, C, E Explanation: Once a neighbor relationship has been formed, called an Adjacency, the routers exchange routing update information and each router builds its own topology table. The Updates contain all the routes known by the sender. For each route, the receiving router calculates a distance for that route based on the distance that is conveyed and the cost to that neighbor that advertised the particular route. If the receiving router sees several routes to a particular network with different metrics, then the route with the lowest metric becomes the Feasible Distance (FD) to that network. The Feasible Distance is the metric of a network advertised by the connected neighbor plus the cost of reaching that neighbor. This path with the best metric is entered into the routing table because this is the quickest way to get to that network. With the other possible routes to a particular network with larger metrics, the receiving router also receives the Reported Distance (RD) to this network via other routers. The Reported Distance being the total metric along a path to a destination network as advertised by an upstream neighbor. The Reported Distance for a particular route is compared with the Feasible Distance that it already has for that route. If the Reported Distance is larger than the Feasible Distance then this route is not entered into the Topology Table as a Feasible Successor. This prevents loops from occurring. If the Reported Distance is smaller than the Feasible Distance, then this path is considered to be a Feasible Successor and is entered into the Topology table. The Successor for a particular route is the neighbor/peer with the lowest metric/distance to that network. If the receiving router has a Feasible Distance to a particular network and it receives an update from a neighbor with a lower advertised distance (Reported Distance) to that network, then there is a Feasibility Condition. In this instance, the neighbor becomes a Feasible Successor for that route because it is one hop closer to the destination network. There may be a number of Feasible Successors in a meshed network environment, up to 6 of them are entered into the Topology table thereby giving a number of next hop choices for the local router should the neighbor with the lowest metric fail. What you should note here, is that the metric for a neighbor to reach a particular network (i.e. the Reported Distance) must always be less than the metric (Feasible Distance) for the local router to reach that same network. This way routing loops are avoided. This is why routes that have Reported Distances larger than the Feasible Distance are not entered into the Topology table, so that they can never be considered as successors, since the route is likely to loop back through that local router. Incorrect Answers: D: The feasible successors are found in the topology table, but not the active routing table. E: With EIGRP, traffic is load balanced across equal cost links in the routing table, but not between feasible successors. Reference: http://www.rhyshaden.com/eigrp.htm Question 3. Two ITCertKeys EIGRP routers are attempting to establish themselves as neighbors. Which EIGRP multicast packet type is responsible for neighbor discovery? A. Update B. Query C. Acknowledgment D. Reply E. Hello F. None of the above Answer: E Explanation: Remember that simple distance vector routers do not establish any relationship with their neighbors. RIP and IGRP routers merely broadcast or multicast updates on configured interfaces. In contrast, EIGRP routers actively establish relationships with their neighbors, much the same way that OSPF routers do. EIGRP routers establish adjacencies with neighbor routers by using small hello packets. Hellos are sent by default every five seconds. An EIGRP router assumes that as long as it is receiving hello packets from known neighbors, those neighbors (and their routes) remain viable. By forming adjacencies, EIGRP routers do the following: 1. Dynamically learn of new routes that join their network 2. Identify routers that become either unreachable or inoperable 3. Rediscover routers that had previously been unreachable Question 4. ITCertKeys has chosen to use EIGRP for their network routing protocol. Which three statements are true regarding EIGRP? (Select three) A. By default, EIGRP uses the Dijkstra algorithm to determine the best path to a destination network based on bandwidth and delay. B. To speed convergence, EIGRP attempts to maintain a successor and feasible successor path for each destination. C. EIGRP uses hellos to establish neighbor relationships. D. By default, EIGRP performs auto-summarization across classful network boundaries. E. EIGRP uses an area hierarchy to increase network scalability. Answer: B, C, D Explanation: EIGRP routers establish adjacencies with neighbor routers by using small hello packets. Hellos are sent by default every five seconds. An EIGRP router assumes that as long as it is receiving hello packets from known neighbors, those neighbors (and their routes) remain viable. By forming adjacencies, EIGRP routers do the following: 1. Dynamically learn of new routes that join their network 2. Identify routers that become either unreachable or inoperable 3. Rediscover routers that had previously been unreachable EIGRP routers keep route and topology information readily available in RAM so they can react quickly to changes. Like OSPF, EIGRP keeps this information in several tables, or databases. * Successor - A successor is a route selected as the primary route to use to reach a destination. Successors are the entries kept in the routing table. Multiple successors for a destination can be retained in the routing table. * Feasible successor - A feasible successor is a backup route. These routes are selected at the same time the successors are identified, but are kept in the topology table. Multiple feasible successors for a destination can be retained in the topology table. EIGRP automatically summarizes routes at the classful boundary, the boundary where the network address ends as defined by class-based addressing. In most cases, auto summarization is a good thing, keeping the routing tables as compact as possible In the presence of discontinuous subnetworks, automatic summarization must be disabled for routing to work properly. To turn off auto-summarization, use the following command: Router(config-router)#no auto-summary Question 5. You need to configure EIGRP on all routers within the ITCertKeys network. Which two statements are characteristics of the routing protocol EIGRP? (Select two) A. Updates are sent as broadcast. B. Updates are sent as multicast. C. LSAs are sent to adjacent neighbors. D. Metric values are represented in a 32-bit format for granularity. Answer: B, D Explanation: EIGRP routers establish adjacencies with neighbor routers by using small hello packets. Hellos are sent by default every five seconds. An EIGRP router assumes that as long as it is receiving hello packets from known neighbors, those neighbors (and their routes) remain viable. By forming adjacencies, EIGRP routers do the following: 1. Dynamically learn of new routes that join their network 2. Identify routers that become either unreachable or inoperable 3. Rediscover routers that had previously been unreachable Question 6. You have been tasked with setting up summarization in the ITCertKeys EIGRP network. Which two statements are true about EIGRP manual summarization? (Select two) A. Manual summarization is configured on a per interface basis. B. When manual summarization is configured, auto-summarization is automatically disabled by default. C. The summary address is assigned an administrative distance of 10 by default. D. Manual summaries can be configured with the classful mask only. E. The summary address is entered into the routing table and is shown to be sourced from the Null0 interface. Answer: A, E Explanation: EIGRP automatically summarizes routes at the classful boundary, the boundary where the network address ends as defined by class-based addressing. In most cases, auto summarization is a good thing, keeping the routing tables as compact as possible In the presence of discontiguous subnetworks, automatic summarization must be disabled for routing to work properly. To turn off auto-summarization, use the following command: Router(config-router)#no auto-summary EIGRP also enables manual configuration of a prefix to use as a summary address. Manual summary routes are configured on a per-interface basis. The interface that will propagate the route summary must first be selected and then defined with the ip summary-address eigrp command, which has the following syntax: Router(config-if)#ip summary-address eigrp autonomous-system-number ip-address mask administrative-distance D 2.1.0.0/16 is a summary, 00:00:22, Null0 Notice that the summary route is sourced from Null0, and not an actual interface. Question 7. Router IT1 4 is configured as an EIGRP stub router. What are three key concepts that apply when configuring the EIGRP stub routing feature in a hub and spoke network? (Select three) A. Stub routers are not queried for routes. B. A hub router prevents routes from being advertised to the remote router. C. A stub router should have only EIGRP hub routers as neighbors. D. EIGRP stub routing should be used on hub routers only. E. Spoke routers connected to hub routers answer the route queries for the stub router. F. Only remote routers are configured as stubs. Answer: A, C, F Explanation: The Enhanced Interior Gateway Routing Protocol (EIGRP) Stub Routing feature improves network stability, reduces resource utilization, and simplifies stub router configuration. Stub routing is commonly used in a hub and spoke network topology. In a hub and spoke network, one or more end (stub) networks are connected to a remote router (the spoke) that is connected to one or more distribution routers (the hub). The remote router is adjacent only to one or more distribution routers. The only route for IP traffic to follow into the remote router is through a distribution router. This type of configuration is commonly used in WAN topologies where the distribution router is directly connected to a WAN. The distribution router can be connected to many more remote routers. Often, the distribution router will be connected to 100 or more remote routers. In a hub and spoke topology, the remote router must forward all nonlocal traffic to a distribution router, so it becomes unnecessary for the remote router to hold a complete routing table. Generally, the distribution router need not send anything more than a default route to the remote router. When using the EIGRP Stub Routing feature, you need to configure the distribution and remote routers to use EIGRP, and to configure only the remote router as a stub. Only specified routes are propagated from the remote (stub) router. The router responds to queries for summaries, connected routes, redistributed static routes, external routes, and internal routes with the message "inaccessible." A router that is configured as a stub will send a special peer information packet to all neighboring routers to report its status as a stub router. More on: http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/120newft/120limit/120s/120s15/eigrpstb. Question 8. You want to reduce the amount of EIGRP traffic across low speed links in the ITCertKeys network. Which is the most effective technique to contain EIGRP queries? A. Using a hierarchical addressing scheme B. Configuring route filters C. Establishing separate autonomous systems D. Route summarization E. None of the above Answer: D Explanation: EIGRP automatically summarizes routes at the classful boundary, the boundary where the network address ends as defined by class-based addressing. In most cases, auto summarization is a good thing, keeping the routing tables as compact as possible In the presence of discontiguous subnetworks, automatic summarization must be disabled for routing to work properly. To turn off auto-summarization, use the following command: Router(config-router)#no auto-summary EIGRP also enables manual configuration of a prefix to use as a summary address. Manual summary routes are configured on a per-interface basis. The interface that will propagate the route summary must first be selected and then defined with the ip summary-address eigrp command, which has the following syntax: Router(config-if)#ip summary-address eigrp autonomous-system-number ip-address mask administrative-distance Question 9. Routers IT1 and IT2 have formed an EIGRP neighbor relationship. In order for two routers to become EIGRP neighbors, which two values must match? (Select two) A. K values B. Delay C. Autonomous system D. Hello time E. Hold time F. Bandwidth Answer: A, C Explanation: Despite being compatible with IGRP, EIGRP uses a different metric calculation and hop-count limitation. EIGRP scales the IGRP metric by a factor of 256. That is because EIGRP uses a metric that is 32-bits long, and IGRP uses a 24-bit metric. By multiplying or dividing by 256, EIGRP can easily exchange information with IGRP. EIGRP also imposes a maximum hop limit of 224, which is slightly less than the 255 limit for IGRP. However, this is more than enough to support most of the largest internetworks. To become the neighbor K value should be matched and should belongs to same AS. Question 10. ITCertKeys uses EIGRP as their internal routing protocol. Which three statements are true about EIGRP operation? (Select three) A. The maximum metric for the specific routes is used as the metric for the summary route. B. When summarization is configured, the router will also create a route to null 0. C. The summary route remains in the route table, even if there are no more specific routes to the network. D. Automatic summarization across major network boundaries is enabled by default. E. Summarization is configured on a per-interface level. Answer: B, D, E Explanation: EIGRP automatically summarizes routes at the classful boundary, the boundary where the network address ends as defined by class-based addressing. In most cases, auto summarization is a good thing, keeping the routing tables as compact as possible In the presence of discontiguous subnetworks, automatic summarization must be disabled for routing to work properly. To turn off auto-summarization, use the following command: Router(config-router)#no auto-summary EIGRP also enables manual configuration of a prefix to use as a summary address. Manual summary routes are configured on a per-interface basis. The interface that will propagate the route summary must first be selected and then defined with the ip summary-address eigrp command, which has the following syntax: Router(config-if)#ip summary-address eigrp autonomous-system-number ip-address mask administrative-distance
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.