How come find: push “Ctrl + F” in the browser and fill in whatever wording is in the question to find that question/answer. If the inquiry is no here, uncover it in Questions Bank.

You are watching: Routing and switching essentials (version 6.00) - rse 6.0 chapter 7 exam

NOTE: If you have actually the new question top top this test, you re welcome comment Question and also Multiple-Choice list in form below this article. Us will upgrade answers because that you in the shortest time. Give thanks to you! us truly value your contribution to the website.

1. In i beg your pardon configuration would certainly an outbound ACL location be preferred over one inbound ACL placement?

when the ACL is applied to one outbound interface to filter packets coming from lot of inbound interfaces before the packets leave the interface*when a router has much more than one ACLwhen an outbound ACL is closer to the resource of the website traffic flowwhen an user interface is filtered by an outbound ACL and the network attached to the interface is the source network being filtered within the ACL

An outbound ACL have to be utilized when the very same ACL filtering rules will be applied to packets coming from more than one inbound interface before exiting a solitary outbound interface. The outbound ACL will certainly be applied on the single outbound interface.

2. Which address is required in the command syntax the a standard ACL?

source MAC addressdestination MAC addresssource IP address*destination IP address

The only filter that deserve to be applied with a traditional ACL is the source IP address. An extensive ACL can use many criteria to filter traffic, such as source IP address, location IP address, kind of traffic, and form of message.

3. I beg your pardon statement explains a difference between the operation of inbound and also outbound ACLs?

In contrast to outbound ALCs, inbound ACLs deserve to be provided to filter packets with multiple criteria.Inbound ACLs have the right to be used in both routers and also switches but outbound ACLs can be supplied only on routers.Inbound ACLs room processed prior to the packets space routed while outbound ACLs room processed ~ the routing is completed.*On a network interface, much more than one inbound ACL have the right to be configured yet only one outbound ACL deserve to be configured.

4. Which 3 statements explain ACL handling of packets? (Choose three.)

An implicit deny any type of rejects any packet the does no match any ACE.*A packet deserve to either be rejected or forwarded together directed by the ACE the is matched.*A packet that has been denied by one ACE can be allowed by a subsequent ACE.A packet the does not match the problems of any type of ACE will certainly be forwarded through default.Each explain is checked just until a match is detect or until the end of the ACE list.*Each packet is compared to the conditions of every ACE in the ACL before a forwarding decision is made.

When a packet comes right into a router that has an ACL configured on the interface, the router compare the problem of every ACE to recognize if the identified criteria has actually been met. If met, the router takes the activity defined in the ACE (allows the packet through or discards it). If the identified criteria has not to be met, the router proceeds come the following ACE. An latent deny any kind of statement is in ~ the end of every conventional ACL.

5. What single access perform statement matches all of the complying with networks?

access-list 10 allow*access-list 10 allow 10 permit 10 permit

The ACL explain access-list 10 allow will match all four network prefixes. All 4 prefixes have the same 22 high order bits. This 22 high order bits space matched by the network prefix and also wildcard mask of

6. A network administrator demands to configure a traditional ACL therefore that only the workstation the the administrator v the IP deal with can accessibility the virtual terminal of the main router. Which two configuration commands can accomplish the task? (Choose two.)

Router1(config)# access-list 10 permit host*Router1(config)# access-list 10 permit*Router1(config)# access-list 10 allow access-list 10 permit access-list 10 permit

To allow or refuse one particular IP address, either the wildcard mask (used ~ the IP address) or the wildcard mask keyword hold (used prior to the IP address) have the right to be used.

7. If a router has two interfaces and also is routing both IPv4 and IPv6 traffic, how plenty of ACLs might be created and applied to it?


In calculating how numerous ACLs have the right to be configured, use the preeminence of “three Ps”: one ACL every protocol, per direction, per interface. In this case, 2 interfaces x 2 protocols x 2 directions yields 8 possible ACLs.

8. Which three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)

Place typical ACLs close come the source IP address of the traffic.Place prolonged ACLs close to the destination IP attend to of the traffic.Filter unwanted traffic before it travels onto a low-bandwidth link.*Place extended ACLs close to the source IP resolve of the traffic.*Place conventional ACLs close to the destination IP resolve of the traffic.*For every inbound ACL placed on one interface, there have to be a equivalent outbound ACL.

Extended ACLs need to be put as nearby as feasible to the resource IP address, so that website traffic that needs to it is in filtered does no cross the network and use network resources. Due to the fact that standard ACLs do not specify a destination address, they have to be put as close come the destination as possible. Put a standard ACL close come the resource may have actually the result of filtering every traffic, and also limiting services to various other hosts. Filtering unwanted traffic prior to it beginning low-bandwidth links preserves bandwidth and also supports network functionality. Decisions on put ACLs inbound or outbound are dependent top top the demands to be met.

9. Refer to the exhibit. I m sorry command would certainly be provided in a conventional ACL to permit only gadgets on the network attached come R2 G0/0 interface to access the networks attached to R1?


access-list 1 permit 1 allow*access-list 1 permit 1 permit

Standard access lists only filter ~ above the source IP address. In the design, the packets would be coming from the network (the R2 G0/0 network). The exactly ACL is access-list 1 permit

10. Describe the exhibit. If the network administrator created a conventional ACL that permits only gadgets that connect to the R2 G0/0 network accessibility to the gadgets on the R1 G0/1 interface, just how should the ACL be applied?


inbound ~ above the R2 G0/0 interfaceoutbound top top the R1 G0/1 interface*inbound ~ above the R1 G0/1 interfaceoutbound top top the R2 S0/0/1 interface

Because standard accessibility lists only filter top top the resource IP address, castle are generally placed closest to the destination network. In this example, the resource packets will be comes from the R2 G0/0 network. The destination is the R1 G0/1 network. The proper ACL placement is outbound top top the R1 G0/1 interface.

11. Refer to the following output. What is the meaning of the 4 match(es) statement?R1# 10 allow permit (4 match(es))30 deny any type of (8 match(es))

Four packets have actually been refuse that have actually been sourced from any type of IP address.Four packets have actually been denied that space destined for the network.Four packets have actually been permitted through the router from pcs in the network the*Four packets have actually been enabled through the router to reach the location network the

The present access-lists command mirrors how countless packets have actually met the criteria for each ACE in regards to a specific variety of “matches.”

12. On i beg your pardon router have to the present access-lists command be executed?

on the router that paths the packet referenced in the ACL to the final destination networkon the router that courses the packet referenced in the ACL native the resource networkon any router with which the packet referenced in the ACL travelson the router that has actually the ACL configured*

The display access-lists command is just relevant to website traffic passing with the router on i beg your pardon the ACL is configured.

13. What is the quickest method to remove a single ACE from a named ACL?

Use the no keyword and also the sequence variety of the ACE to be removed.*Use the no access-list command to remove the whole ACL, climate recreate it without the ACE.Copy the ACL into a text editor, eliminate the ACE, climate copy the ACL back into the router.Create a new ACL with a various number and also apply the new ACL come the router interface.

Named ACL ACEs deserve to be gotten rid of using the no command followed by the succession number.

14. Which feature will need the usage of a named standard ACL fairly than a numbered conventional ACL?

the capability to filter traffic based upon a particular protocolthe capability to filter web traffic based on an entire protocol suite and destinationthe capability to specify resource and location addresses to use as soon as identifying trafficthe ability to include additional ACEs in the middle of the ACL there is no deleting and re-creating the list*

Standard ACLs (whether numbered or named) just filter on the resource IP address. Having actually a called ACL provides it much easier at time to identify the purpose as well as modify the ACL.

15. An administrator has actually configured an accessibility list top top R1 to allow SSH administrative accessibility from hold I beg your pardon command correctly applies the ACL?

R1(config-if)# ip access-group 1 inR1(config-if)# ip access-group 1 outR1(config-line)# access-class 1 in*R1(config-line)# access-class 1 out

Administrative accessibility over SSH to the router is through the vty lines. Therefore, the ACL have to be used to those currently in the inbound direction. This is completed by start line configuration mode and issuing the access-class command.

16. Which form of router connection can be secured by the access-class command?


Access come vty lines deserve to be filtered through an ACL and applied using the access-class in command.

17. Consider the complying with output for an ACL that has been used to a router via the access-class in command. What can a network administrator recognize from the output that is shown?

R1# conventional IP accessibility list 210 allow, wildcard bits (2 matches)20 deny any kind of (1 match)Two devices associated to the router have IP addresses that 192.168.10.x.Traffic from one maker was not enabled to come right into one router port and also be routed outbound a different router port.Two devices were maybe to use SSH or Telnet come gain accessibility to the router.*Traffic native two gadgets was permitted to go into one router port and be routed outbound come a various router port.
The access-class command is supplied only on VTY ports. VTY ports assistance Telnet and/or SSH traffic. The enhance permit ACE is how many attempts were enabled using the VTY ports. The enhance deny ACE shows that a an equipment from a network various other than was not enabled to access the router v the VTY ports.

18. Describe the exhibit. A router has an existing ACL that permits all web traffic from the network. The administrator attempts to include a brand-new ACE come the ACL that denies packets from organize and receives the error post that is shown in the exhibit. What action can the administrator require to block packets from organize while tho permitting all other traffic indigenous the network?


Manually add the new deny ACE with a sequence number of 5.*Manually include the new deny ACE with a sequence variety of 15.Create a 2nd access list denying the host and apply it to the very same interface.Add a deny any kind of any ACE to access-list 1.

Because the new deny ACE is a host resolve that falls within the existing network that is permitted, the router rejects the command and displays one error message. For the new deny ACE to take effect, it have to be manually configured by the administrator v a succession number the is much less than 10.

19. A network administrator issues the present vlan short command when troubleshooting a user assistance ticket. What output will certainly be displayed?

the VLAN assignment and also membership for every switch ports*the VLAN assignment and trunking encapsulationthe VLAN assignment and native VLANthe VLAN assignment and membership for device MAC addresses

20. Describe the exhibit. An ACL was configured ~ above R1 through the on purpose of denying traffic from subnet right into subnet All other traffic right into subnet have to be permitted. This standard ACL was then used outbound on user interface Fa0/0. I beg your pardon conclusion can be attracted from this configuration?​


Only website traffic from the subnet is blocked, and also all other traffic is allowed.​An expanded ACL should be supplied in this situation.The ACL have to be used to the FastEthernet 0/0 interface of R1 inbound to accomplish the requirements.All traffic will it is in blocked, not just traffic from the subnet.*The ACL must be used outbound on every interfaces of R1.

Because that the implicit refuse at the end of all ACLs, the access-list 1 permit any command have to be included to for sure that only traffic native the subnet is blocked and also that all various other traffic is allowed.​

21. Describe the exhibit. What will occur to the access list 10 ACEs if the router is rebooted before any other commands are implemented?


The ACEs of accessibility list 10 will certainly be deleted.The ACEs of accessibility list 10 will not be affected.The ACEs of access list 10 will certainly be renumbered.*The ACEs of access list 10 wildcard masks will certainly be convert to subnet masks.

After a reboot, access list entries will certainly be renumbered to allow host statements to be listed an initial and thus more efficiently handle by the Cisco IOS.​

22. What is the impact of configuring one ACL with just ACEs that deny traffic?

The ACL will permit any traffic that is not specifically denied.The ACL will block every traffic.*The ACL should be used inbound only.The ACL have to be applied outbound only.

Because over there is a deny any type of ACE at the end of every typical ACL, the result of having all refuse statements is the all traffic will be denied regardless of the direction in i m sorry the ACL is applied.

23. Which form of ACL declaration are generally reordered through the Cisco IOS as the very first ACEs?

host*rangepermit anylowest succession number

ACEs are generally reordered from the way they were gotten in by the network administrator. The ACEs that have actually host criteria such as in the statement permit organize, room reordered together the very first statements due to the fact that they room the most certain (have the most variety of bits that should match).

24. A network administrator is configuring an ACL come restrict accessibility to certain servers in the data center. The will is to apply the ACL come the interface connected to the data center LAN. What wake up if the ACL is incorrectly applied to an user interface in the inbound direction instead of the outbound direction?

All web traffic is denied.All traffic is permitted.The ACL go not execute as designed.*The ACL will certainly analyze traffic after it is routed to the outbound interface.

Always check an ACL to ensure that it performs as it was designed. Using an ACL that is applied using the ip access-group in command rather of using the ip access-group out command is no going to occupational as designed.

25. As soon as would a network administrator usage the clear access-list counters command?

when obtaining a baselinewhen buffer memory is lowwhen one ACE is turned off from one ACLwhen troubleshooting one ACL and also needing to recognize how plenty of packets matched*

The clean access-list counters command is offered to reset all numbers relating to ACE complement conditions that have actually been made within a specific ACE. The command is valuable when troubleshooting an ACL that has actually recently to be deployed.

26. Enhance each statement v the instance subnet and also wildcard that it describes. (Not all options are used.)Converting the wildcard mask to binary and subtracting that from returns a subnet mask of the hold parameter in a wildcard mask needs that all bits enhance the offered address. is the first valid host deal with in a subnetwork beginning with the subnetwork address The subnet mask consists of 4 hold bits, yielding subnets v 16 addresses. is a valid subnetwork address in a comparable subnetwork. Change the wildcard mask to binary and also subtract the from, and also the resulting subnet mask is is a subnetwork resolve in a subnet v 8 addresses. Convert to binary and also subtract that from, and also the result subnet mask is The mask consists of 3 host bits, and also yields 8 addresses.

Older Version:

27. What two tasks do dynamic routing protocols perform? (Choose two.)

discover hostsupdate and also maintain routing tables*propagate hold default gatewaysnetwork discovery*assign IP addressing

28. What is a disadvantage of making use of dynamic routing protocols?

They space only an ideal for basic topologies.Their configuration complexity increases as the dimension of the network grows.They send messages about network condition insecurely throughout networks by default.*They need administrator treatment when the pathway of web traffic changes.

29. Which 2 statements are true concerning classless routing protocols? (Choose two.)

sends subnet mask details in routing updates*sends finish routing table update to all neighborsis supported by RIP variation 1allows for use of both and subnets in the exact same topology*reduces the lot of address an are available in one organization

30. An OSPF allowed router is processing learned courses to select best paths to with a destination network. What is the OSPF algorithm assessing as the metric?

The lot of packet shipment time and also slowest bandwidth.The variety of hops along the routing path.The quantity of traffic and probability of failure of links.The accumulation bandwidth that is used along the routing path.*

31. ~ a network topology readjust occurs, which distance vector routing protocol can send an update message directly to a single neighboring router without unnecessarily notifying various other routers?


32. What is the function of the passive-interface command?

allows a routing protocol to forward updates out an user interface that is absent its IP addressallows a router to send routing update on one interface however not receive updates via the interfaceallows an user interface to remain up without receiving keepalivesallows interfaces come share IP addressesallows a router to obtain routing updates on an interface yet not send update via the interface*

33. Describe the exhibit. Based upon the partial output from the show ip course command, what 2 facts have the right to be determined around the RIP routing protocol? (Choose two.)


RIP variation 2 is running on this router and its RIP neighbor.*The metric come the network is 120.RIP version 1 is to run on this router and its RIP neighbor.The command no auto-summary has been used on the RIP neighborhood router.*RIP will advertise 2 networks to its neighbor.

34. If configuring RIPv2 top top an enterprise network, an engineer enters the command network right into router construction mode.

What is the an outcome of beginning this command?The user interface of the network is sending version 1 and version 2 updates.The interface of the network is receiving variation 1 and also version 2 updates.The interface of the network is sending only version 2 updates.*The interface of the network is sending out RIP hello messages.

35. Describe the exhibit. A network administrator has issued the exhibited commands in an effort to activate RIPng on user interface gig0/0. What is resulting in the console post that is presented after RIP is enabled?


Interface gig0/0 is shutdown.Interface gig0/0 go not have actually a precious IPv6 address.IPv6 unicast routing has actually not been enabled on this router.*IPv6 is not sustained on this IOS.

36. Describe the exhibit. OSPF is offered in the network. Which route will be liked by OSPF come send data packets from net A to network B?


R1, R2, R5, R7R1, R3, R5, R7*R1, R3, R6, R7R1, R4, R6, R7R1, R3, R5, R6, R7

37. I m sorry two occasions will cause the sending of a link-state packet through a link-state routing protocol? (Choose two.)

the router update timer expiringa attach to a neighbor router has end up being congesteda change in the topology *the initial startup that the routing protocol process*the requirement to periodically flood link-state packets to every neighbors

38. Which two demands are necessary prior to a router configured through a link-state routing protocol have the right to build and also send its link-state packets? (Choose two.)

The router has established the costs connected with its energetic links.*The router has developed its link-state database.The routing table has actually been refreshed.The router has created its adjacencies.*The router has constructed an SPF tree.

39. When does a link-state router send LSPs to its neighbors?

every 30 secondsimmediately after receiving one LSP from neighbors with updates*only once one that its interfaces goes increase or downonly as soon as one of its next-door neighbors requests one update

40. I m sorry routing protocol supplies link-state details to build a map the the topology for computing the finest path to each destination network?


41. A destination route in the routing table is indicated with a password D. Which kind of course entry is this?

a static routea route provided as the default gatewaya network directly associated to a router interfacea route dynamically learned v the EIGRP routing protocol*

42. Describe the exhibit. Which interface will be the departure interface to forward a data packet v the destination IP resolve



43. Which two demands are used to identify if a route deserve to be taken into consideration as one ultimate path in a router’s routing table? (Choose two.)

contain subnetsbe a default routecontain an leave interface*be a classful network entrycontain a next-hop IP address*

44. Which route is the best match because that a packet entering a router through a destination address of

S <1/0> via <1/0> via*S is directly connected, Ethernet 0/1S is straight connected, Ethernet 0/0

45. Which form of course will call for a router to carry out a recursive lookup?

an ultimate path that is using a following hop IP attend to on a router the is not utilizing CEF*a level 2 child route that is making use of an departure interface top top a router that is not utilizing CEFa level 1 network course that is using a following hop IP deal with on a router that is using CEFa parent course on a router the is using CEF

46. A router is configured to take part in many routing protocol: RIP, EIGRP, and OSPF. The router must send a packet come network Which course will be offered to forward the traffic?

a /26 path that is learned via RIP*a /24 route that is learned via EIGRPa /25 course that is learned via OSPFa /25 course that is learned via RIP

47. Fill in the blank. Carry out not abbreviate.

See more: Perfect Snake Skin Tip: Red Dead Redemption 2 Perfect Snake Skin

When configuring RIPng, the default-information originate command instructs the router come propagate a static default route.​

48. Enhance the functions of link-state routing protocols to their benefits and disadvantages. (Not all alternatives are used.)





49. Enhance the characteristic come the corresponding kind of routing. (Not all choices are used.)





50. Which 2 statements describe the OSPF routing protocol? (Choose two.)

automatically summarizes networks at the classful boundarieshas an bureaucratic distance that 100calculates that metric making use of bandwidth *uses Dijkstra’s algorithm to construct the SPF tree*used generally as an EGP

51. What two actions result from entering the network command in RIP configuration setting on a router? (Choose two.)

The network resolve is advertised to the neighborhood routers. *Routing to update are sent through every the interfaces belonging come*The routing table is created in the ram of the router.The RIP process is stopped and all existing RIP configurations room erased.The neighboring routers are sent a request for routing updates. *

52. I m sorry dynamic routing protocol was occurred as an exterior gateway protocol come interconnect different Internet providers?


53. In the paper definition of routing protocols, what is a definition for time to convergence?

the amount of time a network administrator needs to configure a routing protocol in a small- come medium-sized networkthe ability to carry data, video, and also voice over the very same mediaa measure up of protocol configuration complexitythe amount of time for the routing tables to achieve a constant state after a topology change*

54. A destination route in the routing table is indicated witha code D. Which type of course entry is this?

a revolution routea route supplied as the default gatewaya network directly connected to a router interfacea course dynamically learned through the EIGRP routing protocol*

55. Complement the router protocol come the corresponding category. (Not all options are used.)

Distance vectorRIOv2EIGRPLink stateOSPFIS-IS

56. Which course is the finest match because that a packet start a router v a destination resolve of

S is straight connected, Ethernet 0/1S <1/0> via*S <1/0> via is straight connected, Ethernet 0/0

57. What is different in between IPv6 routing table entries compared to IPv4 routing table entries?

By style IPv6 is classless therefore all courses are efficiently level 1 can be fried routes.*IPv6 does not use static courses to populate the routing table as supplied in IPv4.IPv6 routing tables encompass local route entries i beg your pardon IPv4 routing tables execute not.The choice of IPv6 courses is based upon the shortest equivalent prefix, unequal IPv4 route choice which is based upon the longest equivalent prefix.

58. Which path will a router usage to forward an IPv4 packet after evaluating its routing table for the best match v the destination address?

a level 1 kid routea level 1 parent routea level 2 supernet routea level 1 ultimate route*

Download PDF paper below: