Kamis, 25 November 2010

CCNA Discovery 3 Module 3

     1.
            1

Refer to the exhibit. What two statements can be concluded from the information that is shown in the exhibit? (Choose two.)
• All ports that are listed in the exhibit are access ports.
• ARP requests from Host1 will be forwarded to Host2.
• Attaching Host1 to port 3 will automatically allow communication between both hosts.
• The default gateway for each host must be changed to 192.168.3.250/28 to allow communication between both hosts.
• A router connected to the switch is needed to forward traffic between the hosts.

2.     
2
A router is configured to connect to a trunked uplink as shown in the exhibit. A packet is received on the FastEthernet 0/1 physical interface from VLAN 10. The packet destination address is 192.168.1.120. What will the router do with this packet?
• The router will forward the packet out interface FastEthernet 0/1.1 tagged for VLAN 10.
• The router will forward the packet out interface FastEthernet 0/1.2 tagged for VLAN 60.
• The router will forward the packet out interface FastEthernet 0/1.3 tagged for VLAN 60.
• The router will forward the packet out interface FastEthernet 0/1.3 tagged for VLAN 120.
• The router will not process the packet since the source and destination are on the same subnet.
• The router will drop the packet since no network that includes the source address is attached to the router.

3.      The information contained in a BPDU is used for which two purposes? (Choose two.)
• to prevent loops by sharing bridging tables between connected switches
• to set the duplex mode of a redundant link
• to determine the shortest path to the root bridge
• to determine which ports will forward frames as part of the spanning tree

• to activate looped paths throughout the network

4.      A router has two serial interfaces and two Fast Ethernet interfaces. This router must be connected to a WAN link and to a switch that supports four VLANs. How can this be accomplished in the most efficient and cost-effective manner to support inter-VLAN routing between the four VLANs?
• Connect a smaller router to the serial interface to handle the inter-VLAN traffic.
• Add two additional Fast Ethernet interfaces to the router to allow one VLAN per interface.
• Connect a trunked uplink from the switch to one Fast Ethernet interface on the router and create logical subinterfaces for each VLAN.
• Use serial-to-Fast Ethernet transceivers to connect two of the VLANs to the serial ports on the router. Support the other two VLANs directly to the available FastEthernet ports.

5.      When are MAC addresses removed from the CAM table?
• at regular 30 second intervals
• when a broadcast packet is received
• when the IP Address of a host is changed
• after they have been idle for a certain period of time

6.     
3

Refer to the exhibit. Switch1 is not participating in the VTP management process with the other switches. Which two are possible reasons for this? (Choose two.)
• Switch2 is in transparent mode.
• Switch1 is in client mode.
• Switch1 is using VTP version 1 and Switch2 is using VTP version 2.
• Switch2 is in server mode.
• Switch1 is in a different management domain.
• Switch1 has no VLANs.

7.      Which three must be used when a router interface is configured for VLAN trunking? (Choose three.)
• one subinterface per VLAN
• one physical interface for each subinterface
• one IP network or subnetwork for each subinterface
• one trunked link per VLAN
• a management domain for each subinterface
• a compatible trunking protocol encapsulation for each subinterface

8.     
4
 
Refer to the exhibit. The switches are connected with trunks within the same VTP management domain. Each switch is labeled with its VTP mode. A new VLAN is added to Switch3. This VLAN does not show up on the other switches. What is the reason for this?
• VLANs cannot be created on transparent mode switches.
• Server mode switches neither listen to nor forward VTP messages from transparent mode switches.
• VLANs created on transparent mode switches are not included in VTP advertisements.
• There are no ports assigned to the new VLAN on the other switches.
• Transparent mode switches do not forward VTP advertisements.

9.      Which two criteria are used by STP to select a root bridge? (Choose two.)
• memory size
• bridge priority
• switching speed
• number of ports
• base MAC address
• switch location

10.  Which three steps should be taken before moving a Catalyst switch to a new VTP management domain? (Choose three.)
• Reboot the switch.
• Reset the VTP counters to allow the switch to synchronize with the other switches in the domain.

• Download the VTP database from the VTP server in the new domain.
• Configure the VTP server in the domain to recognize the BID of the new switch.
• Select the correct VTP mode and version.
• Configure the switch with the name of the new management domain.

11.  Which two items will prevent broadcasts from being sent throughout the network? (Choose two.)
• bridges
• routers
• switches
• VLANs
• hubs

12.  Which two characteristics describe a port in the STP blocking state? (Choose two.)
• provides port security
• displays a steady green light
• learns MAC addresses as BPDUs are processed
• discards data frames received from the attached segment
• receives BPDUs and directs them to the system module

13.  What is the first step in the process of convergence in a spanning tree topology?
• election of the root bridge
• determination of the designated port for each segment
• blocking of the non-designated ports
• selection of the designated trunk port
• activation of the root port for each segment

14.  In which STP state does a switch port transmit user data and learn MAC addresses?
• blocking
• learning
• disabling
• listening
• forwarding
15.  What is the purpose of VTP?
• maintaining consistency in VLAN configuration across the network
• routing frames from one VLAN to another
• routing the frames along the best path between switches
• tagging user data frames with VLAN membership information
• distributing BPDUs to maintain loop-free switched paths

16.  Which statement best describes adaptive cut-through switching?
• The switch initially forwards all traffic using cut-through switching and then changes to store-and-forward switching if errors exceed a threshold value.
• The switch initially forwards all traffic using cut-through switching and then changes to fast-forward switching if errors exceed a threshold value.

• The switch initially forwards all traffic using cut-through switching and then temporarily disables the port if errors exceed a threshold value.
• The switch initially forwards all traffic using store-and-forward switching and then changes to cut-through switching if errors exceed a threshold value.

17.  Using STP, how long does it take for a switch port to go from the blocking state to the forwarding state?
• 2 seconds
• 15 seconds
• 20 seconds
• 50 seconds
18.   
5
Refer to the exhibit. The switches are interconnected by trunked links and are configured for VTP as shown. A new VLAN is added to Switch1. Which three actions will occur? (Choose three.)
• Switch1 will not add the VLAN to its database and will pass the update to Switch 2.
• Switch2 will add the VLAN to its database and pass the update to Switch3.
• Switch3 will pass the VTP update to Switch4.

• Switch3 will add the VLAN to its database.
• Switch4 will add the VLAN to its database.
• Switch4 will not receive the update.

19.  Which Catalyst feature causes a switch port to enter the spanning-tree forwarding state immediately?
• backbonefast
• uplinkfast
• portfast
• rapid spanning tree

20.   
6
Refer to the exhibit. Which set of commands would be used on the router to provide communication between the two hosts connected to the switch?
• Router(config)# interface vlan 2
Router(config-if)# ip address 192.168.2.1 255.255.255.0
Router(config-if)# no shutdown
Router(config)# interface vlan 3
Router(config-if)# ip address 192.168.3.1 255.255.255.0
Router(config-if)# no shutdown
• Router(config)# interface fastethernet 0/0
Router(config-if)# no shutdown
Router(config-if)# interface fastethernet 0/0.2
Router(config-subif)# encapsulation dot1q 2
Router(config-subif)# ip address 192.168.2.1 255.255.255.0
Router(config-if)# interface fastethernet 0/0.3
Router(config-subif)# encapsulation dot1q 3
Router(config-subif)# ip address 192.168.3.1 255.255.255.0
• Router(config)# interface vlan 2
Router(config-if)# switchport mode trunk dot1q
Router(config)# interface vlan 3
Router(config-if)# switchport mode trunk dot1q
• Router(config)# interface fastethernet 0/0
Router(config-if)# mode trunk dot1q 2 3
Router(config-if)# ip address 192.168.2.1 255.255.255.0v

CCNA2 Chapter 8

Lab 8.1.3 Security local data and transmitted data
Part 1
Step 1: secure bobs files folder
Step 2: test joes access to bobs files
Part 2
Step 1: identify a secure web page
Step 2: examine secure access to an untrusted source warming

Lab 8.2.1 planning for access lists and port filters
Step 1: Restrict Client A to one subnet
You are asked to restrict client A to only the subnet to which it is currently attached. Client A needs to be able to access server A. but it does not need to accsess the internet or server B. where would you place the access list?
Router
Interface
Allow or Deny?
Input or output filter?
Why?
Router 2
0/0 dan 0/1
deny
input
Karena hanya untuk mengekses server yang berada di internal jaringan dan tidak bisa untuk eksternal jaringan atau jaringan luar
Step 2: Restrict client A access to server A but allow access to server B the internet
You are asked to restrict client B from accessing server B needs internet access and access to server B. where would you place the access list?
Router
Interface
Allow or Derry?
Input or output filter?
Why?
Router 1 dan 3
0/0 dan 0/1
allow
output
Karena diizinkan untu mengakses jaringan internal dan eksternal

Step 3: Allow only client A to access the routers using only SSH
You have been asked to secure access to the routers for only client A. which will be the management PC for those routers. You want to limit access to only SSH from Client A and prevent telnet access. Where would you place the access list?
Router
Interface
Input or output filter?
Port
Allow or Deny?
Why?
Router 1
0/0 dan 0/1
input
0
deny
Jaringan internal
Router 2
0/0 dan 0/1
output
0
allow
Jaringan eksternal
Router3
0/0 dan 0/1
output
0
allow
Jaringan eksternal

Lab 8.2.5 Researching an Anti-X Software Product
Step 1: identify three products
Company
Product
smadav
Smadav
morphic
Morposh
Avira
Avira

Step 2: Compare pricing
Company
Product
Price
microsoft
Windows
Rp.1.500.000

Linux
free
aple
machintosh
Rp.5.000.000

Lab 8.3.1 Interpreting a service level agreement
Step 1: review typical customer needs
Step 2: Analyze a sample SLA and identify key components
a.       Read over the sample SLA that follows and answer these questions regarding content, ISP responsibilities, and customer requirements.
b.      According to this agreement, can the ISP be held liable for damage to equipment owned by the customer [Client] or data loss that occurs due to accidental actions by ISP vendor staff or other persons? bisa
c.       What are some examples of One Time Services included in the SLA? E-mail service, electronic interchange, online accounting, secure remote workerr support, remote indtrumentation and control system, and backup and recovery service.
d.      What are some examples of On going Services included in the SLA? E-mail service, online acounting
e.       When will regular downtime maintenance be scheduled and how many business days notice must the ISP give of any scheduled downtime? Banyak jam dalam satu hari dan banyak hari dalam senulan.What does the ISP’s network monitoring system do when an error condition is detected? What is the stated availability of the Systems Administrators in the event of a system failure? What is “usage monitoring” and how does the ISP provide this service? Dengan memantau kerja sistem
f.        Regarding problem severity and ISP response time, what is the difference in response between “Level 1 – normal business hours” and “Level 3 – normal business hours”? pada level satu baru mendeteksi problem dan pada level 3 sudah ada pengontrolan
g.      On what factors are the penalties for service outages based?  Provides an estimate for the cost to the customer for a service outage for each of the services the customer wants covered by an SLA.

Lab 8.3.2 conducting a Network capture with wireshark
Step 1: install and launch Wireshark
Step 2: select an interface to  use for capturing pakets
Step 3 : Analysyze web trafict information (optional)
a.       The conection to the google server with a query to the DNS server to lookup the server IP address. The destination server IP address will most likely start with 64.x.x.x what is the source and destination of the first packet sent to the google server?
Source: 192.168.1.103
Destination: 65.24.7.3
b.      Open another browser window and go to the ARIN who is database http://www.arin .net/whois/ or use another whois lookup tool and enter thr IP address of the destination server. To what organization is this IP address assigned? 192.168.1.103
c.       What are the protocols is used to establish the connection to the web server and deliver the web page to your local host? TCP
d.      What is the color used to establish the connection to the server and deliver the web page to your local host? hijau
e.       What is the color used to highlight the traffic between your host and the google web server? gray
Step 5: filter a network capture
a.       Open a command prompt window by clicking start > all programs > run and typing cmd.
b.      Ping a host IP address on your local network and observer? ICMP
c.       When icmp is typed in the filter text box what kind of raffic is was displayed? Ketika kita menge-ping host IP address yang ada di jaringan local kita
d.      Click the filter: Expression button on the wireshark eindow. Scroll down the list and view the filter possibilities there. Are TCP, HTTP,ARP and other protocols listed? Ya ada
Step 6:reflection
a.       There are hundreads of filters listed in the filter: expression option. It may be possible that, in a large network , there would be enormounts and many different types of traffic. Which three filters in the long list do you think might be most useful to a network administrator
b.      Is wreshark a tool for out of band or in band network monitoring
Explain your answare

Lab 8.4.2 planning a backup solution
step 1: choose the media and backup hardware
Equipment / media
price
quality
USB and solid-state drives
$30-$90
medium
fireWire drives
$180
best
CD-RW and DVD+RW/-RW drives
$100
medium

Step 2: design a backup plan and procedure
a.       Describe the equipment recommended and explain why you selected this equipment
Saya memilih media di atas Karena saya melihat dari segi kapasitas dan segi ekonomis
b.      Describe location of the equipment in the network and the network link speeds to the equipment
c.       Describe the backup media to be used and also explain why you selected this media
d.      Describe the backup schedule
e.       Describe the backup and restore procedure, including what kind of backup (Normal, differential, incremental), how it will be tested what kind of maintenance the equipment requires. How tapes will be labeled and where tapes that have been backed up will be stored. When backups need to be restored, what is the procedure for a file a folder a driver (use extra sheets it necessary)

Kamis, 18 November 2010

CCNA Discovery 2 Module 8 Exam Answers Version 4.0

  1. Which AAA service reduces IT operating costs by providing detailed reporting and monitoring of network user behavior, and also by keeping a record of every access connection and device configuration change across the network?
    • authentication
    • accreditation
    • accounting
    • authorization
  2. Which three items are normally included when a log message is generated by a syslog client and forwarded to a syslog server? (Choose three.)
    • date and time of message
    • ID of sending device
    • length of message
    • message ID
    • checksum field
    • community ID
  3. What is the advantage of using WPA to secure a wireless network?
    • It uses a 128-bit pre-shared hexadecimal key to prevent unauthorized wireless access.
    • It uses an advanced encryption key that is never transmitted between host and access point.
    • It is supported on older wireless hardware, thus providing maximum compatibility with enterprise equipment.
    • It requires the MAC address of a network device that is requesting wireless access to be on a list of approved MAC addresses.
  4. A company wants to configure a firewall to monitor all channels of communication and allow only traffic that is part of a known connection. Which firewall configuration should be deployed?
    • packet filtering
    • proxy
    • stateful packet inspection
    • stateless packet inspection
  5. A server log includes this entry: User student accessed host server ABC using Telnet yesterday for 10 minutes. What type of log entry is this?
    • authentication
    • authorization
    • accounting
    • accessing
  6. What two measures help to verify that server backups have been reliably completed? (Choose two.)
    • reviewing backup logs
    • performing trial backups
    • performing full backups only
    • replacing tape backup with hard disk-based backup
    • using an autoloader when backups require more than one tape
  7. Which means of communication does an SNMP network agent use to provide a network management station with important but unsolicited information?
    • query
    • broadcast
    • ICMP ping
    • trap
    • poll
  8. Which three protocols are used for in-band management? (Choose three.)
    • FTP
    • HTTP
    • SNMP
    • Telnet
    • TFTP
    • DHCP
  9. A hacker has gained access to sensitive network files. In analyzing the attack, it is found that the hacker gained access over a wireless segment of the network. It is further discovered that the only security measure in place on the wireless network is MAC Address Filtering. How is it likely that the hacker gained access to the network?
    • The hacker used a software tool to crack the shared hexadecimal wireless key.
    • The hacker obtained the MAC address of a permitted host, and cloned it on his wireless laptop NIC.
    • The attacker mounted a denial of service attack to overwhelm the firewall before penetrating the wireless LAN.
    • The hacker gained wireless access to the MAC address database and added his own MAC address to the list of permitted addresses.
10.   A network administrator is assigning network permissions to new groups of users and employing the principle of least privilege. Which two actions should the administrator take? (Choose two.)
• Provide users with only the access to resources required to do their jobs.
• Provide the minimum level of permissions required for users to do their jobs.
• Remove all permissions from the users and grant permissions as they are requested.
• Allow users to decide how much permission they need to accomplish their job tasks.
• Provide full access to the users and gradually remove privileges over time.
11.   Which three protocols describe methods that can be used to secure user data for transmission across the internet? (Choose three.)
• SMTP
• IPSEC
• SSL
• HTTPS
• FTP
• TFTP
12.  Which benefit does SSH offer over Telnet when remotely managing a router?
• encryption
• TCP usage
• authorization
• connection using six VTY lines
13.   Which of the following does SNMP use to hold information collected about the network?
• network management station
• network management database
• management information base
• database information agent
14.  What are two potential problems with using tape media to back up server data? (Choose two.)
• Tape is not a cost-effective means of backing up data.
• Data tapes are difficult to store offsite.
• Data tapes are prone to failure and must be replaced often.
• Tape drives require regular cleaning to maintain reliability.
• Backup logs are not available with tape backup solutions.
15.  What is the term for the public network between the boundary router and the firewall?
• “clean” LAN
• intranet
• DMZ
• extranet
16.  Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)
• applications
• physical addresses
• packet size
• ports
• protocols
17.  When is the use of out-of-band network management necessary?
• when a server needs to be monitored across the network
• when the management interface of a device is not reachable across the network
• when enhanced monitoring features are required to gain an overall view of the entire network
• when it is desirable to use the information that is provided by SNMP
18.  What network layer security protocol can secure any application layer protocol used for communication?
• HTTPS
• IMAP
• FTPS
• IPSEC
• TLS
19.  Before a technician upgrades a server, it is necessary to back up all data. Which type of backup is necessary to ensure that all data is backed up?
• daily
• differential
• full
• incremental
• partial
20.  What AAA component assigns varying levels of rights to users of network resources?
• auditing
• accounting
• authorization
• access control
• authentication
• acknowledgement

CCNA Discovery 2 Module 7 Exam Answers Version 4.0

1. Which two statements are true about the OSI and TCP/IP models? (Choose two.)
• The two bottom layers of the TCP/IP model make up the bottom layer of the OSI model.
• The TCP/IP model is a theoretical model and the OSI model is based on actual protocols.
• The OSI network layer is comparable to the Internet layer of the TCP/IP model.
• The TCP/IP model specifies protocols for the physical network interconnection.
• The TCP/IP model is based on four layers and the OSI model is based on seven layers.
2. To meet customer expectations, an ISP must guarantee a level of service that is based on what two factors? (Choose two.)
• accessibility
• adaptability
• availability
• reliability
• scalability
3. User1 is sending an e-mail to User2@cisco.com. What are two characteristics of the process of sending this data? (Choose two.)
• It utilizes TCP port 110.
• A TCP connection is established directly between the User1 and User2 client computers in order to send the e-mail message.
• It utilizes a store and forward process.
• The same application layer protocol is used to send the e-mail and retrieve it from the destination server.
• SMTP is used to send the e-mail message to the mail servers.
4. Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?
• Host1 sends an ACK message to Host2.
• Host1 sends a SYN message to Host2.
• Host1 sends a SYN-ACK message to Host2.
• Host2 sends an ACK message to Host1.
• Host2 sends a SYN message to Host1.
• Host2 sends a SYN-ACK message to Host1.
5. What are three characteristics of network reliability? (Choose three.)
• Redundant hardware provides enhanced reliability.
• Reliability is measured as a percent.
• Reliability is the responsibility of the ISP customers.
• Fault tolerance is a measure of reliability.
• The longer the MTBF, the greater the reliability.
6. Which two statements describe the FTP protocol? (Choose two.)
• It uses well-known port 23.
• The protocol interpreter is responsible for the data transfer function.
• In passive data connections, the FTP client initiates the transfer of data.
• It requires two connections between client and server.
• FTP servers open a well-known port on the client machine.
7. What is the function of the TCP three-way handshake?
• It enables the synchronization of port numbers between source and destination hosts.
• It immediately triggers the retransmission of lost data.
• It synchronizes both ends of a connection by allowing both sides to agree upon initial sequence numbers.
• It identifies the destination application on the receiving host.
8. What are three characteristics of HTTPS? (Choose three.)
• It uses a different client request-server response process than HTTP uses.
• It specifies additional rules for passing data between the application and data link layers.
• It supports authentication.
• It allows more simultaneous connections than HTTP allows.
• It encrypts packets with SSL.
• It requires additional server processing time.
9. Which DNS zone resolves an IP address to a qualified domain name?
• dynamic lookup
• forward lookup
• resolution lookup
• reverse lookup
10.

What type of update allows client computers to register and update their resource records with a DNS server whenever changes occur?
• dynamic
• zone transfer
• local recursive query
• root domain query
• top-level domain query
11. Refer to the exhibit. Which two statements are true about this file? (Choose two.)
• If the gateway address changes, the file will be updated dynamically.
• The command ping fileserv will use IP address 172.16.5.10.
• If the ping www.cisco.com command is issued, the file will be checked for the Cisco web server IP address before DNS is queried.
• The file must be created by the user if it is to be used by a workstation.
• Name to IP address mappings are added to the file after they are received from DNS.
12. Which two tasks are the responsibility of the local DNS server? (Choose two.)
• maintaining a large number of cached DNS entries
• maintaining the ISP server
• mapping name-to-IP addresses for internal hosts
• forwarding name resolution requests to a caching-only server
• forwarding all name resolution requests to root servers on the Internet
13. What are three unique characteristics of UDP? (Choose three.)
• connection oriented
• full-duplex operation
• low overhead
• no flow control
• no error-recovery function
• reliable transmission
14. A manufacturing company is looking into subscribing to services from a new ISP. The company requires hosted world wide web, file transfer, and e-mail services. Which three protocols represent the key application services that are required by the company? (Choose three.)
• FTP
• HTTP
• ICMP
• PPP
• Telnet
• SMTP
15. Which two options correctly match protocol and well-known port number? (Choose two.)
• DNS – 25
• FTP – 110
• HTTP – 80
• POP3 – 25
• SMTP – 25
16. Within TCP, what combination makes up a socket pair?
• source port with destination port
• source IP address with destination port
• source IP address and destination IP address
• source IP address and port with a destination IP address and port
17. Which protocol is used to send e-mail, either from a client to a server or from a server to another server?
• SNMP
• FTP
• SMTP
• HTTPS
18. Refer to the exhibit. The PC is requesting HTTP data from the server. What is a valid representation of source and destination sockets for this request?
• Source – 192.168.1.17:80 ; Destination – 192.168.2.39:80
• Source – 192.168.1.17:80 ; Destination – 192.168.2.39:1045
• Source – 192.168.1.17:1045 ; Destination – 192.168.2.39:80
• Source – 192.168.1.17:1045 ; Destination – 192.168.2.39:1061
19. What type of DNS server is typically maintained by an ISP?
• caching-only
• root
• second-level
• top-level
20. A client is communicating with a server on a different segment of the network. How does the server determine what service is being requested by the client?
• The server will apply the default service configured in directory services.
• The server will use ARP to discover the appropriate service from the local router.
• The server will send a request to the client asking for the appropriate service.
• The server will determine the appropriate service from the destination port field.
21.

When a host is communicating with multiple applications on the same server at the same time, which of the following will have the same value for each session? (Choose two.)
• IP address
• MAC address
• session number
• sequence number

Kamis, 11 November 2010

CCNA Discovery 2 Module 5 Exam Answers Version 4.0

1. vIn what two ways does SDM differ from the IOS CLI? (Choose two.)
    • SDM is used for in-band management only. The IOS CLI can be used for in-band and out-of-band
       management.
    • SDM utilizes GUI buttons and text boxes. The IOS CLI requires the use of text-based commands.

2. Which mode will a configured router display at login?
    • user EXEC mode

3. Refer to the exhibit. Which password or passwords will be encrypted as a result of the configuration that is shown?
   • all configured passwords

4.  Refer to the exhibit. Which three sets of commands are required to enable administrators to connect to the Switch1 console over Telnet for configuration and management? (Choose three.)
• Switch1(config)# interface fa0/1
Switch1(config-if)# ip address 192.168.2.64 255.255.255.192
• Switch1(config)# interface fa0/1
Switch1(config-if)# ip address 192.168.2.66 255.255.255.192
• Switch1(config)# interface vlan 1
Switch1(config-if)# ip address 192.168.2.126 255.255.255.192
Switch1(config-if)# no shutdown

5. How does the SYST LED on the catalyst 2960 switch indicate a POST failure?
• blinks rapidly amber

6. Refer to the exhibit. A company always uses the last valid IP address in a subnetwork as the IP address of the router LAN interface. A network administrator is using a laptop to configure switch X with a default gateway. Assuming that the switch IP address is 192.168.5.147/24, what command will the administrator use to assign a default gateway to the switch?
• X(config)# ip default-gateway 192.168.5.254

7. A technician has made changes to the configuration of a router. What command will allow the technician to view the current configuration before he saves the changes?
• router# show running-config

8. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)
• VTY interface
• console interface
• privileged EXEC mode

9. To save time, IOS commands may be partially entered and then completed by typing which key or key combination?
• Tab

10. What is the correct command sequence to configure a router host name to 'LAB_A'?
• Router> enable
Router# configure terminal
Router(config)# hostname LAB_A

11. Refer to the exhibit. From the router console, an administrator is unable to ping a Catalyst switch that is located in another building. What can the administrator do from her location to check the IP configuration of the attached switch?
• Use the show cdp neighbors detail command from the router console.

12. Which two options must be selected in SDM Express to enable a router serial interface to obtain an IP address automatically? (Choose two.)
• Easy IP (IP negotiated)
• PPP encapsulation

13. What three settings can be made in the SDM Express basic configuration screen? (Choose three.)
• host name
• domain name
• enable secret password

14. Which tasks can be accomplished by using the command history feature? (Choose two.)
• Set the command history buffer size.
• Recall previously entered commands.

15. What option within Cisco SDM Express must be configured to allow hosts that receive IP address settings from the router to resolve names on the network or Internet?
• host name
• DNS server IP address

16. Which three encapsulation types can be set on a serial interface by an administrator who is using SDM Express? (Choose three.)
• Frame Relay
• HDLC
• PPP

17. Which command will display routing table information about all known networks and subnetworks?
• Router# show ip route

18. A network administrator needs to configure a router. Which of the following connection methods requires network functionality to be accessible?
• Telnet

19. Which three pieces of information about a neighbor device can be obtained by the show cdp neighbors command? (Choose three.)
• platform
• connected interface of neighbor device
• device ID

20. Which function is a unique responsibility of the DCE devices shown in the exhibit?
• clocking for the synchronous link

21. Which of the following are functions of NVRAM? (Choose two.)
• retains contents when power is removed
• stores the startup configuration file

22. Refer to the exhibit. Which series of commands will enable users who are attached to Router1 to access the remote server?
• Router1(config)# interface S0/0/0
Router1(config-if)# ip address 64.100.0.129 255.255.255.252
Router1(config-if)# no shutdown

23. A network technician is attempting to add an older workstation to a Cisco switched LAN. The technician has manually configured the workstation to full-duplex mode in order to enhance the network performance of the workstation. However, when the device is attached to the network, performance degrades and excess collision are detected. What is the cause of this problem?
• There is a duplex mismatch between the workstation and switch port.

24. Which of the following statements are true regarding the user EXEC mode? (Choose two.)
• Global configuration mode can be accessed by entering the enable command.
• Only some aspects of the router configuration can be viewed.

25. Which command turns on a router interface?
• Router(config-if)# no shutdown

CCNA Discovery 2 Module 4 Exam Answers Version 4.0

CCNA Discovery 2 Module 4 Exam Answers Version 4.0

1. In an 8 bit binary number, what is the total number of combinations of the eight bits?
     • 256

2. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.
    • 11100111

3. How many usable hosts are available given a Class C IP address with the default subnet mask?
   • 254

4. Which statement describes NAT overload or PAT?
    • Many internal addresses can be translated to a single IP address using different port assignments.

5. Which IPv4 class of addresses provides the most networks?
     • Class C

6. Which statement accurately describes public IP addresses?
    • Public IP addresses must be unique across the entire Internet.

7. Which two statements describe classful IP addresses? (Choose two.)
     • The number of bits used to identify the hosts is fixed by the class of the network.
     • Up to 24 bits can be used to identify unique networks.

8. Company XYZ uses a network address of 192.168.4.0. It uses the mask of 255.255.255.224 to create subnets. What is the maximum number of usable hosts in each subnet?
   • 30

9. hat is the network broadcast address for a Class C address of 192.168.32.0 with the default subnet mask?
   • 192.168.32.255

10. Refer to the exhibit. Host A is connected to the LAN, but it cannot get access to any resources on the Internet. The configuration of the host is shown in the exhibit. What could be the cause of the problem?
    • The default gateway is on a different subnet from the host.

11. IPv6 increases the IP address size from 32 bits to how many bits?
      • 128

12. What is the range of the first octet in a Class B address?
      • 128 to 191

13. Which IPv4 class provides the highest number of host addresses per network?
     • Class A

14. refer to the exhibit. Which range of IP addresses would allow hosts that are connected to the Router1 Fa0/0 interface to access outside networks?
    • 192.168.1.66 through 192.168.1.94

15. Which option shows the proper notation for an IPv6 address?
      • 2001:0db8:3c55:0015::abcd:ff13

16. What are two reasons that NAT was developed? (Choose two.)
     • to provide a method for privately addressed LANs to participate in the Internet
     • to allow private addresses to be routed on the public Internet

17. What must happen for a privately addressed host on an inside local network to be able to communicate with an outside destination host on the Internet?
    • The host IP address must be translated to an inside global address.

18. Which port numbers are used by PAT to create unique global addresses?
    • 1025 and above

19. Static NAT works by mapping a specific inside local IP address to what other specific address type?
   • inside global

20. What are three advantages of NAT implementations? (Choose three.)
      • improved security
      • improved scalability
      • sharing few public IP addresses with many hosts

CCNA 2 labskill chapter 1 lab 1,2,dan3

Lab 1.2.3 Mapping ISP Connectivity Using Traceroute

Objectives
·                     Run the Windows tracert utility from a local host computer to a website on a different continent.
·                     Interpret the traceroute output to determine which ISPs the packets passed through on their way from the local host to the destination website. 
·                     Draw a diagram of the traceroute path, showing the routers and ISP clouds passed through from the local host to the destination website, including IP addresses for each device.
Background / Preparation 
In this activity, you will use the Windows tracert utility to map Internet connectivity between your local ISP and the other ISPs that it uses to provide global Internet access. You will also map connectivity to the following major Regional Internet Registries (RIRs). However, your instructor may choose different destination websites. 
·         AfriNIC (African Network Information Centre) – Africa Region
·         APNIC (Asia Pacific Network Information Centre) – Asia/Pacific Region
·         ARIN (American Registry for Internet Numbers) – North America Region
·         LACNIC (Regional Latin-American and Caribbean IP Address Registry) – Latin America and some Caribbean Islands
·         RIPE NCC (Réseaux IP Européens) – Europe, the Middle East, and Central Asia
This activity can be done individually, in pairs, or in teams. It can be done as an in-class activity or as a homework assignment, depending on whether the classroom computers have access to the Internet.  The following resources are required:
·                     Host computer with the Windows operating system
·                     Access to the command prompt
·                     Internet connection
·                     Routes Traced worksheet for each destination URL. The worksheet is attached to this lab. Each student completes their own worksheets and gives them to the instructor.
·                     Global Connectivity Map, which is attached at the end of this lab
·                      Access to the PC command prompt
Step 1: Run the tracert utility from a host computer
a.         Verify that the host computer has a connection to the Internet.
b.        Open a Command Prompt window by clicking Start > Run and typing cmd. Alternatively, you may click Start > All programs > Accessories > Command Prompt.
c.         At the prompt, type tracert and your first destination website. The output should look similar to the following:
d.   Save the tracert output in a text file as follows:
1)      Right-click the title bar of the Command Prompt window and choose Edit > Select All.
2)      Right-click the title bar of the Command Prompt window again and choose Edit > Copy.
3)      Open the Windows Notepad program: Start > All Programs > Accessories > Notepad.
4)      To paste the output into Notepad, choose Edit > Paste.
5)      Choose File > Save As and save the Notepad file to your desktop as tracert1.txt.
e.    Run tracert for each destination website and save the output in sequentially numbered files.
f.     Run tracert from a different computer network, for example, from the public library or from a friend’s computer that accesses the Internet using a different ISP (for instance, cable instead of DSL). Save a copy of that output in Notepad and print it out for later reference.
Step 2: Interpret tracert outputs to determine ISP connectivity
Routes traced may go through many hops and a number of different ISPs depending on the size of your ISP and the location of the source and destination hosts. In the example output shown below, the tracert packets travel from the source PC to the local router default gateway to the ISPs Point of Presence (POP) router and then to an Internet Exchange Point (IXP). From there they pass through two Tier 2 ISP routers and then though several Tier 1 ISP routers as they move across the Internet backbone. When they leave the Tier 1 ISPs backbone, they move through another Tier 2 ISP on the way to the destination server at
www.ripe.net.


a. Open the first traceroute output file and answer the following questions. 
1)      What is the IP address of your local POP router? 
:: Ip address dari local POP Router adalah 192.168.190.6
2)      How many hops did the traceroute packet take on its journey from the host computer to the destination?
:: pengambilan paket data selama proses pada tracert ada sebanyak 16 kali
3)      How many different ISPs did the traceroute packet pass through on its journey from the host computer to the destination?
:: jumlah tracert melewati isp yang berbeda untuk sampai ketujuan ada sebanyak 5 kali adapun alamat alamat tujuan
Ø  if-1-0-0-1980.mcore3.laa-losangeles.as6453.net [66.110.59.18]
Ø  ix-10-0-0-0.tcore1.lvw-losangeles.as6453.net [216.6.84.49]
Ø  if-10-0.core3.nto-newyork.as6453.net [216.6.57.66]
Ø  if-7-0-0.core2.ad1-amsterdam.as6453.net [80.231.81.45]
Ø  if-4-0.mcore3.njy-newark.as6453.net [216.6.84.2]
4)      List the IP addresses and URLs of all the devices in the traceroute output in the order that they appear on the Routes Traced worksheet. 
5)      In the Network Owner column of the worksheet, identify which ISP owns each router. If the router belongs to your LAN, write “LAN”. The last two parts of the URL indicates the ISP name. For example, a router that has “sprint.net” in its URL belongs to the network of an ISP called Sprint. 
6)      Did the traceroute pass through an unidentified router between two ISPs? This might be an IXP. Run the whois command utility or whois function of a visual traceroute program to identify ownership of that router. Alternatively, go to http://www.arin.net/whois to determine to whom the IP is assigned. 

a.         Complete the worksheet using the traceroute output file for each of the other destination URLs.
b.        Compare your results from the different traceroute output files. Did your ISP connect to different ISPs to reach different destinations?
:: ya, pada kasus melakukan tracert ke http://whois.arin.net/ui isp nya masing masing protocol yang berbeda salaing terkoneksi untuk mencapai tujuan yaitu hit-nxdomain.opends.com [67.215.65.132]
Dan ISP yang berbeda untuk saling terkoneksi adalah
1.                       xe-1-0-0.r21.newthk02.hk.bb.gin.ntt.net [129.250.3.206]
2.                       p64-4-1-1.r21.tokyjp01.jp.bb.gin.ntt.net [129.250.3.1]
3.                       as-0.r21.Isanca03.us.bb.gin.ntt.net [192.250.6.4]

c.    If you ran a traceroute from a different computer network, check the output for that traceroute file as well. Was the number of hops different to reach the same destination from different local ISPs? Which ISP was able to reach the destination in fewer hops?
:: jumlah HOP untuk mencapai destination pada sebuah alamat tracert yang dituju akan tetap sama. Meskipun telah dilakukan beberapa kali test tracert akan memunculkan jumlah list hop yang sama. Maka ISP yang membutuhkan sedikit hop untuk mencapai tujuannya adalah ISP B (cable service provider)
Step 3: Map the connectivity of your ISP
a.    For each traceroute output, draw a diagram on a separate sheet of paper showing how your local ISP interconnects with other ISPs to reach the destination URL, as follows: 
1)      Show all of the devices in sequence from the LAN router to the destination website server. Label all of the devices with their IP addresses.
2)      Draw a box around the local POP router that you identified, and label the box “POP”. 
3)      Draw an ISP cloud around all the routers that belong to each ISP, and label the cloud with the ISP name.
4)      Draw a box around any IXP routers that you identified, and label the box “IXP”. 
b.    Use the Global Connectivity Map to create a combined drawing showing only ISP clouds and IXP boxes. 
Worksheet for Routes Traced
Destination URL: www.ripe.net [193.0.6.139]          Total Number of Hops: 16
Router IP Address 
Router URL 
(if any)

Network Owner
(LAN, Name of ISP or IXP)

192.168.190.6

ns4.unp.ac.id
192.168.37.9
58.26.87.109
tm.net.my
66.110.59.18

losangeles.as6453.net
216.6.84.49

losangeles.as6453.net
216.6.84.2

njy-newark.as6453.net
216.6.57.66

nto-newyork.as6453.net
80.231.81.45

ad1-amsterdam.as6453.net
80.231.81.18

ad1-amsterdam.as6453.net
195.219.150.70

ad1-amsterdam.as6453.net
195.69.144.68

gw.amsix.nikrtr.ripe.net
193.0.6.139

www.ripe.net