Successor routes are the routes picked from the topology table as the best route to a remote network, so these are the routes that IP uses in the routing table to forward traffic to a remote destination. The topology table contains any route that is not as good as the successor route and is considered a feasible successor, or backup route. Remember that all routes are in the topology table, even successor routes.
2. Which of the following would be good reasons to run NAT?
You need to connect to the Internet and your hosts don't have globally unique IP addresses.
You change to a new ISP that requires you to renumber your network.
You don't want any hosts connecting to the Internet.
You require two intranets with duplicate addresses to merge.
The most popular use of NAT is if you want to connect to the Internet and you don't want hosts to have global (real) IP addresses, but option B and D are correct as well.
3. Which of the following are benefits of VLANs?
They increase the size of collision domains.
They allow logical grouping of users by function.
They can enhance network security.
They increase the size of broadcast domains while decreasing the number of collision domains.
They simplify switch administration.
They increase the number of broadcast domains while decreasing the size of the broadcast domains.
VLANs break up broadcast domains in a switched layer 2 network, which means smaller broadcast domains. They allow configuration by logical function instead of physical location and can create some security if configured correctly.
4. You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask?
A 240 mask is 4 subnet bits and provides 16 subnets, each with 14 hosts. We need more subnets, so let's add subnet bits. One more subnet bit would be a 248 mask. This provides 5 subnet bits (32 subnets) with 3 host bits (6 hosts per subnet). This is the best answer.
5. Which of the following are TCP/IP protocols used at the Application layer of the OSI model?
Telnet, File Transfer Protocol (FTP), and Trivial FTP (TFTP) are all Application layer protocols. IP is a Network layer protocol. Transmission Control Protocol (TCP) is a Transport layer protocol.
6. You connect a host to a switch port, but the new host cannot log into the server that is plugged into the same switch. What could the problem be?
Options
A. The router is not configured for the new host.
B. The VTP configuration on the switch is not updated for the new host.
C. The host has an invalid MAC address.
D. The switch port the host is connected to is not configured to the correct VLAN membership.
Correct Answer: In the routing table and the topology table
Explanation:
Successor routes are going to be in the routing table since they are the best path to a remote network. However, the topology table has a link to each and every network, so the best answer is topology table and routing table. Any secondary route to a remote network is considered a feasible successor, and those routes are only found in the topology table and used as backup routes in case of primary route failure.
9. What are reasons for creating OSPF in a hierarchical design?
To decrease routing overhead
To speed up convergence
To confine network instability to single areas of the network
OSPF is created in a hierarchical design, not a flat design like RIP. This decreases routing overhead, speeds up convergence, and confines network instability to a single area of the network.
10. Which of the following is the valid host range for the subnet on which the IP address 192.168.168.188 255.255.255.192 resides?
256 - 192 = 64. 64 + 64 = 128. 128 + 64 = 192. The subnet is 128, the broadcast address is 191, and the valid host range is the numbers in between, or 129-190.