The administrative distance (AD) is a very important parameter in a routing protocol. The lower the AD, the more trusted the route. If you have IGRP and OSPF running, by default IGRP routes would be placed in the routing table because IGRP has a lower AD of 100. OSPF has an AD of 110. RIPv1 and RIPv2 both have an AD of 120, and EIGRP is the lowest, at 90.
4. If your router is facilitating a CSU/DSU, which of the following commands do you need to use to provide the router with a 64000bps serial link?
Successor routes are the routes picked from the topology table as the best route to a remote network, so these are the routes that IP uses in the routing table to forward traffic to a remote destination. The topology table contains any route that is not as good as the successor route and is considered a feasible successor, or backup route. Remember that all routes are in the topology table, even successor routes.
6. Which of the following would be good reasons to run NAT?
You need to connect to the Internet and your hosts don't have globally unique IP addresses.
You change to a new ISP that requires you to renumber your network.
You don't want any hosts connecting to the Internet.
You require two intranets with duplicate addresses to merge.
The most popular use of NAT is if you want to connect to the Internet and you don't want hosts to have global (real) IP addresses, but option B and D are correct as well.
7. Which of the following are benefits of VLANs?
They increase the size of collision domains.
They allow logical grouping of users by function.
They can enhance network security.
They increase the size of broadcast domains while decreasing the number of collision domains.
They simplify switch administration.
They increase the number of broadcast domains while decreasing the size of the broadcast domains.
VLANs break up broadcast domains in a switched layer 2 network, which means smaller broadcast domains. They allow configuration by logical function instead of physical location and can create some security if configured correctly.
8. You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask?
A 240 mask is 4 subnet bits and provides 16 subnets, each with 14 hosts. We need more subnets, so let's add subnet bits. One more subnet bit would be a 248 mask. This provides 5 subnet bits (32 subnets) with 3 host bits (6 hosts per subnet). This is the best answer.
9. Which of the following are TCP/IP protocols used at the Application layer of the OSI model?
Telnet, File Transfer Protocol (FTP), and Trivial FTP (TFTP) are all Application layer protocols. IP is a Network layer protocol. Transmission Control Protocol (TCP) is a Transport layer protocol.
10. You connect a host to a switch port, but the new host cannot log into the server that is plugged into the same switch. What could the problem be?
Options
A. The router is not configured for the new host.
B. The VTP configuration on the switch is not updated for the new host.
C. The host has an invalid MAC address.
D. The switch port the host is connected to is not configured to the correct VLAN membership.