Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Routers R1 through R4 are running an IGP in such a way that they have each other’s system IP addresses in their routing tables. A static route is configured on router R1 so that it can reach subnetwork 10.4.100.0/24. The network administrator decides to use an indirect static route, as shown in the diagram. However, pinging the server from router R1 fails. What may be the problem in this case?

A.

Router R1 drops the echo request because address 10.10.10.3 does not belong to an adjacent router.

B.

Router R2 drops the echo request because it does not have subnet 10.4.100.0/24 in its routing table.

C.

Router R3 drops the echo request because it does not have subnet 10.4.100.0/24 in its routing table.

D.

The echo request arrives at the server but there is no path for the echo response to return to router R1.

Full Access
Question # 5

Consider the exhibit.

All routers are running IS-IS with IPv6 support enabled. Based on the topology shown, and the route tables of routers R3 and R4, which of the following statements is TRUE?

A.

There is no route leaking configured on router R1 or router R2.

B.

Route leaking is configured on router R1 but not on router R2.

C.

Route leaking is configured on router R2 but not on router R1.

D.

Route leaking is configured on both routers R1 and R2.

Full Access
Question # 6

When a router performs the SPF calculation, which router is used as the root of the shortest path tree?

A.

The router with the fewest links.

B.

The router with the lowest router ID.

C.

The router's closest neighbor.

D.

The router doing the calculation.

Full Access
Question # 7

Which of the following is NOT a function of the control plane a router?

A.

To exchange signaling messages with other routers.

B.

To determine the best way to forward packets.

C.

To establish routing paths to deliver packets from source to destination and to reestablish them in case of failure.

D.

To utilize the forwarding tables to forward data packets towards their destination.

Full Access
Question # 8

In the diagram, all routers are using IS-IS as their routing protocol. The number next to each link is its metric value.

What path will traffic follow from router R1 to router R7, and from router R7 to router R1?

A.

Router R1 to router R7 will follow (R1-R2-R4-R6-R7). Router R7 to router R1 will follow (R7-R6-R4-R2-R1).

B.

Router R1 to router R7 will follow (R1-R2-R4-R6-R7). Router R7 to router R1 will follow (R7-R6-R5-R3-R1).

C.

Router R1 to router R7 will follow (R1-R3-R5-R6-R7). Router R7 to router R1 will follow (R7-R6-R4-R2-R1).

D.

Router R1 to router R7 will follow (R1-R3-R5-R6-R7). Router R7 to router R1 will follow (R7-R6-R5-R3-R1).

Full Access
Question # 9

Two IS-IS neighboring routers are trying to establish an adjacency, but the interface has been configured as broadcast on one of them and as point-to-point on the other. Why is the adjacency not established?

A.

The routers do not agree on the result of the DIS election.

B.

The routers discard the received Hello messages because they are not the expected type: LAN Hello vs point-to-point Hello.

C.

The routers do not receive each other’s Hello messages because they listen for messages transmitted to different multicast MAC addresses.

D.

The routers do not receive each other’s Hello messages because they listen for messages transmitted to different multicast IP addresses.

Full Access
Question # 10

Examine the physical topology of the IS-IS network, the metrics of the links and the levels of the routers. All routers have their system interfaces included in IS-IS. Which of the following statements describes the route-table entry that router R4 will use to reach the system IP address of router R6?

A.

Router R4 will have a route to router R6’s system IP address with router R2 as the next-hop.

B.

Router R4 will have a default route with router R2 as the next-hop.

C.

Router R4 will have a default route with router R3 as the next-hop.

D.

Router R4 will not have a matching entry in its routing table for router R6’s system IP address.

Full Access
Question # 11

There are several differences between IS-IS Hello packets used on broadcast interfaces and on point-to-point interfaces.

Which of the following statements is FALSE?

A.

On broadcast interfaces there are different Hello packet types for level-1 and level-2 adjacencies, whereas on point-to-point interfaces there is a single Hello packet type.

B.

The multicast MAC addresses to which the Hello messages are sent are different on broadcast interfaces and on point-to-point interfaces.

C.

The neighbors are identified using their interface MAC addresses on broadcast Hello messages and using their system IDs on point-to-point Hello messages.

D.

Broadcast Hello messages identify the elected designed IS (DIS) and point-to-point Hello messages do not.

Full Access
Question # 12

Which of the following statements about IS-IS is FALSE?

A.

IS-IS uses the concept of level-1 and level-2 routers to implement hierarchy.

B.

In IS-IS, routers are associated with an area, not the interfaces.

C.

A router becomes level-2 when it is associated with the backbone area.

D.

A level-1 router forwards traffic to other areas through the nearest I eve I-1/1 eve I-2 router.

Full Access