2. What are two characteristics of an extended ACL? (Choose two.)
• IP is used to specify TCP traffic only.
• IP is used to specify TCP and UDP traffic only.
• IP is used to specify all TCP/IP protocolsincluding TCP, UDP, ICMP and routing protocols.
• Traffic can be filtered on source address only.
• Traffic can be filtered on source and destination address only.
• Traffic can be filtered on source and destination address, protocol, and specific port number.
3. Which two statements are true regarding a PPP connection between two Cisco routers? (Choose two.)
• LCP tests the quality ofthe link.
• LCP manages compression on the link
• Only a single NCP is allowed between the two routers.
• NCP terminates the link when data exchange is complete.
• With CHAP authentication, the routers exchange plain text passwords.
4. Assuming VLSM is not being used, what impact will adding the command ip route 172.16.64.0 255.255.240.0 serial0/0 have on a router that is alreadyoperational in a network?
• All packets with a destination address between 172.16.64.1 and 172.16.80.254 will be forwarded out serial0/0.
• All packets with a destination address between 172.16.64.1 and 172.16.255.254 will be forwarded out serial0/0.
• All packets with a destination address between 172.16.64.1 and 172.16.79.254 will be forwarded out serial0/0.
• All packets with a destinationaddress between 172.16.0.1 and 172.16.64.254 will be forwarded out serial0/0.
Refer to the exhibit. The network is using OSPF as the routing protocol. A network administrator issues the show ip ospf neighbor command to check the status of operation. Which statement is true?
• RB has the lowest priority value.
• RC and RD have the lowest router IDs on the network.
• RA has establishedadjacencies with all neighbor routers.
• RA and RB cannot form an adjacency because they are stuck in the 2-way state.
6. A sales representative is preparing to send sensitive information to corporate headquarters from a hotel room using the Internet. Prior to the trip, the IT staff made the necessary provisions to allow secure Internet access. What solution was implemented for the salesrepresentative?
• Frame Relay
• PPP with CHAP authentication
• PPP with PAP authentication
Refer to the exhibit. A network administrator noticed that the VLAN configuration changes at SW2 did not propagate to SW3. On the basis of the partial output of the show vtp status command, what is the possible cause of the problem?
• VTP V2 mode is disabled.
• SW3 is configured astransparent mode.
• The number of existing VLANs does not match.
• The configuration revision number does not match.
Refer to the exhibit. Because of continuing instability of one of the serial links in the OSPF network, a network administrator configures router ASBR as shown. Which two statements will be a result of this configuration? (Choose two.)
• Traffic intended fordestinations across unstable serial links will be forwarded by ASBR even when the links are down
• A summary route of 192.168.0.0/22 will be advertised to the ISP router.
• Serial links in range 192.168.0.0 255.255.252.0 will be forced into a passive state.
• Networks connected to the unstable serial links will be placed in an unreachable state.
• Negative effects of route flapping will bereduced.
9. Which two criteria are used by STP to select a root bridge? (Choose two.)
• memory size
• bridge priority
• number of ports
• switch location
• switching speed
• base MAC address
10. A company is using a Class B IP addressing scheme and expects to need as many as 150 networks. What is the correct subnet mask to use with the network configuration?