CCNA1 v7 - ITNv7 - Modules 8 - 10 - Communicating Between Networks Exam Answers - InfraExam 2022
CCNA1 v7 - ITNv7 - Modules 8 - 10 - Communicating Between Networks Exam Answers - InfraExam 2022
CCNA1 v7 - ITNv7 - Modules 8 - 10 - Communicating Between Networks Exam Answers - InfraExam 2022
com/)
MENU
CCNA1 v7
10.3.5 Packet Tracer – Troubleshoot Default Gateway Issues Answers Modules 14 – 15 Exam
(https://infraexam.com/10-3-5-packet-tracer-troubleshoot-default-gateway-issues- Answers
answers/) (https://infraexam.com/ccna1-
10.4.3 Packet Tracer – Basic Device Configuration Answers (https://infraexam.com/10-4- v7/ccna1-v7-itnv7-modules-
3-packet-tracer-basic-device-configuration-answers/) 14-15-network-application-
10.4.4 Packet Tracer – Build a Switch and Router Network – Physical Mode Answers communications-exam-
(https://infraexam.com/10-4-4-packet-tracer-build-a-switch-and-router-network-physical- answers/)
CCNA 1 ITN v7.02 - Student Lab Answers & Solutions (https://infraexam.com/ccna-1- Answers
lab-activities-answers-v7/) (https://infraexam.com/ccna1-
10.4.4 Lab – Build a Switch and Router Network Answers (https://infraexam.com/10-4-4- v7/ccna1-v7-itnv7-modules-
lab-build-a-switch-and-router-network-answers/) 16-17-building-and-securing-
a-small-network-exam-
answers/)
Practice Final – ITN Answers
(https://infraexam.com/ccna1-
ITN (Version 7.00) – Communicating Between Networks Exam
v7/ccna1-v7-itnv7-practice-
Answers 2020 2021
final-itn-answers/)
1. Acomputer can access devices on the same network but cannot Course Feedback
access devices on other networks. What is the probable cause of this (https://infraexam.com/ccna1-
problem? v7/ccna-1-itn-version-7-00-
course-feedback-7-02-
The cable is not connected properly to the NIC.
The computer has an invalid IP address. answers/)
The computer has an incorrect subnet mask. ITN Practice PT Skills
The computer has an invalid default gateway address.
Assessment (PTSA)
Answers Explanation & Hints: (https://infraexam.com/ccna1-
v7/itn-version-7-00-itn-
The default gateway is the address of the device a host uses to access the Internet or
another network. If the default gateway is missing or incorrect, that host will not be able to practice-pt-skills-assessment-
communicate outside the local network. Because the host can access other hosts on the ptsa/)
local network, the network cable and the other parts of the IP configuration are working. Final Exam Answers
(https://infraexam.com/ccna1-
v7/ccna1-v7-itnv7-final-exam-
2. Which statement describes a feature of the IP protocol? answers/)
4
IP protocol is a connection-less protocol, considered unreliable in terms of end-to-end
delivery. It does not provide error control in the cases where receiving packets are out-of-
order or in cases of missing packets. It relies on upper layer services, such as TCP, to
resolve these issues.
3. Why is NAT not needed in IPv6?
Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of internal
networks.
Any host or user can get a public IPv6 network address because the number of available
IPv6 addresses is extremely large.
The problems that are induced by NAT applications are solved because the IPv6 header
improves packet handling by intermediate routers.
The end-to-end connectivity problems that are caused by NAT are solved because the
number of routes increases with the number of nodes that are connected to the Internet.
The large number of public IPv6 addresses eliminates the need for NAT. Sites from the
CCNA1 v7 – ITN – Lab Answers
largest enterprises to single households can get public IPv6 network addresses. This avoids
(https://infraexam.com/category/ccna1-
some of the NAT-induced application problems that are experienced by applications that
v7-itn-lab-answers/)
require end-to-end connectivity.
CCNA1 v7 – ITN – Packet Tracer
Answers
(https://infraexam.com/category/ccna1-
4. Which parameter does the router use to choose the path to the v7-itn-packet-tracer-answers/)
destination when there are multiple routes available?
CCNA2 v7 – SRWE – Lab Answers
the lower metric value that is associated with the destination network (https://infraexam.com/category/ccna2-
v7-srwe-lab-answers/)
the lower gateway IP address to get to the destination network
the higher metric value that is associated with the destination network CCNA2 v7 – SRWE – Packet Tracer
the higher gateway IP address to get to the destination network
Answers
Answers Explanation & Hints: (https://infraexam.com/category/ccna2-
v7-srwe-packet-tracer-answers/)
When a packet arrives at the router interface, the router examines its header to determine
CCNA3 v7 – ENSA – Lab Answers
the destination network. If there is a route for the destination network in the routing table, the
(https://infraexam.com/category/ccna3-
router forwards the packet using that information. If there are two or more possible routes to
v7-ensa-lab-answers/)
the same destination, the metric is used to decide which route appears on the routing table.
The lower the metric, the better the route. CCNA3 v7 – ENSA – Packet Tracer
Answers
(https://infraexam.com/category/ccna3-
v7-ensa-packet-tracer-answers/)
5. What are two services provided by the OSI network layer? (Choose
two.) CyberOps Associate– CA – Lab Answers
(https://infraexam.com/category/cyberops
performing error detection -associate-ca-lab-answers/)
encapsulation
DevNet – DEVASC – Packet Tracer Lab
routing
Answers
de-encapsulation
(https://infraexam.com/category/devnet-
Error detection, placing frames on the media, and collision detection are all functions of the devasc-packet-tracer-lab-answers/)
6. Within
a production network, what is the purpose of configuring a ITEv7 – Packet Tracer Lab Answers
switch with a default gateway address? (https://infraexam.com/category/itev7-
packet-tracer-lab-answers/)
Hosts that are connected to the switch can use the switch default gateway address to NE 2.0 – Lab Answers
forward packets to a remote destination. (https://infraexam.com/category/ne-2-0-
A switch must have a default gateway to be accessible by Telnet and SSH. lab-answers/)
The default gateway address is used to forward packets originating from the switch to remote
NE 2.0 Packet Tracer Activity Lab
networks.
Answers
It provides a next-hop address for all traffic that flows through the switch.
(https://infraexam.com/category/ne-2-0-
Answers Explanation & Hints: packet-tracer-activity-lab-answers/)
A default gateway address allows a switch to forward packets that originate on the switch to NS 1.0 – Lab Answers
remote networks. A default gateway address on a switch does not provide Layer 3 routing for (https://infraexam.com/category/ns-1-0-
PCs that are connected on that switch. A switch can still be accessible from Telnet as long as lab-answers/)
the source of the Telnet connection is on the local network. NS 1.0 – Packet Tracer Activity Lab
Answers
(https://infraexam.com/category/ns-1-0-
packet-tracer-activity-lab-answers/)
7. What is a basic characteristic of the IP protocol?
Uncategorized
connectionless
(https://infraexam.com/category/uncateg
media dependent orized/)
user data segmentation
Yoga
reliable end-to-end delivery
(https://infraexam.com/category/yoga/)
Answers Explanation & Hints:
Internet Protocol (IP) is a network layer protocol that does not require initial exchange of
control information to establish an end-to-end connection before packets are forwarded.
Thus, IP is connectionless and does not provide reliable end-to-end delivery by itself. IP is
media independent. User data segmentation is a service provided at the transport layer.
Time-to-Live
Sequence Number
Acknowledgment Number
Differentiated Services
The value of the Time-to-Live (TTL) field in the IPv4 header is used to limit the lifetime of a
packet. The sending host sets the initial TTL value; which is decreased by one each time the
packet is processed by a router. If the TTL field decrements to zero, the router discards the
packet and sends an Internet Control Message Protocol (ICMP) Time Exceeded message to
the source IP address. The Differentiated Services (DS) field is used to determine the priority
of each packet. Sequence Number and Acknowledgment Number are two fields in the TCP
header.
9. What is one advantage that the IPv6 simplified header offers over
IPv4?
smaller-sized header
little requirement for processing checksums
4 smaller-sized source and destination IP addresses
efficient packet handling
· Better routing efficiency and efficient packet handling for performance and forwarding-rate
scalability
· Simplified and more efficient extension header mechanisms (as opposed to the IPv4
Options field)
· A Flow Label field for per-flow processing with no need to open the transport inner packet to
identify the various traffic flows
10. WhatIPv4 header field identifies the upper layer protocol carried in
the packet?
Protocol
Identification
Version
Differentiated Services
It is the Protocol field in the IP header that identifies the upper-layer protocol the packet is
carrying. The Version field identifies the IP version. The Differential Services field is used for
setting packet priority. The Identification field is used to reorder fragmented packets.
11. Refer
to the exhibit. Match the packets with their destination IP
address to the exiting interfaces on the router. (Not all targets are
used.)
4
CCNA1 v7 – ITNv7 – Modules 8 – 10 Communicating Between Networks Exam Answers 001
Packets with a destination of 172.17.6.15 are forwarded through Fa0/0. Packets with a
destination of 172.17.10.5 are forwarded through Fa1/1. Packets with a destination of
172.17.12.10 are forwarded through Fa1/0. Packets with a destination of 172.17.14.8 are
forwarded through Fa0/1. Because network 172.17.8.0 has no entry in the routing table, it will
take the gateway of last resort, which means that packets with a destination of 172.17.8.20 are
forwarded through Serial0/0/0. Because a gateway of last resort exists, no packets will be
dropped.
Because the loopback test sends packets back to the host device, it does not provide
information about network connectivity to other hosts. The loopback test verifies that the host
NIC, drivers, and TCP/IP stack are functioning.
13. Whatrouting table entry has a next hop address associated with a
destination network?
directly-connected routes
local routes
remote routes
C and L source routes
4
Routing table entries for remote routes will have a next hop IP address. The next hop IP
address is the address of the router interface of the next device to be used to reach the
destination network. Directly-connected and local routes have no next hop, because they do
not require going through another router to be reached.
14. How
do hosts ensure that their packets are directed to the correct
network destination?
They have to keep their own local routing table that contains a route to the loopback
interface, a local network route, and a remote default route.
They always direct their packets to the default gateway, which will be responsible for the
packet delivery.
They search in their own local routing table for a route to the network destination address
and pass this information to the default gateway.
They send a query packet to the default gateway asking for the best route.
Hosts must maintain their own local routing table to ensure that network layer packets are
directed to the correct destination network. This local table typically contains a route to the
loopback interface, a route to the network that the host is connected to, and a local default
route, which represents the route that packets must take to reach all remote network
addresses.
Next Header
Flow Label
Traffic Class
Differentiated Services
The Flow Label in IPv6 header is a 20-bit field that provides a special service for real-time
applications. This field can be used to inform routers and switches to maintain the same path
for the packet flow so that packets will not be reordered.
16. What
statement describes the function of the Address Resolution
Protocol?
When a PC wants to send data on the network, it always knows the IP address of the
destination. However, it also needs to discover the MAC address of the destination. ARP is
the protocol that is used to discover the MAC address of a host that belongs to the same
network.
17. Under
which two circumstances will a switch flood a frame out of
4 every port except the port that the frame was received on? (Choose
two.)
A switch will flood a frame out of every port, except the one that the frame was received from,
under two circumstances. Either the frame has the broadcast address as the destination
address, or the destination address is unknown to the switch.
18. Which statement describes the treatment of ARP requests on the local
link?
One of the negative issues with ARP requests is that they are sent as a broadcast. This
means all devices on the local link must receive and process the request.
0.0.0.0
255.255.255.255
FFFF.FFFF.FFFF
AAAA.AAAA.AAAA
the physical address of the destination host
The purpose of an ARP request is to find the MAC address of the destination host on an
Ethernet LAN. The ARP process sends a Layer 2 broadcast to all devices on the Ethernet
LAN. The frame contains the IP address of the destination and the broadcast MAC address,
FFFF.FFFF.FFFF. The host with the IP address that matches the IP address in the ARP
request will reply with a unicast frame that includes the MAC address of the host. Thus the
original sending host will obtain the destination IP and MAC address pair to continue the
encapsulation process for data transmission.
Issuing the arp –d * command on a PC will clear the ARP cache content. This is helpful when
4 a network technician wants to ensure the cache is populated with updated information.
21. Referto the exhibit. The exhibit shows a small switched network and
the contents of the MAC address table of the switch. PC1 has sent a
frame addressed to PC3. What will the switch do with the frame?
CCNA1 v7 – ITNv7 – Modules 8 – 10 Communicating Between Networks Exam Answers 04
The MAC address of PC3 is not present in the MAC table of the switch. Because the switch
does not know where to send the frame that is addressed to PC3, it will forward the frame to
all the switch ports, except for port 4, which is the incoming port.
22. Which
two types of IPv6 messages are used in place of ARP for
address resolution?
anycast
broadcast
echo reply
echo request
neighbor solicitation
neighbor advertisement
IPv6 does not use ARP. Instead, ICMPv6 neighbor discovery is used by sending neighbor
solicitation and neighbor advertisement messages.
4 In an ARP spoofing attack, a malicious host intercepts ARP requests and replies to them so
that network hosts will map an IP address to the MAC address of the malicious host.
24. Refer
to the exhibit. PC1 attempts to connect to File_server1 and
sends an ARP request to obtain a destination MAC address. Which
MAC address will PC1 receive in the ARP reply?
PC1 must have a MAC address to use as a destination Layer 2 address. PC1 will send an
ARP request as a broadcast and R1 will send back an ARP reply with its G0/0 interface MAC
address. PC1 can then forward the packet to the MAC address of the default gateway, R1.
neighbor table
ARP cache
routing table
MAC address table
The ARP cache is used to store IPv4 addresses and the Ethernet physical addresses or
MAC addresses to which the IPv4 addresses are mapped. Incorrect mappings of IP
addresses to MAC addresses can result in loss of end-to-end connectivity.
The Layer 2 device, such as a switch, uses the destination MAC address to determine which
path (interface or port) should be used to send the data onward to the destination device.
27. Match the commands to the correct actions. (Not all options are used.)
While at the privileged mode prompt such as Router#, type exit ,press Enter , and the banner
message appears. Power cycling a network device that has had the banner motd command
issued will also display the banner message, but this is not a quick way to test the
configuration.
Both the console and AUX ports can be used to directly connect to a Cisco network device for
management purposes. However, it is more common to use the console port. The AUX port is
more often used for remote access via a dial up connection. SSH and Telnet are both remote
access methods that depend on an active network connection. SSH uses a stronger password
authentication than Telnet uses and also uses encryption on transmitted data.
30. Match
the phases to the functions during the boot up process of a
Cisco router. (Not all options are used.)
There are three major phases to the bootup process of a Cisco router:
31. Match
the command with the device mode at which the command is
entered. (Not all options are used.)
The enable command is entered in R1> mode. The login command is entered in R1(config-
line)# mode. The copy running-config startup-config command is entered in R1# mode. The
ip address 192.168.4.4 255.255.255.0 command is entered in R1(config-if)# mode. The service
password-encryption command is entered in global configuration mode.
NVRAM is permanent memory storage, so the startup configuration file is preserved even if
the router loses power.
33. A router boots and enters setup mode. What is the reason for this?
If a router cannot locate the startup-config file in NVRAM, it will enter setup mode to allow the
configuration to be entered from the console device.
The switch will have a management interface with the address 172.16.100.1.
The switch can be remotely managed from a host on another network.
The switch can communicate with other hosts on the 172.16.100.0 network.
The switch is limited to sending and receiving frames to and from the gateway 172.16.100.1.
The transport input ssh command when entered on the switch vty (virtual terminal lines) will
encrypt all inbound controlled telnet connections.
172.24.255.17
172.24.1.22
172.20.0.254
172.24.255.4
172.20.1.18
When a host sends packets to a destination outside of its local network, the first hop IP
address encountered is the default gateway.
The three commands needed to password protect the console port are as follows:
line console 0
password cisco
login
The interface fastethernet 0/0 command is commonly used to access the configuration mode
used to apply specific parameters such as the IP address to the Fa0/0 port. The line vty 0 4
command is used to access the configuration mode for Telnet. The 0 and 4 parameters
specify ports 0 through 4, or a maximum of five simultaneous Telnet connections. The enable
secret command is used to apply a password used on the router to access the privileged
mode.
It is the IP address of the Router1 interface that connects the company to the Internet.
It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.
It is the IP address of Switch1 that connects PC1 to other devices on the same LAN.
It is the IP address of the ISP network device located in the cloud.
The default gateway is used to route packets destined for remote networks. The default
4 gateway IP address is the address of the first Layer 3 device (the router interface) that
connects to the same network.
40. Which two functions are primary functions of a router? (Choose two.)
packet forwarding
microsegmentation
domain name resolution
path selection
flow control
A router accepts a packet and accesses its routing table to determine the appropriate exit
interface based on the destination address. The router then forwards the packet out of that
interface.
41. Whatis the effect of using the Router# copy running-config startup-
config command on a router?
The command copy running-config startup-config copies the running-configuration file from
RAM into NVRAM and saves it as the startup-configuration file. Since NVRAM is none-
volatile memory it will be able to retain the configuration details when the router is powered
off.
The host cannot communicate with other hosts in the local network.
The switch will not forward packets initiated by the host.
The host will have to use ARP to determine the correct address of the default gateway.
The host cannot communicate with hosts in other networks.
A ping from the host to 127.0.0.1 would not be successful.
When a host needs to send a message to another host located on the same network, it can
forward the message directly. However, when a host needs to send a message to a remote
network, it must use the router, also known as the default gateway. This is because the data
link frame address of the remote destination host cannot be used directly. Instead, the IP
packet has to be sent to the router (default gateway) and the router will forward the packet
toward its destination. Therefore, if the default gateway is incorrectly configured, the host can
communicate with other hosts on the same network, but not with hosts on remote networks.
43. What
are two potential network problems that can result from ARP
operation? (Choose two.)
Manually configuring static ARP associations could facilitate ARP poisoning or MAC address
spoofing.
4 On large networks with low bandwidth, multiple ARP broadcasts could cause data
communication delays.
Network attackers could manipulate MAC address and IP address mappings in ARP
messages with the intent of intercepting network traffic.
Large numbers of ARP request broadcasts could cause the host MAC address table to
overflow and prevent the host from communicating on the network.
Multiple ARP replies result in the switch MAC address table containing entries that match the
MAC addresses of hosts that are connected to the relevant switch port.
Large numbers of ARP broadcast messages could cause momentary data communications
delays. Network attackers could manipulate MAC address and IP address mappings in ARP
messages with the intent to intercept network traffic. ARP requests and replies cause entries
to be made into the ARP table, not the MAC address table. ARP table overflows are very
unlikely. Manually configuring static ARP associations is a way to prevent, not facilitate, ARP
poisoning and MAC address spoofing. Multiple ARP replies resulting in the switch MAC
address table containing entries that match the MAC addresses of connected nodes and are
associated with the relevant switch port are required for normal switch frame forwarding
operations. It is not an ARP caused network problem.
44. Openthe PT activity. Perform the tasks in the activity instructions and
then answer the question.
The command to use for this activity is show ip interface brief in each router. The active and
operational interfaces are represented by the value “up” in the “Status” and “Protocol”
columns. The interfaces in R1 with these characteristics are G0/0 and S0/0/0. In R2 they are
G0/1 and S0/0/0.
45. Whichterm describes a field in the IPv4 packet header used to identify
the next level protocol?
protocol
destination IPv4 address
source IPv4 address
TTL
46. Whichterm describes a field in the IPv4 packet header that contains
an 8-bit binary value used to determine the priority of each packet?
differentiated services
destination IPv4 address
source IPv4 address
protocol
47. Which term describes a field in the IPv4 packet header that contains a
4
32-bit binary value associated with an interface on the sending
device?
header checksum
source IPv4 address
protocol
TTL
49. Which term describes a field in the IPv4 packet header that contains a
32-bit binary value associated with an interface on the sending
device?
TTL
source IPv4 address
protocol
header checksum
52. Which term describes a field in the IPv4 packet header that contains a
4-bit binary value set to 0100?
version
source IPv4 address
protocol
TTL
53. Whichterm describes a field in the IPv4 packet header used to identify
the next level protocol?
protocol
version
differentiated services
header checksum
54. Which term describes a field in the IPv4 packet header that contains a
4-bit binary value set to 0100?
version
differentiated services
header checksum
TTL
55. What
property of ARP causes cached IP-to-MAC mappings to remain
4 in memory longer?
Entries in an ARP table are time-stamped and are purged after the timeout expires.
A static IP-to-MAC address entry can be entered manually into an ARP table.
The type field 0x806 appears in the header of the Ethernet frame.
The port-to-MAC address table on a switch has the same entries as the ARP table on the
switch.
56. What property of ARP allows MAC addresses of frequently used
servers to be fixed in the ARP table?
A static IP-to-MAC address entry can be entered manually into an ARP table.
Entries in an ARP table are time-stamped and are purged after the timeout expires.
The type field 0x806 appears in the header of the Ethernet frame.
The port-to-MAC address table on a switch has the same entries as the ARP table on the
switch.
57. What
property of ARP allows MAC addresses of frequently used
servers to be fixed in the ARP table?
A static IP-to-MAC address entry can be entered manually into an ARP table.
The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet
frame.
The source MAC address appears in the header of the Ethernet frame.
The port-to-MAC address table on a switch has the same entries as the ARP table on the
switch.
58. What
property of ARP allows hosts on a LAN to send traffic to remote
networks?
The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet
frame.
The source MAC address appears in the header of the Ethernet frame.
The type field 0x806 appears in the header of the Ethernet frame.
ARP replies are broadcast on the network when a host receives an ARP request.
61. What property of ARP causes a reply only to the source sending an
ARP request?
The source MAC address appears in the header of the Ethernet frame.
The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet
frame.
The type field 0x806 appears in the header of the Ethernet frame.
ARP replies are broadcast on the network when a host receives an ARP request.
4
62. Whatproperty of ARP causes the request to be flooded out all ports of
a switch except for the port receiving the ARP request?
The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet
frame.
The type field 0x806 appears in the header of the Ethernet frame.
Entries in an ARP table are time-stamped and are purged after the timeout expires.
ARP replies are broadcast on the network when a host receives an ARP request.
63. What property of ARP causes the NICs receiving an ARP request to
pass the data portion of the Ethernet frame to the ARP process?
The type field 0x806 appears in the header of the Ethernet frame.
The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet
frame.
Entries in an ARP table are time-stamped and are purged after the timeout expires.
ARP replies are broadcast on the network when a host receives an ARP request.
64. What
property of ARP causes the NICs receiving an ARP request to
pass the data portion of the Ethernet frame to the ARP process?
The type field 0x806 appears in the header of the Ethernet frame.
The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet
frame.
Entries in an ARP table are time-stamped and are purged after the timeout expires.
The port-to-MAC address table on a switch has the same entries as the ARP table on the
switch.
interface gi0/1
65. Main(config)#
Main(config-if)# description Connects to the Service
LAN
Main(config-if)# no shutdown
Main(config-if)# no shutdown
Main(config-if)# no shutdown
Main(config-if)# end
172.29.157.156
172.29.157.1
10.156.157.254
4
198.51.100.177
172.29.156.36
interface gi0/1
66. BldgA(config)#
BldgA(config-if)# description Connects to the Medical
LAN
BldgA(config-if)# no shutdown
BldgA(config-if)# no shutdown
BldgA(config-if)# no shutdown
BldgA(config-if)# no shutdown
BldgA(config-if)# end
192.168.191.189
192.168.191.1
10.190.191.254
198.51.100.213
192.168.190.70
67. Floor(config)# interface gi0/1
Floor(config-if)# no shutdown
Floor(config-if)# no shutdown
Floor(config-if)# no shutdown
Floor(config-if)# no shutdown
Floor(config-if)# end
Refer to the exhibit. A network administrator is connecting a new host
to the Registrar LAN. The host needs to communicate with remote
networks. What IP address would be configured as the default
gateway on the new host?
192.168.225.223
192.168.225.1
10.224.225.254
203.0.113.246
192.168.224.103
interface gi0/1
68. Floor(config)#
Floor(config-if)# description Connects to the Registrar
LAN
Floor(config-if)# no shutdown
Floor(config-if)# no shutdown
Floor(config-if)# end
10.118.62.196
10.118.62.1
10.62.63.254
209.165.200.87
10.118.63.65
interface gi0/1
69. HQ(config)#
HQ(config-if)# description Connects to the Branch LAN
HQ(config-if)# no shutdown
4 HQ(config-if)# no shutdown
HQ(config-if)# no shutdown
HQ(config-if)# end
172.19.98.230
172.19.98.1
10.98.99.254
209.165.200.120
172.19.99.99
interface gi0/1
70. HQ(config)#
HQ(config-if)# description Connects to the Branch LAN
HQ(config-if)# no shutdown
HQ(config-if)# no shutdown
HQ(config-if)# no shutdown
HQ(config-if)# no shutdown
HQ(config-if)# end
172.20.132.13
172.20.132.1
10.132.133.254
198.51.100.156
172.20.133.132
interface gi0/1
71. Main(config)#
Main(config-if)# description Connects to the Service
LAN
4
Main(config-if)# no shutdown
Main(config-if)# no shutdown
Main(config-if)# no shutdown
Main(config-if)# no shutdown
Main(config-if)# end
192.168.167.166
192.168.167.1
10.166.167.254
198.51.100.189
192.168.166.46
72. BldgA(config)#interface gi0/1
BldgA(config-if)# no shutdown
BldgA(config-if)# no shutdown
BldgA(config-if)# no shutdown
BldgA(config-if)# no shutdown
BldgA(config-if)# end
192.168.201.200
192.168.201.1
10.200.201.254
203.0.113.222
192.168.200.80
73. Floor(config)#interface gi0/1
Floor(config-if)# no shutdown
Floor(config-if)# no shutdown
Floor(config-if)# no shutdown
Floor(config-if)# no shutdown
Floor(config-if)# end
192.168.235.234
192.168.235.1
10.234.235.254
203.0.113.3
192.168.234.114
interface gi0/1
74. RTR1(config)#
RTR1(config-if)# description Connects to the Marketing
LAN
RTR1(config-if)# no shutdown
RTR1(config-if)# no shutdown
4
RTR1(config-if)# no shutdown
RTR1(config-if)# no shutdown
RTR1(config-if)# end
10.27.14.148
10.27.14.1
10.14.15.254
203.0.113.39
10.27.15.17
Recommend
3.9
Article Rating
Subscribe
J oin the discussion
{} [+]
4 COMMENTS Newest
Dakson Holcinger
23 days ago
0
Reply
tomas
1 month ago
1
Reply
Reply to tomas
1 month ago
(https://infr
aexam.co You’re welcome. Good luck with your career and study journey.
4 m/author/a
dmin/)
1
Reply
Copyright © 2021 InfraExam 2021.