Chapter 4. IOS and Routing Foundations
  1. This chapter covers the following ICND1 objectives that fall under the content area, Implement a small, routed network:
  2. Describe basic routing concepts (including packet forwarding, router lookup process).
  3. Describe the operation of Cisco routers (including router bootup process, POST, router components).
  4. Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts.
  5. Configure, verify, and troubleshoot RIPv2.
  6. Access and utilize the router CLI to set basic parameters.
  7. Connect, configure, and verify operation status of a device interface.
  8. Verify device configuration and network connectivity using ping, traceroute, Telnet, SSH, or other utilities.
  9. Perform and verify routing configuration tasks for a static or default route given specific routing requirements.
  10. Manage IOS configuration files (including save, edit, upgrade, restore).
  11. Manage Cisco IOS.
  12. Implement password and physical security.
  13. Verify network status and router operation using basic utilities (including ping, traceroute, Telnet, SSH, arp, ipconfig), and the SHOW and DEBUG commands.
  1. You need to establish an EXEC session and access the command-line interface of your Cisco router. Which of the following access methods meet your requirements? (Choose three.)
    1. Console connection
    2. TFTP session
    3. Telnet session
    4. Modem connection
    5. FTP session
  2. You are logged in to a router and want to view the IP address of neighboring Cisco routers. What IOS command gives this information for the directly connected neighbors?
    1. show ip clients
    2. show cdp neighbor
    3. show cdp neighbor detail
    4. show ip links
    5. show ip route
  3. You want to assign an IP address to the FastEthernet 0/0 interface of a router. In Figure 4.1, draw lines connecting the modes of the router to the order of steps you would use to complete this task. Not all modes will be used.
    Figure 4.1. IOS command steps.
    f4-1.gif
  4. During the boot process, your router stops at a ROMMON prompt. You suspect that the IOS has become corrupt. Which router component should you examine to verify your suspicions?
    1. RAM
    2. NVRAM
    3. Hard Drive
    4. Flash
    5. ROM
    6. TFTP server connectivity
  5. You connect to a router console port and press the Enter key. The router returns the following prompt: Router(config-line)# What function is typically accomplished from this mode?
    1. Assigning passwords to the console or vty ports
    2. Assigning an IP address to the router
    3. Adjusting IOS location values
    4. Configuring logging to an external server
  6. When working in the Cisco IOS, which commands move your cursor to the beginning of the line and end of the line, respectively?
    1. CTRL-A, CTRL-Z
    2. CTRL-1, CTRL-9
    3. CTRL-A, CTRL-E
    4. CTRL-S, CTRL-Z
  7. You are troubleshooting a Cisco router at one of your offices. The router seems to lose its configuration each time it is rebooted. You study the output shown below. What is the cause of the problem?
    Cisco 2801 (revision 5.0) with 238592K/23552K bytes of memory.
    Processor board ID FTX0922W160
    2 FastEthernet interfaces
    1 terminal line
    1 Virtual Private Network (VPN) Module
    4 Voice FXO interfaces
    1 DSP, 8 Voice resources
    1 cisco service engine(s)
    DRAM configuration is 64 bits wide with parity disabled.
    191K bytes of NVRAM.
    62592K bytes of ATA CompactFlash (Read/Write)
    Configuration register is 0x2142
    
    1. The NVRAM is not marked as Read/Write.
    2. The configuration register is incorrect.
    3. The router has an insufficient DRAM configuration.
    4. 28XX series routers no longer save their configuration to NVRAM. Boot register settings should be modified to reflect this.
  8. You are attempting to telnet to a router named CiscoWest as shown here:
    Router-1#telnet CiscoWest
    Trying CiscoWest (10.3.3.1) ... Open
    Password required, but none set
    [Connection to CiscoWest closed by foreign host]
    
    Which of the following is true?
    1. Your router does not currently have a Telnet password set.
    2. The CiscoWest router does not currently have a Telnet password set.
    3. Your router does not currently have an enable secret password set.
    4. The CiscoWest router does not currently have an enable secret password set.
  9. Where does the router store its current configuration file while in operation?
    1. NVRAM
    2. Flash
    3. RAM
    4. TFTP server
    5. ROM
  10. You are a network technician at ACME Inc. A junior administrator at the company wants to know the sequence of events that occur when you power on a router. What is your reply?
    1. POST, locate configuration, apply configuration, locate IOS, load IOS
    2. POST, locate IOS, load IOS, locate configuration, apply configuration
    3. Test memory consistency, run software routines, load IOS, apply configuration
    4. Test memory consistency, run software routines, apply configuration, load IOS
  11. You notice by using a show version command that your Cisco router booted using the IOS image c2801-adventerprisek9-mz.124-4.XC.bin. What does the c2801 portion of the filename represent?
    1. The memory requirements
    2. The boot register settings
    3. The configuration register
    4. The feature set
    5. The format of the IOS file
    6. The platform
    7. The version number
  12. Which prompt displays the configuration mode that allows you to configure multiple virtual interfaces on a single physical interface?
    1. router(config-if)#
    2. router(config-subif)#
    3. router(config-line)#
    4. router(config)#
    5. router(vt-int)#
  13. You are verifying the configuration of your Cisco router and notice the following:
    Router-1#show running-config
    ...
    line vty 0 4
     password cisco
     logging synchronous
     login
     transport input all
    
    You want to prevent your vty password from being displayed in clear text in the running-configuration. How can this be accomplished?
      10
    1. By entering the password using the command secret cisco rather than password cisco.
    2. By entering the command service password-encryption in global configuration mode, the password will be encrypted in both the running-configuration and when typed in Telnet sessions.
    3. By entering the command service password-encryption in global configuration mode, the password will be encrypted in the running-configuration but not when typed in Telnet sessions.
    4. Passwords entered under vty, con, and aux ports cannot be encrypted. Only passwords entered using the enable secret command can be encrypted.
    5. Passwords entered under vty, con, and aux ports cannot be encrypted. Only passwords entered using the enable password command can be encrypted.
  14. You have installed a new WAN link to a remote office. After some initial testing, you find that the connection is not functional. Based on the following output, what is the most likely cause of the problem?
    RouterAZ#show interfaces serial 0
    Serial0 is down, line protocol is down
      Hardware is HD64570
      Internet address is 10.1.1.1/24
      MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec,
         reliability 255/255, txload 1/255, rxload 1/255
      Encapsulation HDLC, loopback not set
      Keepalive set (10 sec)
      Last input never, output never, output hang never
      Last clearing of "show interface" counters never
      Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
      Queueing strategy: weighted fair
      Output queue: 0/1000/64/0 (size/max total/threshold/drops)
         Conversations  0/0/256 (active/max active/max total)
         Reserved Conversations 0/0 (allocated/max allocated)
      5 minute input rate 0 bits/sec, 0 packets/sec
      5 minute output rate 0 bits/sec, 0 packets/sec
         0 packets input, 0 bytes, 0 no buffer
         Received 0 broadcasts, 0 runts, 0 giants, 0 throttles
         0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
         0 packets output, 0 bytes, 0 underruns
         0 output errors, 0 collisions, 5 interface resets
         0 output buffer failures, 0 output buffers swapped out
         0 carrier transitions
         DCD=down  DSR=down DTR=down RTS=down CTS=down
    
    1. The IP address assigned to the interface is invalid.
    2. The interface is shutdown.
    3. The interface does not have a cable attached.
    4. The interface is using HDLC encapsulation, whereas the remote end equipment is using PPP.
  15. You have just installed and configured a new branch office, shown in Figure 4.2. The organization would prefer to use static routing between the Branch and HQ routers to save on overhead. In addition, the organization wants you to create a single static route on the Branch router that allows the users to access both the HQ LAN and the Internet. Write in the commands necessary to accomplish this configuration; the command prompts have been provided for you.
    Figure 4.2. Network diagram.
    f4-2.gif
  16. Your organization wants to run version 2 of the RIP protocol only on the 172.31.4.0/24 network, as shown in Figure 4.3. Which of the following configurations will accomplish this objective?
    Figure 4.3. Network diagram.
    f4-3.gif
    1. RouterA (config)#router rip
      RouterA (config-router)#network 172.31.4.0 RouterA (config-router)#version 2
    2. RouterA (config)#router rip 2 RouterA (config-router)#network 172.31.4.0
    3. RouterA (config)#router rip RouterA (config-router)#network 172.31.4.0 255.255.255.0 RouterA (config-router)#version 2
    4. RouterA (config)#router rip RouterA (config-router)#network 172.31.0.0 RouterA (config-router)#version 2
    5. RouterA (config)#router rip 2 RouterA (config-router)#network 172.31.4.0 /24
  17. One of the network administrators from your organization comes to you for help. When working on the Cisco router, he often has messages that interrupt what he is typing as shown in the following: AccessServer (config)#^Z AccessServer#show ip 05:36:14: %SYS-5-CONFIG_I: Configured from console by consoleinterface What methods can he use to keep this from happening? (Choose two.)
    1. Disable logging to the console port by typing no logging console from global configuration mode.
    2. Turn on the service interrupt by typing the command service interrupt from global configuration mode.
    3. Turn on the service interrupt by typing the command service interrupt from line configuration mode.
    4. Enable synchronous logging for the console port by typing the command logging synchronous from line configuration mode.
  18. One of your organization’s routers is experiencing issues with keeping its routing table consistent with the rest of the other routers. What command will allow you to see RIP updates as they are sent from and received by the router?
    1. show ip route
    2. show ip rip
    3. show ip protocol
    4. debug ip route
    5. debug ip rip
    6. debug rip updates
  19. You want to upgrade your IOS on your Cisco router. Before you do, you need to back up the existing IOS version from your router to a network server. Which of the following series of steps depicts the correct process?
    1. A. Step 1: Enable RCP server software on a client PC. Step 2: Test connectivity between the router and PC. Step 3: Verify the IOS filename in the router system: drive. Step 4: Type the command copy system rcp from Privileged EXEC. Step 5: Enter the correct IOS filename and RCP server address.
    2. B. Step 1: Obtain a valid Cisco CCO backup license. Step 2: Ensure the router is able to reach the Internet. Step 3: Enter the command backup CCO. Step 4: Enter your CCO account number when prompted.
    3. C. Step 1: Insert a USB key in the provided USB port on the router. Step 2: Verify the IOS filename. Step 3: Type the command flashusb from Privileged EXEC. Step 4: When the copy completes, remove the USB key and store in a safe place.
    4. D. Step 1: Enable TFTP server software on a client PC. Step 2: Test connectivity between the router and PC. Step 3: Verify the IOS filename in the router Flash. Step 4: Type the command copy flash tftp from Privileged EXEC. Step 5: Enter the correct IOS filename and TFTP server address.
  20. You have pasted the configurations shown into the two new routers shown in Figure 4.4. HostA can connect to the Serial 0/0 interface of RouterA , but cannot reach HostB . RouterA can successfully ping the S1/0 interface of RouterB . The host configurations are verified as good. What could be the cause of the problem?
    Figure 4.4. Network diagram.
    f4-4.gif
    1. RouterA is missing the ip subnet-zero command.
    2. The routers do not have any routes other than connected interfaces.
    3. Cisco routers should use HDLC encapsulation when communicating over WAN connections.
    4. RouterB has an invalid loopback interface.
  21. Based on the following output, which of the following networks represent an invalid route?
    RouterAZ#show ip route
    Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
           D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
           N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
           E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
           i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
           ia - IS-IS inter area, * - candidate default, U - per-user static route
           o - ODR, P - periodic downloaded static route
    
    Gateway of last resort is 10.1.2.1 to network 0.0.0.0
    
         10.0.0.0/24 is subnetted, 2 subnets
    C       10.1.1.0 is directly connected, FastEthernet0/0
    C       10.1.2.0 is directly connected, FastEthernet0/1
         5.0.0.0/24 is subnetted, 3 subnets
    R    5.1.1.0 [120/16] via 10.1.1.5, 00:00:10, FastEthernet0/0
    R    5.2.1.0 [120/15] via 10.1.1.5, 00:00:10, FastEthernet0/0
    R    5.3.1.0 [120/10] via 10.1.1.5, 00:00:10, FastEthernet0/0
    R    192.168.1.0/24 [120/10] via 10.1.2.1, 00:00:10, FastEthernet0/1
    R    192.168.2.0/24 [120/15] via 10.1.2.1, 00:00:10, FastEthernet0/1
    R    192.169.3.0/24 [120/10] via 10.1.2.1, 00:00:10, FastEthernet0/1
    S*   0.0.0.0/0 [1/0] via 10.1.2.1
    
    1. 10.1.1.0/24
    2. 5.1.1.0/24
    3. 5.2.1.0/24
    4. 5.3.1.0/24
    5. 192.168.1.0/24
    6. 192.168.2.0/24
    7. 192.169.3.0/24
    8. 0.0.0.0/0
  22. Which of the connections shown in Figure 4.5 represent invalid cabling connections? (Choose three.)
    Figure 4.5. Network diagram.
    f4-5.gif
  23. RouterB is connected to four upstream routers, as shown in Figure 4.6. It has just received a packet from the LAN with the destination IP address 192.168.5.5/24. Based on the following routing table output, what output interface will the router choose?
    RouterB#show ip route
    Codes:C - connected, S - static, R - RIP, M - mobile, B - BGP
          D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
          N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
          E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
          i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
          ia - IS-IS inter area, * - candidate default, U - per-user static route
          o - ODR, P - periodic downloaded static route
    
    Gateway of last resort is 192.168.4.1 to network 0.0.0.0
    
    C   192.168.55.0/24 is directly connected, FastEthernet0/1
    C   192.168.10.0/24 is directly connected, Serial0/0
    C   192.168.50.0/24 is directly connected, Serial0/1
    C   192.168.80.0/24 is directly connected, Serial1/0
    C   192.168.4.0/24 is directly connected, Serial1/1
    R   192.168.1.0/24 [120/2] via 192.168.10.1, 00:00:10, Serial0/0
    R   192.168.2.0/24 [120/15] via 192.168.50.1, 00:00:11, Serial0/1
    
    R   192.169.3.0/24 [120/10] via 192.168.80.2, 00:00:22, Serial1/0
    S*  0.0.0.0/0 [1/0] via 192.168.4.1
    
    
    f4-6.gif
    Figure 4.6. Network diagram.
    1. F0/1
    2. S0/0
    3. S0/1
    4. S1/0
    5. S1/1
    6. The packet will be dropped.
  24. In Figure 4.7, draw lines connecting the router memory components to their function.
    Figure 4.7. Memory components.
    f4-7.gif
  25. Your organization wants you to set all the Privileged EXEC passwords on the Cisco devices in the network to “appl3s33d!” using the most secure password storage available. What command will you use to accomplish this?
    1. privileged password appl3s33d!
    2. privileged secret password appl3s33d!
    3. enable password appl3s33d!
    4. enable secret appl3s33d!
    5. enable secret password appl3s33d!
    6. service password-encryption appl3s33d!
  26. You want to test the network connection between your corporate router (R1, shown in Figure 4.8) and ServerA . Which of the following results represent an accurate output for the traceroute command?
    f4-8.gif
    Figure 4.8. Network diagram.
    • R1#traceroute 200.1.1.52 Type escape sequence to abort. Tracing the route to 200.1.1.52 1 63.193.239.2 8 msec 12 msec 12 msec 2 12.1.34.22 8 msec 12 msec 12 msec 3 88.2.143.48 12 msec 12 msec 14 msec 4 200.1.1.52 18 msec 13 msec 13 msec 
    • R1#traceroute 200.1.1.52 Type escape sequence to abort. Tracing the route to 200.1.1.52 1 63.193.239.1 12 msec 12 msec 12 msec 2 63.193.239.2 8 msec 12 msec 12 msec 3 12.1.34.22 8 msec 12 msec 12 msec 4 88.2.143.48 12 msec 12 msec 14 msec 5 200.1.1.52 18 msec 13 msec 13 msec 
    • R1#traceroute 200.1.1.52 Type escape sequence to abort. Tracing the route to 200.1.1.52 1 63.193.239.1 12 msec 12 msec 12 msec 2 63.193.239.2 8 msec 12 msec 12 msec 3 12.1.34.2 8 msec 12 msec 12 msec 4 12.1.34.22 12 msec 12 msec 14 msec 5 88.2.143.22 18 msec 13 msec 13 msec 6 88.2.143.48 12 msec 12 msec 14 msec 7 200.1.1.1 6 msec 14 msec 13 msec 8 200.1.1.52 18 msec 13 msec 13 msec 
    • R1#traceroute 200.1.1.52 Type escape sequence to abort. Tracing the route to 200.1.1.52 1 63.193.239.2 8 msec 12 msec 12 msec 2 12.1.34.2 8 msec 12 msec 12 msec 3 12.1.34.22 12 msec 12 msec 14 msec 4 88.2.143.22 18 msec 13 msec 13 msec 5 88.2.143.48 12 msec 12 msec 14 msec 6 200.1.1.1 6 msec 14 msec 13 msec 7 200.1.1.52 18 msec 13 msec 13 msec 
  27. You want to implement a logon banner on all of the Cisco routers in your network. Which of the following represent valid syntax to implement these logon banners? (Choose two.)
    1. Router(config)#banner motd *
      ********************************
      Unauthorized access prohibited
      ********************************
      
    2. Router(config)#banner motd *Unauthorized access prohibited*
      
    3. Router(config)#banner motd ##
      ********************************
      Unauthorized access prohibited
      ********************************##
      
    4. Router(config)#logon banner :
      ********************************
      Unauthorized access prohibited
      ********************************:
      
    5. Router(config)#banner begin &
      ********************************
      Unauthorized access prohibited
      ********************************&
      
    6. Router(config)#banner login ^
      ********************************
      Unauthorized access prohibited
      ********************************^
      
    Use Figure 4.9 to answer the following three questions.
    Figure 4.9. Network diagram. f4-9.gif

  28. Which one of the routers shown in Figure 4.9 should have a static, default route?
    1. R1
    2. R2
    3. R3
    4. R4
    5. ISP Router
  29. After network convergence occurs, messages sent between routers would follow what guidelines?
    1. Broadcasts sent once every 30 seconds
    2. Multicasts sent once every 30 seconds
    3. Hello messages sent once every 5 seconds
    4. Hello messages sent once every 10 seconds
    5. Messages sent only when the network topology changes
  30. If R3 only had RIPv1 capabilities and all other routers were running only RIPv2, what would be the result?
    1. RIPv2 is backward-compatible with RIPv1. Network operations would proceed as normal.
    2. R1 and R4 would detect the RIPv1 updates from R3 and would adjust their RIP versions to match.
    3. R3 would not understand RIPv2 updates and would create a “black hole” in the network between R1 and R4.
    4. Because RIPv1 is classful, R3 would automatically summarize routes sent from R1 and R4 back to their classful boundaries.
  31. AnswerKeyPart4

Topic attachments
I Attachment Action Size Date Who Comment
Gifgif f4-1.gif manage 14.1 K 2013-04-30 - 20:27 JimSkon 4-1
Gifgif f4-2.gif manage 11.6 K 2013-04-30 - 20:27 JimSkon 4-2
Gifgif f4-3.gif manage 13.2 K 2013-04-30 - 20:27 JimSkon 4-3
Gifgif f4-4.gif manage 28.6 K 2013-04-30 - 20:27 JimSkon 4-4
Gifgif f4-5.gif manage 29.4 K 2013-04-30 - 20:28 JimSkon 4-5
Gifgif f4-6.gif manage 17.4 K 2013-04-30 - 20:28 JimSkon 4-6
Gifgif f4-7.gif manage 18.7 K 2013-04-30 - 20:28 JimSkon 4-7
Gifgif f4-8.gif manage 16.5 K 2013-04-30 - 20:28 JimSkon 4-7
Gifgif f4-9.gif manage 21.9 K 2013-04-30 - 20:29 JimSkon 4-9
Topic revision: r2 - 2013-05-07 - JimSkon
 
This site is powered by the TWiki collaboration platformCopyright &© by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback