Author: CCNA Exam Answers

CCNAv7 SRWE Skills Assessment – SRWE Final Skills Exam (Equipment) Exam Answers Topology Assessment Objectives Part 1: Initialize, Reload and Configure Basic Device Settings (45 points, 45 minutes) Part 2: Configure Network Infrastructure Settings (VLANs, Trunking, Etherchannel) (30 points, 25 minutes) Part 3: Configure Host Support (20 points, 25 minutes) Part 4: Test and Verify IPv4 and IPv6 End-to-End Connectivity (5 points, 10 minutes) Scenario In this Skills Assessment (SA) you will configure the devices in a small network. You must configure a router, switch and PCs to support both IPv4 and IPv6 connectivity for supported hosts. Your router and…

Read More

Lab – Use TFTP, Flash, and USB to Manage Configuration Files (Instructor Version) Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 G0/0/1 192.168.1.1 255.255.255.0 N/A S1 VLAN 1 192.168.1.11 255.255.255.0 192.168.1.1 PC-A NIC 192.168.1.3 255.255.255.0 192.168.1.1 Objectives Part 1: Build the Network and Configure Basic Device Settings Part 2: Use TFTP to Back Up and Restore the Switch Running Configuration Part 3 Use TFTP to Back Up and Restore the Router Running Configuration Part 4: Back Up and Restore Running Configurations Using Router Flash Memory Part 5: (Optional) Use a USB Drive to Back Up and…

Read More

Lab – Use Tera Term to Manage Router Configuration Files (Instructor Version) Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 G0/0/1 192.168.1.1 255.255.255.0 N/A S1 VLAN 1 192.168.1.11 255.255.255.0 192.168.1.1 PC-A NIC 192.168.1.3 255.255.255.0 192.168.1.1 Objectives Part 1: Configure Basic Device Settings Part 2: Use Terminal Emulation Software to Create a Backup Configuration File Part 3: Use a Backup Configuration File to Restore a Router and Switch Configuration Background / Scenario It is a recommended best practice to maintain backup configuration files for routers and switches in the event that they need to be restored to…

Read More

Lab – Research Network Monitoring Software (Instructor Version) Objectives Part 1: Survey Your Understanding of Network Monitoring Part 2: Research Network Monitoring Tools Part 3: Select a Network Monitoring Tool Background / Scenario Network monitoring is needed for any sized network. Proactively monitoring the network infrastructure can assist network administrators with their day-to-day duties. The wide variety of networking tools available vary in cost, depending on the features, number of network locations and number of nodes supported. In this lab, you will conduct research on available network monitoring software. You will gather information on software products and features of those…

Read More

Lab – Research Broadband Internet Access Technologies (Instructor Version) Objectives Part 1: Investigate Broadband Distribution Part 2: Research Broadband Access Options for Specific Scenarios Background / Scenario Although broadband internet access options have increased dramatically in recent years, broadband access varies greatly depending on location. In this lab, you will investigate current broadband distribution and research broadband access options for specific scenarios. Required Resources Device with internet access Part 1: Investigate Broadband Distribution In Part 1, you will research broadband distribution in a geographical location. Step 1: Research broadband distribution. Use the internet to research the following questions: a. For…

Read More

Lab – Configure NAT for IPv4 (Instructor Version) Topology Addressing Table Device Interface IP Address Subnet Mask R1 G0/0/0 209.165.200.230 255.255.255.248 G0/0/1 192.168.1.1 255.255.255.0 R2 G0/0/0 209.165.200.225 255.255.255.248 Lo1 209.165.200.1 255.255.255.224 S1 VLAN 1 192.168.1.11 255.255.255.0 S2 VLAN 1 192.168.1.12 255.255.255.0 PC-A NIC 192.168.1.2 255.255.255.0 PC-B NIC 192.168.1.3 255.255.255.0 Objectives Part 1: Build the Network and Configure Basic Device Settings Part 2: Configure and verify NAT for IPv4 Part 3: Configure and verify PAT for IPv4 Part 4: Configure and verify Static NAT for IPv4 Background / Scenario Network Address Translation (NAT) is the process where a network device, such…

Read More

Lab – Configure and Verify Extended IPv4 ACLs (Instructor Version) Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 G0/0/1 N/A N/A N/A G0/0/1.20 10.20.0.1 255.255.255.0 G0/0/1.30 10.30.0.1 255.255.255.0 G0/0/1.40 10.40.0.1 255.255.255.0 G0/0/1.1000 N/A N/A Loopback1 172.16.1.1 255.255.255.0 R2 G0/0/1 10.20.0.4 255.255.255.0 N/A S1 VLAN 20 10.20.0.2 255.255.255.0 10.20.0.1 S2 VLAN 20 10.20.0.3 255.255.255.0 10.20.0.1 PC-A NIC 10.30.0.10 255.255.255.0 10.30.0.1 PC-B NIC 10.40.0.10 255.255.255.0 10.40.0.1 VLAN Table VLAN Name Interface Assigned 20 Management S2: F0/5 30 Operations S1: F0/6 40 Sales S2: F0/18 999 ParkingLot S1: F0/2-4, F0/7-24, G0/1-2 S2: F0/2-4, F0/6-17, F0/19-24, G0/1-2 1000 Native N/A…

Read More

Lab – Explore DNS Traffic (Instructor Version) Objectives Part 1: Capture DNS Traffic Part 2: Explore DNS Query Traffic Part 3: Explore DNS Response Traffic Background / Scenario Wireshark is an open source packet capture and analysis tool. Wireshark gives a detailed breakdown of the network protocol stack. Wireshark allows you to filter traffic for network troubleshooting, investigate security issues, and analyze network protocols. Because Wireshark allows you to view the packet details, it can be used as a reconnaissance tool for an attacker. In this lab, you will install Wireshark on a Windows system and use Wireshark to filter…

Read More

Lab – Social Engineering (Instructor Version) Objective In this lab, you will research examples of social engineering and identify ways to recognize and prevent it. Resources Computer with internet Access Instructions Step 1: Research Social Engineering Examples Social engineering, as it relates to information security, is used to describe the techniques used by a person (or persons) who manipulate people in order to access or compromise information about an organization or its computer systems. A social engineer is usually difficult to identify and may claim to be a new employee, a repair person, or researcher. The social engineer might even…

Read More

2.7.2 Lab – Configure Single-Area OSPFv2 (Instructor Version) Topology Addressing Table Device Interface IP Address Subnet Mask R1 G0/0/1 10.53.0.1 255.255.255.0 Loopback1 172.16.1.1 255.255.255.0 R2 G0/0/1 10.53.0.2 255.255.255.0 Loopback1 192.168.1.1 255.255.255.0 Objectives Part 1: Build the Network and Configure Basic Device Settings Part 2: Configure and Verify Single-Area OSPFv2 for basic operation Part 3: Optimize and Verify the Single-Area OSPFv2 configuration Background / Scenario Instructor Note: This lab has been built to use two routers with no serial interfaces. The switches indicated in the topology are optional. If you have a third router you can introduce into the pod, suggest…

Read More

Lab – Troubleshoot IPv4 and IPv6 Static and Default Routers (Instructor Version) Topology Addressing Table Device Interface IP Address / Prefix R1 G0/0/0 192.168.0.1 /28 2001:db8:acad::1 /64 G0/0/1 192.168.0.17 /28 2001:db8:acad:16::1 /64 Loopback1 172.16.1.1 /24 2001:db8:acad:171::1 /64 Loopback2 209.165.200.1 /25 2001:db8:acad:209::1 /64 R2 G0/0/0 192.168.0.14 /28 2001:db8:acad::14 /64 G0/0/1 192.168.0.30 /28 2001:db8:acad:16::2 /64 Loopback1 172.16.2.1 /24 2001:db8:acad:172::1 /64 Loopback2 209.165.200.129 /25 2001:db8:acad:210::1 /64 Objectives Part 1: Evaluate Network Operation Part 2: Gather information, create an action plan, and implement corrections Background / Scenario Instructor Note: Preconfiguration scripts for all the devices are located below. Cut and paste or otherwise use…

Read More

Lab – Configure IPv4 and IPv6 Static and Default Routes (Instructor Version) Topology Addressing Table Device Interface IP Address / Prefix R1 G0/0/0 172.16.1.1 /24 2001:db8:acad:2::1 /64 fe80::1 G0/0/1 192.168.1.1 /24 2001:db8:acad:1::1 /64 fe80::1 Loopback1 10.1.0.1 /24 2001:db8:acad:10::1 /64 fe80::1 Loopback2 209.165.200.225 /27 2001:db8:acad:209::1 /64 fe80::1 R2 G0/0/0 172.16.1.2 /24 2001:db8:acad:2::2 /64 fe80::2 G0/0/1 192.168.1.2 /24 2001:db8:acad:1::2 /64 fe80::2 Loopback1 10.2.0.1 /24 2001:db8:acad:11::2 /64 fe80::2 Loopback2 209.165.200.193 /27 2001:db8:acad:210::1 /64 fe80::2 Objectives Part 1: Build the Network and Configure Basic Device Settings Part 2: Configure and verify IP and IPv6 addressing on R1 and R2 Part 3: Configure and verify…

Read More