Professional Documents
Culture Documents
FINAL - Test - Nurul Atikah 5221111
FINAL - Test - Nurul Atikah 5221111
Discuss TWO (2) potential problems that you may encounter when implementing
redistribution.
1. Ping
2. Tracert
3. Ipconfig
4. pathping
QUESTION 3: Briefly discuss additional security feature(s) that you might apply to strengthen your
network.
1. Privilege level 0
2. User EXEC mode
3. Privileged EXEC mode
4. Custom privileged modes
Each of these privilege levels can be protected by passwords. The first level is protected by the
passwords configured in the terminal lines. The password can be encrypted using the command
service password-encryption.
R1#configure terminal
R1(config)#line vty 0 15
R1(config-line)#password Cisco210
R1(config-line)#exit
R1(config)#line console 0
R1(config-line)#password Cisco210
R1(config-line)#
QUESTION 4:
The employees in the RedLert Sdn Bhd are complaining about the slowness of the company network,
particularly when trying to access the Internet. Examine the Figure 1 and the configuration in Figure
2, and answer the following questions;
A. There are problems with Router B. The routing table is inconsistent, and the system is
extremely slow. Determine the potential problem and the effect it will have.
The potential problem that might occur is routing loops. A routing loop is an issue that occurs
when the routers forward packets such that the same single packet ends up back at the same
router repeatedly in the network. Routing loops occur when there is a problem in the routing
table which can cause a slow network as inaccurate data is being added to the routing table
and this causes abundance loss of data packets and the waste of bandwidth.
B. Router A is having problems connecting to Area 0, which is causing problems in other areas
because this router is used to connect to Area 0. In examining the Figure 1 and 2, identify
the problems that occur and the effect it will have.
C. Using GNS3 simulator, apply the commands that would be used to correct the configuration
problems that you have identified in Question 1(A) and 1(B). Screenshot the necessary
output that will show the problem arise have been solved. Note: Please use information
given in Figure 1 and 2. The network address for link to Internet is 202.11.20.0/30.
QUESTION 5:
In this scenario, you need to implement Border Gateway Protocol (BGP) routing protocol in order to
ensure that all networks are converge successfully.
A. Based on this information, complete the following tasks given; A. Based on Figure 3, produce
an IP addressing table. (Hint: You may plan the IP address assigning accordingly)
B. Configure all the routers as shown in Figure 3. Include in your banner with your Name and
Student ID. Password to be use: CCNPXXX or/and YearXXX with XXX is you last 3 digits of
your student ID. Write all password(s) you use in these configurations.