Common Traps on Router R1 Cannot Reach R3 Practice Questions
- ·Check both forward and return paths.
- ·A correct-looking route can still fail if the next hop is unreachable.
- ·Administrative distance and longest-prefix match can change which route is used.
Sample Questions
Practice all 15 →A client requests a penetration test of their internal network. During scoping, the tester learns that the client uses a managed security service provider (MSSP) that monitors all network traffic. The client does not want the MSSP to be informed about the test. What is the most appropriate action for the tester to take?
Explanation: Penetration testers must ensure that all relevant parties are aware of testing to avoid false alarms and legal issues. If the MSSP is not informed, they may treat test traffic as malicious and cause unnecessary incident response actions, potentially harming the relationship. The best practice is to include the MSSP in the scoping process or at minimum ensure that the client coordinates with them.
A penetration tester is analyzing a Bash script that performs network scanning. The script contains the following command: 'for ip in $(seq 1 254); do hping3 -S -p 22 -c 1 $TARGET_SUBNET.$ip 2>/dev/null | grep -q "flags=SA" && echo "$TARGET_SUBNET.$ip: open"; done'. What is the primary purpose of this script?
Explanation: The script uses hping3 to send a TCP SYN packet (-S flag) to port 22 on each IP in a subnet. It then checks for a SYN-ACK response (flags=SA) to determine if the port is open. This is a SYN scan, which is a common stealth scan technique because it does not complete the TCP handshake. Port 22 is typically SSH. So the script is scanning a /24 subnet for hosts with SSH port open. It is not a vulnerability scanner (no payload beyond SYN), not a ping sweep (uses TCP, not ICMP), and not a full connection scan (does not send ACK to complete handshake).
A client engages a penetration testing firm to evaluate the security of their internal network. During the scoping meeting, the client states that they use a network access control (NAC) solution that might block the tester's machine if it is connected to the internal network without prior authorization. Which of the following should be included in the rules of engagement to address this potential issue?
Explanation: NAC solutions can automatically block unknown devices. To prevent the tester's machine from being blocked, the best approach is to have the client whitelist the tester's MAC address or IP address in the NAC solution before testing begins. This ensures that the tester's activities are not disrupted and that the test can proceed smoothly. Not using the internal network would defeat the purpose of an internal test. The tester should not propose bypassing NAC as a goal of the test (that would be a scope creep), and asking the client to disable NAC globally would be overly disruptive and unrealistic.
A client wants to test a web application that uses multiple third-party APIs for payment processing, shipping, and customer relationship management. The client states that the APIs are critical for operations but cannot be taken offline. Which scoping consideration is most important to include in the rules of engagement?
Explanation: Because the APIs are critical and cannot tolerate downtime, the rules of engagement should specify that only non-intrusive scanning and testing techniques (e.g., passive analysis or carefully controlled requests) be used on the API endpoints to minimize risk of disruption. Excluding all endpoints would limit the test, and coordinating with vendors may be helpful but is secondary to defining the testing approach.
A client is subject to PCI DSS compliance and requests a penetration test. The client's network has a mix of in-scope systems (cardholder data environment) and out-of-scope systems. During scoping, the tester recommends a specific approach to ensure accurate segmentation testing. Which of the following is the most important consideration for the rules of engagement?
Explanation: For accurate segmentation testing, the tester needs a clear understanding of the network boundaries. A network segmentation diagram is crucial because it shows which systems are in the cardholder data environment (CDE) and which are out-of-scope. This allows the tester to attempt to reach the CDE from out-of-scope segments and verify that segmentation controls are effective. Simply having network access to both sets of systems (A) is insufficient without knowing boundaries. Agreeing not to scan out-of-scope IPs (C) might conflict with the need to test segmentation. Written authorization (D) is important but not the most specific requirement for segmentation testing.
+10 more scenario questions available
Practice all Router R1 Cannot Reach R3 Practice QuestionsRelated Topics
Frequently asked questions
How do "Router R1 Cannot Reach R3 Practice Questions" appear on the real PT0-002?
Practise routing and connectivity troubleshooting scenarios involving R1, R2, R3, static routes, OSPF, next hops and routing tables. These appear throughout the PT0-002 and require you to apply your knowledge, not just recall facts.
How many scenario questions are on the PT0-002 exam?
Cisco doesn't publish an exact breakdown, but scenario-based questions (especially exhibit and command-output formats) make up a significant portion of the PT0-002. Practicing each scenario type ensures you're ready for any format.
Are these PT0-002 scenario practice questions free?
Yes — all scenario practice on Courseiva is completely free. Sign up for a free account to track your progress and see which scenario types you've mastered.
Ready to practice this scenario type?
Launch a full Router R1 Cannot Reach R3 Practice Questions session with instant scoring and detailed explanations.
Start Scenario Practice →