Sei sulla pagina 1di 20

Refer to the exhibit. What effect will the commands have when entered on R2?

They will prevent all simultaneous in-band connections. They will permit an unlimited number of in-band connections. They will permit a maximum of five simultaneous in-band connections. They will permit a minimum of four simultaneous in-band connections with a different password on each connection. A network technician wants to restore a backup copy of the saved configuration file on a router from a TFTP server. After restoring the file from the TFTP server, the technician reloads the router and finds that it still has the old configuration file instead of the restored file. What could have caused this? The technician entered the command delete flash: before reloading the router. The technician entered the command boot system rom before reloading the router. The technician entered the command erase startup-config before reloading the router. The technician failed to enter the command copy running-config startupconfig before reloading the router. What is the primary function of the NOC at a large ISP? installing equipment at a customer site setting up customer accounts and passwords monitoring and testing customer network connections entering customer requirements in an order-tracking database

Refer to the exhibit. The Transfer > Capture Text feature available through HyperTerminal has been used to capture the running configuration on a router. The startup-configuration has been erased from the router followed by the issuing of the reload command. The startup-config is restored by using the captured file, but all interfaces on the router are shown as administratively down. What could cause this problem? The enable password was incorrectly entered. The configuration register was not set to 0x2142. The enable secret password was incorrectly entered. The no shutdown command must be entered under each interface section in the file being sent. The captured file should have restored the running configuration not the startup configuration.

Refer to the exhibit. Which routing protocol would likely be used to distribute routes between these routers? RIP BGP OSPF EIGRP

Refer to the exhibit. If the show cdp neighbors command is issued on RTB, which devices will appear in the output if all devices use the Cisco IOS and have CDP enabled? RTA, RTC RTA, RTC, Sw2 RTA, RTC, Sw1, Sw2, Sw3 RTA, RTC, Sw1, Sw2, Sw3, PC1, PC2

Which scenario may require the use of a crossover UTP cable? connecting a host to a hub connecting a host to a switch connecting a router to a switch connecting a switch to another switch

Refer to the exhibit. Host H1 is sending a datagram to host H2 across the Internet. NAT will be configured on RTRC. Which address is considered the inside local address? 10.1.1.1 10.1.1.6 209.165.201.2 209.165.201.17 209.165.200.226

What is a characteristic of a scalable network? 100% uptime redundant links easy expansion multiple backup devices

Which type of WAN connection uses packet-switched connections? T1 E1 ISDN Frame Relay

What is an SLA? a tool to diagnose basic network connectivity issues a survey to obtain initial information about customer problems a program that shares remote desktops to diagnose customer issues an entry-level position that provides technicians with valuable experience a contract that defines expectations between an organization and a service vendor

Refer to the exhibit. What could be two possible causes for the Serial0/0/0 interface status? (Choose two.) A Layer 3 issue exists. The bandwidth is set too high. An incorrect cable is being used. A loopback address must be set. The reliability setting is too low for the interface. A defective serial interface cable was used.

Which statement correctly describes the operation of DNS? It uses a local HOSTS file to resolve URLs to IP addresses for internal devices. It uses a distributed hierarchy of servers to resolve hostnames to IP addresses. It references a central file that maps hostnames to IP addresses for all Internet hosts. It uses a single layer of interconnected peer servers to manage hostname-to-IP-address mappings

Which statement is true about UDP?

UDP has less overhead than TCP has. UDP provides windowing and flow control. UDP uses acknowledgments for reliable delivery. UDP uses sessions to keep track of conversations

A Catalyst switch is used as a temporary replacement for another switch that needs to be repaired. About a minute after the switch has started, the SYST LED on the front of the switch transitions from blinking green to amber. What is the meaning of the amber SYST LED? The switch has no configuration file in NVRAM. The switch has failed POST and must be sent for service. The switch is functioning properly. The switch is in half-duplex mode.

What is a characteristic of the EIGRP routing protocol? It has a hop count limitation that makes it suitable only for small, simple networks that consist of fe than 15 hops. It does not include subnet mask information in routing updates. It builds the topology table based on all of the advertisements from its neighbors. It maintains a full database of distant routers and the methods by which they interconnect.

Refer to the exhibit. What is the possible reason that a technician is unable to telnet into the HQ router and make configuration changes? A password is required for vty 0. A password for line con 0 is required. All five virtual interfaces must be configured before Telnet is possible. The service password-encryption command is preventing Telnet access.

Why are port numbers included in the TCP header of a segment? to indicate the correct router interface that should be used to forward a segment to identify which switch ports should receive or forward the segment to determine which Layer 3 protocol should be used to encapsulate the data to enable a receiving host to forward the data to the appropriate application to allow the receiving host to assemble the packet in the proper order

A network engineer has been asked to design a new structured cable system. What should be the first step in the project? Obtain an accurate floor plan. Identify all potential sources of EMI. Sketch the proposed network design. Determine the locations of all network devices.

Which protocol allows encryption of any application layer protocol? FTP FTPS HTTPS IPsec Telnet

How many host addresses may be assigned on each subnetwork when using the 130.68.0.0 network address with a subnet mask of 255.255.248.0? 30 256 2046 2048 4094 4096

Refer to the exhibit. The network administrator uses the command below to configure a default route on RTB: RTB(config)# ip route 0.0.0.0 0.0.0.0 fa0/0 A ping issued from PC3 is successful to RTB. However, echo request packets arrive at PC1 but

the echo replies do not make it back to PC3. What will fix this problem? RTA must be configured to forward packets to the 192.168.2.0 network. The ip route command needs to be edited so that the next hop address is 10.1.1.5. The ip route command needs to be edited so that the 192.168.2.1 address is the next hop address. The ip route command should be removed from the RTB router configuration. Another default route should be configured on RTA with a next hop address of 10.1.1.6. 3

Refer to the exhibit. A NOC technician at an ISP enters the command c:\ping 209.165.201.7. What are two reasons to use this command? (Choose two.) map the path to 209.165.201.7 test reachability to 209.165.201.7 locate connectivity problems along the route to 209.165.201.7 identify ISPs that interconnect the NOC and remote host with IP 209.165.201.7

measure the time that packets take to reach 209.165.201.7 and return to the technician's workstatio 4 For the assignment of permissions to files and folders, what does the "principle of least privilege" imply? No user has more privileges than any other user. Permissions to files are given based on seniority. Users only have access to resources that are necessary for their jobs. Users should be given no access to computer resources until they ask. 5 What is the primary function of a Level 1 support technician in an ISP help desk department with multiple levels of customer support? to install hardware replacements for the customer to accompany an on-site technician to provide additional technical support to diagnose and document the symptoms of hardware, software, and system problems to design network enhancements that support the new technology requirements of the customer 6 A user reports being unable to access the Internet. The help desk technician employs a bottom-up

approach to troubleshooting. The technician first has the user check the patch cable connection from the PC to the wall, and then has the user verify that the NIC has a green link light. What will the technician have the user do next? Enter an IP address into the WWW browser address bar to see if DNS is at fault. Use traceroute to identify the device along the path to the ISP that may be at fault. Verify the IP address, subnet, and gateway settings using ipconfig on the PC. Connect to the user home router to check firewall settings for blocked TCP ports. 7 What is the primary function of the NOC at a large ISP? installing equipment at a customer site setting up customer accounts and passwords monitoring and testing customer network connections entering customer requirements in an order-tracking database 8

Refer to the graphic. Which command will configure a static route on Router A to direct traffic from LAN A that is destined for LAN C? RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.5.2 RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.3.2 RouterA(config)# ip route 192.168.5.0 255.255.255.0 192.168.3.2 RouterA(config)# ip route 192.168.3.0 255.255.255.0 192.168.3.1 RouterA(config)# ip route 192.168.3.2 255.255.255.0 192.168.4.0 9

Refer to the exhibit. A network administrator is troubleshooting the serial connection between R1 and R2. There is no communication between R1 and R2. Based on the output of the show ip interface brief command, what is the cause of the problem? There is a misconfiguration of IP addresses. There is a mismatch of encapsulation methods. The no shutdown command should be issued on R2. The routing protocols are not compatible. 10 What is a feature of PAT? It maps IP addresses to URLs. It displays private IP addresses to public networks. It sends acknowledgments of received packets. It allows multiple hosts on a single LAN to share globally unique IP addresses. 11 A company is developing an Internet store for its website. Which protocol should be used to transfer credit card information from customers to the company web server? FTPS HTTP HTTPS WEP2 TFTP 12 How does a switch interface that uses sticky port security handle MAC addresses? The addresses are configured manually and are saved in the running configuration. They are configured manually and are not saved in the running configuration.

They are configured dynamically and are saved in the running configuration. They are configured dynamically and are not saved in the running configuration. 13

Refer to the exhibit. Which two IP addresses could be assigned to the hosts in the diagram? (Choose two.) 192.168.65.31 192.168.65.32 192.168.65.35 192.168.65.60 192.168.65.63 192.168.65.64 14

Refer to the exhibit. Which type of physical cable connection is used for the connection between the Cisco 1841 routers R1 and R2? USB console DB-9 serial cable LAN crossover UTP LAN straight-through UTP 15 What is the purpose of the routing process? to encapsulate data that is used to communicate across a network to select the paths that are used to direct traffic to destination networks to convert a URL name into an IP address to provide secure Internet file transfer to forward traffic on the basis of MAC addresses 16 What occurs during a static NAT translation? Multiple local addresses are mapped to one global address. The host device is configured with a permanent outside global address. A one-to-one mapping is created between an inside local and outside global address. The router is forced to return the inside global address to the address pool when a session ends. 17

Refer to the exhibit. What two conclusions can be drawn about router RTB? (Choose two.) The router is connected to a router named Boise. Router RTB is connected to a Cisco 1841 router. Router RTB is directly connected to two other routers. The IP address of the router interface that is connected to router RTB is 192.168.2.6. The RTB router is connected to two Cisco devices by FastEthernet links. 18 Why is the OSI model useful in network design and assessment? It combines specific networking tasks into a complex format.

It defines the four lower layers, which standardize applications supported within the model. It is used during troubleshooting to focus on the entire networking process instead of a single layer. It divides networking communications into multiple processes that are smaller and more manageabl 19 Which statement correctly describes the operation of DNS? It uses a local HOSTS file to resolve URLs to IP addresses for internal devices. It uses a distributed hierarchy of servers to resolve hostnames to IP addresses. It references a central file that maps hostnames to IP addresses for all Internet hosts. It uses a single layer of interconnected peer servers to manage hostname-to-IP-address mappings.

20 Which type of WAN connection uses packet-switched connections? T1 E1 ISDN Frame Relay 21

Refer to the exhibit. While configuring the serial interface of a router, the network administrator sees the highlighted error message. What is the reason for this? The serial interface is administratively down.

The serial interface is already configured with an IP address. The network administrator has attempted to configure the serial interface with a broadcast addres The same IP address has been configured on another interface. 22

Refer to the exhibit. The Transfer > Capture Text feature available through HyperTerminal has been used to capture the running configuration on a router. The startup-configuration has been erased from the router followed by the issuing of the reload command. The startup-config is restored by using the captured file, but all interfaces on the router are shown as administratively down. What could cause this problem? The enable password was incorrectly entered. The configuration register was not set to 0x2142. The enable secret password was incorrectly entered. The no shutdown command must be entered under each interface section in the file being sent. The captured file should have restored the running configuration not the startup configuration. 23

Refer to the exhibit. Users have been experiencing very poor performance rates to the Internet. The technician notices a higher than normal CRC count on the FastEthernet 0/0 interface that connects to the LAN. What is the most likely cause of the high value? The FastEthernet 0/0 interface is misconfigured in half-duplex mode. Too many collisions are occurring on the LAN. Too many packets smaller than 64 bytes are on the network. Excessive noise is on the line. The FastEthernet0/0 interface is configured with the wrong encapsulation type. 24 Which technology is used for WAN connections and delivers up to 1.544 Mb/s of symmetrical bandwidth? DSL dialup T1 line T3 line 25 Which protocol allows encryption of any application layer protocol? FTP FTPS HTTPS IPsec

Telnet 26 Which scenario may require the use of a crossover UTP cable? connecting a host to a hub connecting a host to a switch connecting a router to a switch connecting a switch to another switch 27 Which question provides troubleshooting information about a problem at Layer 1 or Layer 2 of the OSI model? Can the server be reached through Telnet? Is there a firewall that is configured on the PC? Is there a link light on the network card? What addresses are configured in the TCP/IP settings? 28

Refer to the exhibit. Which routing protocol would likely be used to distribute routes between these routers? RIP BGP OSPF EIGRP

29 A hacker attempts to reach confidential information that is stored on a server inside the corporate network. A network security solution inspects the entire packet, determines that it is a threat, and blocks the packet from entering the inside network. Which security measure protected the network? an IDS an IPS a host-based firewall Anti-X software 30

Refer to the exhibit. Host H1 is sending a datagram to host H2 across the Internet. NAT will be configured on RTRC. Which address is considered the inside local address? 10.1.1.1 10.1.1.6 209.165.201.2 209.165.201.17 209.165.200.226

Potrebbero piacerti anche