Sei sulla pagina 1di 17

1

What is the default encapsulation for serial interfaces on Cisco routers? PPP SLIP HDLC Frame Relay 2What routing protocol would be appropriate to use for exchanging routes between ISPs? RIPv2 BGP OSPF EIGRP

A network engineer is planning a new horizontal cable installation in an office building. What advantage would UTP cable have ove fiber optic cable for this installation? lower installation costs better protection from EMI higher transmission speeds longer unrepeated distance between endpoints

4A hacker attempts to reach confidential information that is stored on a server inside the corporate network. A network security solut inspects the entire packet, determines that it is a threat, and blocks the packet from entering the inside network. Which security mea protected the network? an IDS an IPS a host-based firewall Anti-X software

Refer to the exhibit. The interfaces on R1 and R2 have been properly configured with the IP addresses as shown. No dynamic routi protocols have been configured. The network administrator has entered the commands that are shown in the exhibit. Which two additional commands need to be entered on the routers to enable host A to access the Internet? (Choose two.) R2(config)# ip route 0.0.0.0 0.0.0.0 S0/0/0 R1(config)# ip route 0.0.0.0 0.0.0.0 S0/0/0 R1(config)# ip route 0.0.0.0 0.0.0.0 198.213.219.1 R2(config)# ip route 192.168.1.0 255.255.255.0 10.1.1.1 R1(config)# ip route 198.133.219.1 255.255.255.0 10.1.1.2

6Which protocol allows secure in-band management so that a network administrator can monitor and configure network devices with fear of any passwords being compromised? SSH HTTP SNMP Telnet

Which two services are required to enable a computer to receive dynamic IP addresses and access the Internet using domain nam (Choose two.) DNS WINS HTTP DHCP SMTP 8

Refer to the exhibit. A network administrator is unable to ping H1 from the router and is checking the cabling along the network. Which segment is incorrectly cabled? Segment A Segment B Segment C Segment D

Refer to the exhibit. A technician tries to telnet to a router with the IP address of 172.16.1.2. What does the message indicate about the Telnet session? The console password has not been set on the remote router. The VTY password has not been set on the remote router. The enable password has not been set on the remote router. The enable secret password has not been set on the remote router. The session has been opened and closed successfully by the remote router.

10The IT department of a company implements a backup plan which includes a daily backup on Monday through Saturday. Only file were modified during each day are backed up. Which backup method is being used? full backup normal backup differential backup incremental backup

11

How many host addresses may be assigned on each subnetwork when using the 130.68.0.0 network address with a subnet mask 255.255.248.0? 30 256 2046 2048 4094 4096 12For an HTTP server, what purpose does a URL serve? ensures that routing tables are up to date translates domain names into IP addresses determines which services are available on a server identifies the protocol and path to resources on a server

13

Refer to the exhibit. Which three IP addresses could be assigned to the hosts? (Choose three.) 192.168.88.1 192.168.88.8 192.168.88.9 192.168.88.12 192.168.88.14 192.168.88.15

192.168.88.16 192.168.88.18 14For the assignment of permissions to files and folders, what does the "principle of least privilege" imply? No user has more privileges than any other user. Permissions to files are given based on seniority. Users only have access to resources that are necessary for their jobs. Users should be given no access to computer resources until they ask.

15

A user calls the help desk to report that the new web server of the company, www.theccnas.com, cannot be accessed. The user mentions that the web browser seems to be working fine because web pages from other web servers display normally. The help d technician asks the user to ping www.theccnas.com and the user reports that the error message is Ping request could not find th host. What network service should be further investigated to determine the issue? DNS HTTP SMTP DHCP

16

Which connection, dependent on regional availability, will provide a small business with a symmetrical dedicated leased line of approximately 1.5 Mb/s or 2.0 Mb/s connection to an ISP? ATM Dialup Metro Ethernet T1 or E1 T3 or E3 17What is the purpose of the routing process? to encapsulate data that is used to communicate across a network to select the paths that are used to direct traffic to destination networks to convert a URL name into an IP address to provide secure Internet file transfer to forward traffic on the basis of MAC addresses

18

What is used by a routing protocol to determine the best path to include in the routing table? Convergence time Default distance Metric Type of router 19

Refer to the exhibit. Users have been experiencing very poor performance rates to the Internet. The technician notices a higher th normal CRC count on the FastEthernet 0/0 interface that connects to the LAN. What is the most likely cause of the high value? The FastEthernet 0/0 interface is misconfigured in half-duplex mode. Too many collisions are occurring on the LAN. Too many packets smaller than 64 bytes are on the network. Excessive noise is on the line. The FastEthernet0/0 interface is configured with the wrong encapsulation type.

20

Refer to the exhibit. What is the device named "Distribution"? a firewall a router a switch an IP phone

21When a user issues the command ping a 64.102.240.242 in a command prompt window, which database will a DNS server sear for the matching record? reverse lookup zones forward lookup zones domain name search zones domain address search zones

22

Different hosts connect to the same switch port at different times. If the switch port is configured with dynamic port security, how d process the MAC addresses? The addresses are manually assigned with the use of the switchport command. The addresses are dynamically learned and stored in the address table. The addresses are dynamically configured and saved in the running configuration. The addresses are stored in the address table and added to the running configuration. 23Why are port numbers included in the TCP header of a segment? to indicate the correct router interface that should be used to forward a segment to identify which switch ports should receive or forward the segment to determine which Layer 3 protocol should be used to encapsulate the data to enable a receiving host to forward the data to the appropriate application to allow the receiving host to assemble the packet in the proper order

24

Refer to the exhibit. Which type of physical cable connection is used for the connection between the Cisco 1841 routers R1 and R USB

console DB-9 serial cable LAN crossover UTP LAN straight-through UTP 25

Refer to the exhibit. Which type of link is supported by this interface module? LAN WAN WLAN VLAN

26

Which routing protocol excludes the subnet information from routing updates? EIGRP OSPF RIPv1 BGP 27

Refer to the exhibit. A NOC technician at an ISP enters the command c:\ping 209.165.201.7. What are two reasons to use this command? (Choose two.)

map the path to 209.165.201.7 test reachability to 209.165.201.7 locate connectivity problems along the route to 209.165.201.7 identify ISPs that interconnect the NOC and remote host with IP 209.165.201.7 measure the time that packets take to reach 209.165.201.7 and return to the technician's workstation

28

Refer to the exhibit. The Transfer > Capture Text feature available through HyperTerminal has been used to capture the running configuration on a router. The startup-configuration has been erased from the router followed by the issuing of the reload comman The startup-config is restored by using the captured file, but all interfaces on the router are shown as administratively down. What could cause this problem? The enable password was incorrectly entered. The configuration register was not set to 0x2142. The enable secret password was incorrectly entered. The no shutdown command must be entered under each interface section in the file being sent. The captured file should have restored the running configuration not the startup configuration. 29

Refer to the exhibit. A network administrator has an extra router and wishes to use it as shown to passively monitor network traffic Which IOS feature should be implemented on router EXTRA? ACLs CDP IDS IPS

30

Refer to the exhibit. Which statement is true based on the exhibited information? The router is using a link-state routing protocol. The router will get routing updates on the FastEthernet0/0 interface. The router will not forward routing updates from the Serial0/0/0 interface. The network for Fa0/1 will be included in the routing updates that are sent from this router. 31

A technician visits every computer in a workgroup and edits the HOSTS file. The technician makes an entry in each file for each h the network. What will this action accomplish if completed accurately? Each computer in the workgroup will be able to determine its own computer name. Each computer in the workgroup will be able to resolve the name of each host to an IP address. Each computer in the workgroup will automatically receive an IP address without requiring a DHCP server. Each computer in the workgroup will only accept traffic from computers that have been added to the HOSTS file. 32What should be the first step in a structured cable project? Locate all sources of EMI. Obtain an accurate floor plan. Identify the network backbone. Design efficient cable management systems.

33

Refer to the exhibit. RIPv2 has been configured on all routers in the network. Based on the output of the show ip route command which statement is true? Network 172.16.0.0/16 can be reached via interface Fa0/0 and is one hop away. Network 10.10.33.0/24 can be reached via interface S0/0/1 and is one hop away. Network 192.168.23.0/24 can be reached only via interface S0/0/0 and is one hop away. Network 192.168.23.0/24 can be reached via interfaces S0/0/0 and S0/0/1 and is two hops away. 34What will a router do with a packet that is destined for a host with the IP address 192.168.1.5/24 if no entry for the 192.168.1.0/24 network exists in the routing table? It will drop the packet. It will send the packet back to the source address. It will broadcast the packet out all of its active interfaces. It will broadcast the packet out all of its active interfaces except the interface that received the packet.

35

When a field technician visits a customer site and resolves the issue that was opened in a trouble ticket, what should the technicia do? assess the network design of the customer site survey users at the customer site for further needs document the solution and obtain acceptance of the customer discuss further problems that are identified during the visit and offer cost estimates 36

Refer to the exhibit. Router Left is unable to ping router Right. The show interfaces serial 0/0/0 command indicates that the inter is up but the line protocol is down on both routers. Which action could be taken to establish connectivity between the two routers? Configure S0/0/1 instead of S0/0/0 on router Right. Enter the encapsulation hdlc command on router Right. Contact the service provider to report that the circuit is down. Contact the service provider to enable PPP on the WAN circuit. Enter the no encapsulation ppp command on router Left S0/0/0.

37

Refer to the exhibit. What does the ^ symbol indicate? It marks the end of an error message and an insert point for a new command. It marks the beginning of an error message and an insert point for a new command. It marks a point in the command string where there is an incorrect or unrecognized character. It marks a point in the command string where a parameter has to be entered to complete the command configuration. 38A company is developing an Internet store for its website. Which protocol should be used to transfer credit card information from customers to the company web server? FTPS HTTP HTTPS WEP2 TFTP

39

Refer to the exhibit. Hosts that belong to the IT department use 10.10.55.33/27 as a default gateway. Where can this IP address b located in the network? A B C D E F 40What does the command RA(dhcp-config)# dns-server 10.10.64.221 10.10.64.222 accomplish? allows RA to act as a DNS relay agent allows RA to be configured as a DNS server identifies the default gateway address that is used to reach the DNS servers enables DHCP clients to use the specified IP addresses as DNS servers

41

How do port filtering and access lists help provide network security? They prevent specified types of traffic from reaching specified network destinations. They alert network administrators to various type of denial of service attacks as they occur. They prevent viruses, worms, and Trojans from infecting host computers and servers. They enable encryption and authentication of confidential data communications. 42In the URL http://dev.cisco.com/wwwdocs/procedures.htm, what is identified by wwwdocs? the server name where the resource is located the protocol that is used for the resource request the domain name of the server that is being accessed the folder where the requested resource is stored

43

After an unsuccessful ping to the local router, the technician decides to investigate the router. The technician observes that the lig and fan on the router are not operational. In which layer of the OSI model is the problem most likely occurring? transport network data link physical 44

Refer to the exhibit. A network administrator is planning the wiring for a new installation and wants to connect three separate build that are 250 meters apart. Which type of cable should be used to connect the buildings? STP UTP serial coaxial fiber optic

45

What is the primary function of the NOC at a large ISP? installing equipment at a customer site setting up customer accounts and passwords monitoring and testing customer network connections entering customer requirements in an order-tracking database

46

A user reports being able to access the Internet but not being able to download e-mail from the mail server at the ISP. What shoul user check on the user workstation? the POP3 and SMTP server settings in the e-mail application the patch cable connections at the back of the workstation and at the wall plate the DHCP settings in the operating system the IP address, mask, and default gateway values the NIC drivers 47

Refer to the exhibit. The network administrator needs to configure the Fa0/0 interface of RTB so that hosts from RTA can connect the server that is attached to RTB. Which two commands will the administrator use to accomplish this task? (Choose two.) RTB# ip address 192.168.102.98 255.255.255.248 RTB(config-if)# ip address 192.168.102.99 255.255.255.252 RTB(config)# ip address 192.168.102.97 255.255.255.252 RTB(config)# no shutdown RTB(config-if)# no shutdown RTB(config-if)# ip address 192.168.102.97 255.255.255.252

48

What can be gained by using a caching-only DNS server? The DNS server will use more WAN bandwidth. The DNS server will only answer recursive queries. The DNS server will be authoritative for only one zone. The DNS server will resolve most queries more quickly.

49In order to load an initial configuration on a new switch, a network administrator has connected a laptop to the switch via the use o console cable. About a minute after the network administrator powers on the switch, the SYST LED on the front of the switch chan from blinking green to amber. What does this indicate? The network administrator has made an improper physical connection to the switch. The switch is ready to have a configuration file loaded. A port on the switch is bad. The switch failed POST.

50

Which statement correctly describes the function of AAA? It prevents unauthorized access to a network. It filters traffic based on destination IP and port number.

It enables users to send information to a daemon that is running on a management station. It encrypts data to provide network security. 51

Refer to the exhibit. What effect will the commands have when entered on R2? They will prevent all simultaneous in-band connections. They will permit an unlimited number of in-band connections. They will permit a maximum of five simultaneous in-band connections. They will permit a minimum of four simultaneous in-band connections with a different password on each connection.

52

Refer to the exhibit. The network administrator must set up a network with two subnets. In network A, the network administrator sele the network address 192.168.1.128/26. Which address combination should the administrator select in network B to accommodate th same number of hosts as in network A? 192.168.1.32 255.255.255.128 192.168.1.0 255.255.255.224 192.168.1.64 255.255.255.192 192.168.1.192 255.255.255.128

Potrebbero piacerti anche