Top Banner
1 When using NAT on a router, what is the term for the IP address of an inside host as it appears to the outside network? inside local inside global outside local outside global 2 In order to load an initial configuration on a new switch, a network administrator has connected a laptop to the switch via the use of a console cable. About a minute after the network administrator powers on the switch, the SYST LED on the front of the switch changes from blinking green to amber. What does this indicate? The network administrator has made an improper physical connection to the switch. The switch is ready to have a configuration file loaded. A port on the switch is bad. The switch failed POST. 3 Which routing protocol excludes the subnet information from routing updates? EIGRP OSPF RIPv1 BGP 4 Which layer of the OSI model handles common protocols and technologies including Ethernet, WLAN, Wi-Fi, ATM, and PPP? Layer 1 Layer 2 Layer 3 Layer 4 Layer 7 5
17
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1

1When using NAT on a router, what is the term for the IP address of an inside host as it appears to the outside network?inside localinside globaloutside localoutside global

2In order to load an initial configuration on a new switch, a network administrator has connected a laptop to the switch via the use of a console cable. About a minute after the network administrator powers on the switch, the SYST LED on the front of the switch changes from blinking green to amber. What does this indicate?The network administrator has made an improper physical connection to the switch.The switch is ready to have a configuration file loaded.A port on the switch is bad.The switch failed POST.

3Which routing protocol excludes the subnet information from routing updates?EIGRPOSPFRIPv1BGP

4Which layer of the OSI model handles common protocols and technologies including Ethernet, WLAN, Wi-Fi, ATM, and PPP?Layer 1Layer 2Layer 3Layer 4Layer 7

5

Page 2: 1

Refer to the exhibit. Which three IP addresses could be assigned to the hosts? (Choose three.)192.168.88.1192.168.88.8192.168.88.9192.168.88.12192.168.88.14192.168.88.15192.168.88.16192.168.88.18

6What are three features of the TCP protocol? (Choose three.)It provides retransmission of data packets if they are lost during transmission.It is a connectionless protocol.It uses a three-way handshake between the sending and receiving systems to establish each conversation.It specifies how messages are reassembled at the destination host.It requires only 8 bytes of overhead.It breaks the data packet into datagrams.

7Which combination of network address and subnet mask allows 62 hosts to be connected in a single subnet?Network address 10.1.1.4 Subnet mask 255.255.255.240Network address 10.1.1.0 Subnet mask 255.255.255.252Network address 10.1.1.0 Subnet mask 255.255.255.192Network address 10.1.1.4 Subnet mask 255.255.255.248

8What occurs during a static NAT translation?

Page 3: 1

Multiple local addresses are mapped to one global address.The host device is configured with a permanent outside global address.A one-to-one mapping is created between an inside local and outside global address.The router is forced to return the inside global address to the address pool when a session ends.

9

Refer to the exhibit. A network administrator is troubleshooting the serial connection between R1 and R2. There is no communication between R1 and R2. Based on the output of the show ip interface brief command, what is the cause of the problem?There is a misconfiguration of IP addresses.There is a mismatch of encapsulation methods.The no shutdown command should be issued on R2.The routing protocols are not compatible.

10What is a feature of PAT?It maps IP addresses to URLs.It displays private IP addresses to public networks.It sends acknowledgments of received packets.It allows multiple hosts on a single LAN to share globally unique IP addresses.

11Which protocol allows secure in-band management so that a network administrator can monitor and configure network devices without fear of any passwords being compromised?SSHHTTPSNMPTelnet

12

Page 4: 1

Refer to the exhibit. A PC has an IP address of 192.168.87.30 but is unable to contact a web server on the Internet. A network administrator is troubleshooting the DHCP configuration on a Cisco 1841 router. What is the possible error?The IP address of the PC is outside the network range.A domain name is required in the DHCP configuration.The DHCP service has not been activated.The default-router command needs to be included in the DHCP configuration.The DHCP pool has not been applied to an active interface.

13What is the maximum unrepeated distance set by industry standards for UTP cable?10 meters75 meters100 meters325 meters

14

Refer to the exhibit. The network administrator uses the command below to configure a default route on RTB:

RTB(config)# ip route 0.0.0.0 0.0.0.0 fa0/0

A ping issued from PC3 is successful to RTB. However, echo request packets arrive at PC1 but the echo replies do not make it back to PC3. What will fix this problem?RTA must be configured to forward packets to the 192.168.2.0 network.

Page 5: 1

The ip route command needs to be edited so that the next hop address is 10.1.1.5.The ip route command needs to be edited so that the 192.168.2.1 address is the next hop address.The ip route command should be removed from the RTB router configuration.Another default route should be configured on RTA with a next hop address of 10.1.1.6.

15

Refer to the exhibit. What does the highlighted value 120 represent?the number of hops between the router and network 10.0.5.0the administrative distance of the routing protocolthe UDP port number that is used for forwarding trafficthe bandwidth that is allocated to the serial interface

16

Refer to the exhibit. What is the device named "Distribution"?a firewalla routera switchan IP phone

17

Page 6: 1

Refer to the exhibit. Router R1 has been configured with the commands that are displayed. Which fact can be determined from the configuration?All passwords are encrypted.The privileged EXEC mode password is “password1.”The router can support four Telnet sessions simultaneously.The router can be accessed from the console without using any password.

18

Refer to the exhibit. A NOC technician at an ISP enters the command c:\ping 209.165.201.7. What are two reasons to use this command? (Choose two.)map the path to 209.165.201.7test reachability to 209.165.201.7locate connectivity problems along the route to 209.165.201.7identify ISPs that interconnect the NOC and remote host with IP 209.165.201.7measure the time that packets take to reach 209.165.201.7 and return to the technician's workstation

19Which statement describes a route that has been learned dynamically?It is automatically updated and maintained by routing protocols.It is unaffected by changes in the topology of the network.It has an administrative distance of 1.It is identified by the prefix C in the routing table.

20Which cable should be used to connect a PC to the console port of a Cisco router?

Page 7: 1

serialcrossoverrolloverstraight-through

21

Refer to the exhibit. Which combination of cable types should be used to complete the connection?Cable A - straight-through; Cable B - straight-through; Cable C - serialCable A - straight-through; Cable B - straight-through; Cable C - rolloverCable A - rollover; Cable B - straight-through; Cable C - crossoverCable A - straight-through; Cable B - crossover; Cable C - serial

22To manage a Cisco switch using Telnet, where would the management IP address be configured on the switch?VLAN 1 interfacefirst vty portfirst trunk portconsole portFastEthernet 0/1 interface

23

Refer to the exhibit. A user who is connected to RTA is trying to telnet to RTB, but the connection is failing. Based on the output of theshow running-config command on router RTB, why is the Telnet session failing?Telnet has not been configured on the console line.The login command has not been issued on the console line.No password has been configured on the VTY lines.

Page 8: 1

A session limit has not been configured for Telnet.

24

Refer to the exhibit. R2 is connected to the Serial0/0/1 interface of R1 and is properly configured to share routing updates with R1. Which network will R2 exclude from installing in its routing table?R 192.168.10.0/24 [120/2] via 192.168.1.2, 00:00:10, Serial0/0/1R 192.168.7.0/24 [120/1] via 192.168.1.2, 00:00:10, Serial0/0/1R 192.168.6.0/24 [120/15] via 192.168.3.2, 00:00:10, Serial0/0/0R 192.168.8.0/24 [120/2] via 192.168.3.2, 00:00:10, Serial0/0/0

25If the configuration register is currently set to 0x2102, what is the first action that a router will take after the bootstrap program loads successfully?load the IOS from flashload the IOS from NVRAMload the IOS from the TFTP serverload the startup configuration file from flashload the startup configuration file from NVRAMload the startup configuration file from the TFTP server

26How does a switch interface that uses sticky port security handle MAC addresses?The addresses are configured manually and are saved in the running configuration.They are configured manually and are not saved in the running configuration.They are configured dynamically and are saved in the running configuration.They are configured dynamically and are not saved in the running configuration.

27A network engineer is asked to specify the type of cable for a new network installation. The engineer plans horizontal cable runs of less than 90 feet (27.4 meters) using cable that is not expensive and is easy to implement. It will be positioned away from electrically noisy areas to avoid EMI. Which cable should the engineer choose?STPUTPcoaxialfiber optic

28

Page 9: 1

A network is spread across two buildings that are separated by a distance of 500 feet (152 meters). An electrical transformer is installed near the cable route. Which type of cable should be used in this network?STPUTPcoaxialfiber-optic

29In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another?destination network addresssource network addresssource MAC addresswell known port destination address

30A network technician is using a network management station to gather data about the performance of devices and links within the ISP. Which application layer protocol makes this possible?SNMPFTPDHCPSMTP

31How do port filtering and access lists help provide network security?They prevent specified types of traffic from reaching specified network destinations.They alert network administrators to various type of denial of service attacks as they occur.They prevent viruses, worms, and Trojans from infecting host computers and servers.They enable encryption and authentication of confidential data communications.

32In the URL http://dev.cisco.com/wwwdocs/procedures.htm, what is identified by wwwdocs?the server name where the resource is locatedthe protocol that is used for the resource requestthe domain name of the server that is being accessedthe folder where the requested resource is stored

33What are two purposes of DNS? (Choose two.)to dynamically assign IP addressing information to network hoststo simplify the administration of host and default gateway addressing on client computersto assign TCP port numbers to hosts as part of the data transfer processto resolve human-readable domain names to numeric IP addressesto replace the static HOSTS file with a more practical dynamic system

34As a host prepares a message for communication, a header and trailer are added and the data is placed on the medium for transmission to the next directly connected device. At

Page 10: 1

which two layers of the OSI model do these activities occur? (Choose two.)sessionnetworkphysicaltransportdata linkapplicationpresentation

35Which two procedures are solutions if a duplex mismatch error is discovered on a switch port that is connected to a server NIC? (Choose two.)Replace the NIC on the server.Set the server NIC to half-duplex.Set the speed and duplex to match on both devices.Power cycle both devices to reinitialize the autonegotiation process.Set both the switch port and the server NIC to autonegotiate speed and duplex.Change the cable that connects the server and the switch to a crossover cable.

36Which protocol allows encryption of any application layer protocol?FTPFTPSHTTPSIPsecTelnet

37Which application can be delivered using UDP?FTPDNSHTTPSMTP

38

Refer to the exhibit. Which two statements describe the data conversation shown? (Choose two.)The data conversation was started by the HTTP application process running on the client.The data conversation is identified by TCP port 80 on the client.

Page 11: 1

The user started the data conversation by sending an e-mail.The IP address of the Internet server is 192.168.17.43.The Internet server will send data to port 8547 on the client.

39Which WAN service provides point-to-point connections with a predefined communications path?E1T1dialupleased line

40

Refer to the exhibit. The S0/0/0 interface of R2 is configured correctly with the default encapsulation. Which configuration should be implemented at the S0/0/0 interface of R1 to complete the connection between the two routers?R1(config-if)# ip address 192.168.1.31 255.255.255.252R1(config-if)# no shutdownR1(config-if)# ip address 192.168.1.33 255.255.255.252R1(config-if)# encapsulation PPPR1(config-if)# no shutdownR1(config-if)# ip address 192.168.1.28 255.255.255.252R1(config-if)# encapsulation PPPR1(config-if)# no shutdownR1(config-if)# ip address 192.168.1.29 255.255.255.252R1(config-if)# no shutdown

41When selecting a WAN service, a customer estimates that it may need about 20 Mb/s of the upstream bandwidth to support various server services on the Internet. Which WAN connection should the network designer recommend?T1DSLATMFrame Relayfractional T3

42The command copy tftp running-config has been entered on the router. What will this

Page 12: 1

command do?copy the configuration in RAM to a servercopy the configuration file from a server to RAMcopy the configuration file in NVRAM to RAMcopy the configuration file in NVRAM to a servercopy the configuration file from a server to NVRAM

43A company has formed a team that must analyze the probability of a disaster occurring and the associated effects and costs to their business. Which step of the disaster recovery plan is the team tasked with completing?risk assessmentvulnerability assessmentdisaster scenario prioritizationdisaster recovery strategy development

44Which statement correctly describes the function of AAA?It prevents unauthorized access to a network.It filters traffic based on destination IP and port number.It enables users to send information to a daemon that is running on a management station.It encrypts data to provide network security.

45Which statement correctly describes the difference between HTTP and HTTPS?The maximum number of simultaneous connections that a server can support for HTTPS is more than for HTTP.HTTPS and HTTP use different client request-server response processes.HTTPS authenticates and encrypts the data being transferred between the client and the web server.HTTPS specifies the rules for passing data between the physical layer and the data link layer.

46What routing protocol would be appropriate to use for exchanging routes between ISPs?RIPv2BGPOSPFEIGRP

47A user reports being able to access the Internet but not being able to download e-mail from the mail server at the ISP. What should the user check on the user workstation?the POP3 and SMTP server settings in the e-mail applicationthe patch cable connections at the back of the workstation and at the wall platethe DHCP settings in the operating systemthe IP address, mask, and default gateway valuesthe NIC drivers

48What is the primary function of a Level 1 support technician in an ISP help desk

Page 13: 1

department with multiple levels of customer support?to install hardware replacements for the customerto accompany an on-site technician to provide additional technical supportto diagnose and document the symptoms of hardware, software, and system problemsto design network enhancements that support the new technology requirements of the customer

49A user reports being unable to access the Internet. The help desk technician employs a bottom-up approach to troubleshooting. The technician first has the user check the patch cable connection from the PC to the wall, and then has the user verify that the NIC has a green link light. What will the technician have the user do next?Enter an IP address into the WWW browser address bar to see if DNS is at fault.Use traceroute to identify the device along the path to the ISP that may be at fault.Verify the IP address, subnet, and gateway settings using ipconfig on the PC.Connect to the user home router to check firewall settings for blocked TCP ports.

51A customer reports connectivity problems to an ISP technician. Upon questioning the customer, the technician discovers that all network applications are functioning except for FTP. What should the technician suspect is the problem?misconfigured firewallbad port on switch or hubmisconfigured IP addressing on the customer's workstationwrong DNS server configured on the customer's workstationwrong default gateway configured on the customer's workstation

52What is used by a routing protocol to determine the best path to include in the routing table?Convergence timeDefault distanceMetricType of router