tag:blogger.com,1999:blog-43623557892134853902024-03-04T21:45:24.092-08:00CCNA Discovery 4.1 - CCNA Discovery Answers - CCNA 4.1 AnswersCCNA Discovery Answers, CCNA 4.1 Answers, CCNA Discovery 4.0 Answers, CCNA Discovery 4.1 Answers, CCNA 4.1 Answer Chapter 1, CCNA 4.1 Answer Chapter 2, CCNA 4.1 Answer Chapter 3, CCNA 4.1 Answer Chapter 4, CCNA 4.1 Answer Chapter 5, CCNA 4.1 Answer Chapter 6, CCNA 4.1 Answer Chapter 7, CCNA 4.1 Answer Chapter 8, CCNA 4.1 Answer Chapter 9Unknownnoreply@blogger.comBlogger49125tag:blogger.com,1999:blog-4362355789213485390.post-80568240985080324332009-09-24T23:36:00.002-07:002009-10-10T00:31:30.700-07:00CCNA Discovery 2 Chapter 8 V4.1<span style="font-weight: bold;">1. Which AAA service reduces IT operating costs by providing detailed reporting and monitoring of network user behavior, and also by keeping a record of every access connection and device configuration change across the network?</span><br /><br />authentication<br />accreditation<br />**accounting<br />authorization<br /><br /><br /><span style="font-weight: bold;">2. Which three items are normally included when a log message is generated by a syslog client and forwarded to a syslog server? (Choose three.)</span><br /><br />**date and time of message<br />**ID of sending device<br />length of message<br />**message ID<br />checksum field<br />community ID<br /><br /><br /><span id="fullpost"><span style="font-weight: bold;">3. What is the advantage of using WPA to secure a wireless network?</span><br /><br />It uses a 128-bit pre-shared hexadecimal key to prevent unauthorized wireless access.<br />**It uses an advanced encryption key that is never transmitted between host and access point.<br />It is supported on older wireless hardware, thus providing maximum compatibility with enterprise equipment.<br />It requires the MAC address of a network device that is requesting wireless access to be on a list of approved MAC addresses.<br /><br /><br /><span style="font-weight: bold;">4. A company wants to configure a firewall to monitor all channels of communication and allow only traffic that is part of a known connection. Which firewall configuration should be deployed?</span><br /><br />packet filtering<br />proxy<br />**stateful packet inspection<br />stateless packet inspection<br /><br /><br /><span style="font-weight: bold;">5. A server log includes this entry: User student accessed host server ABC using Telnet yesterday for 10 minutes. What type of log entry is this?</span><br /><br />authentication<br />authorization<br />**accounting<br />accessing<br /><br /><br /><span style="font-weight: bold;">6. What two measures help to verify that server backups have been reliably completed? (Choose two.)</span><br /><br />**reviewing backup logs<br />**performing trial backups<br />performing full backups only<br />replacing tape backup with hard disk-based backup<br />using an autoloader when backups require more than one tape<br /><br /><br /><span style="font-weight: bold;">7. Which means of communication does an SNMP network agent use to provide a network management station with important but unsolicited information?</span><br /><br />query<br />broadcast<br />ICMP ping<br />**trap<br />poll<br /><br /><br /><span style="font-weight: bold;">8. Which three protocols are used for in-band management? (Choose three.)</span><br /><br />FTP<br />**HTTP<br />**SNMP<br />**Telnet<br />TFTP<br />DHCP<br /><br /><br /><span style="font-weight: bold;">9. A hacker has gained access to sensitive network files. In analyzing the attack, it is found that the hacker gained access over a wireless segment of the network. It is further discovered that the only security measure in place on the wireless network is MAC Address Filtering. How is it likely that the hacker gained access to the network?</span><br /><br />The hacker used a software tool to crack the shared hexadecimal wireless key.<br />**The hacker obtained the MAC address of a permitted host, and cloned it on his wireless laptop NIC.<br />The attacker mounted a denial of service attack to overwhelm the firewall before penetrating the wireless LAN.<br />The hacker gained wireless access to the MAC address database and added his own MAC address to the list of permitted addresses.<br /><br /><br /><span style="font-weight: bold;">10. A network administrator is assigning network permissions to new groups of users and employing the principle of least privilege. Which two actions should the administrator take? (Choose two.)</span><br /><br />**Provide users with only the access to resources required to do their jobs.<br />**Provide the minimum level of permissions required for users to do their jobs.<br />Remove all permissions from the users and grant permissions as they are requested.<br />Allow users to decide how much permission they need to accomplish their job tasks.<br />Provide full access to the users and gradually remove privileges over time.<br /><br /><br /><span style="font-weight: bold;">11. Which three protocols describe methods that can be used to secure user data for transmission across the internet? (Choose three.)</span><br /><br />SMTP<br />**IPSEC<br />**SSL<br />**HTTPS<br />FTP<br />TFTP<br /><br /><br /><span style="font-weight: bold;">12. Which benefit does SSH offer over Telnet when remotely managing a router?</span><br /><br />**encryption<br />TCP usage<br />authorization<br />connection using six VTY lines<br /><br /><br /><span style="font-weight: bold;">13. Which of the following does SNMP use to hold information collected about the network?</span><br /><br />network management station<br />network management database<br />**management information base<br />database information agent<br /><br /><br /><span style="font-weight: bold;">14. What are two potential problems with using tape media to back up server data? (Choose two.)</span><br /><br />Tape is not a cost-effective means of backing up data.<br />Data tapes are difficult to store offsite.<br />**Data tapes are prone to failure and must be replaced often.<br />**Tape drives require regular cleaning to maintain reliability.<br />Backup logs are not available with tape backup solutions.<br /><br /><br /><span style="font-weight: bold;">15. What is the term for the public network between the boundary router and the firewall?</span><br /><br />"clean" LAN<br />intranet<br />**DMZ<br />extranet<br /><br /><br /><span style="font-weight: bold;">16. Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)</span><br /><br />applications<br />physical addresses<br />packet size<br />**ports<br />**protocols<br /><br /><br /><span style="font-weight: bold;">17. When is the use of out-of-band network management necessary?</span><br /><br />when a server needs to be monitored across the network<br />**when the management interface of a device is not reachable across the network<br />when enhanced monitoring features are required to gain an overall view of the entire network<br />when it is desirable to use the information that is provided by SNMP<br /><br /><br /><span style="font-weight: bold;">18. What network layer security protocol can secure any application layer protocol used for communication?</span><br /><br />HTTPS<br />IMAP<br />FTPS<br />**IPSEC<br />TLS<br /><br /><br /><span style="font-weight: bold;">19. Before a technician upgrades a server, it is necessary to back up all data. Which type of backup is necessary to ensure that all data is backed up?</span><br /><br />daily<br />differential<br />**full<br />incremental<br />partial<br /><br /><br /><span style="font-weight: bold;">20. What AAA component assigns varying levels of rights to users of network resources?</span><br /><br />auditing<br />accounting<br />**authorization<br />access control<br />authentication<br />acknowledgement</span>Unknownnoreply@blogger.com16tag:blogger.com,1999:blog-4362355789213485390.post-2767317434625756592009-09-24T23:36:00.001-07:002009-09-24T23:36:56.307-07:00CCNA Discovery 2 Chapter 6 V4.1<span style="font-weight: bold;">1. Which command is used to view the RIP routing protocol settings and configuration?</span><br /><br />show version<br />show ip route<br />show interface<br />**show ip protocols<br /><br /><br /><span style="font-weight: bold;">2. Refer to the exhibit. What is the maximum number of RIP routers that could separate HostA and HostB and still leave the hosts with connectivity to each other?</span><br /><br />14<br />15<br />**16<br />17<br /><br /><br /><span id="fullpost"><span style="font-weight: bold;">3. In which situation would a company register for its own autonomous system number (ASN)?</span><br /><br />when the company's ISP adds connection points to the Internet<br />when additional routers are added to the corporate internetwork<br />when more than one interior routing protocol is used<br />**when the company uses two or more ISPs<br /><br /><br /><span style="font-weight: bold;">4. Consider this routing table entry</span><br /><br />R 172.16.1.0/24 [120/1] via 200.1.1.1 00:00:27 Serial0/1<br /><br />What type of route is this?<br /><br />a static route<br />a default route<br />**a RIP route<br />an OSPF route<br />an EIGRP route<br />a directly-connected route<br /><br /><br /><span style="font-weight: bold;">5. What is the difference between interior and exterior routing protocols?</span><br /><br />Exterior routing protocols are only used by large ISPs. Interior routing protocols are used by small ISPs.<br />Interior routing protocols are used to route on the Internet. Exterior routing protocols are used inside organizations.<br />Exterior routing protocols are used to administer a single autonomous system. Interior routing protocols are used to administer several domains.<br />**Interior routing protocols are used to communicate within a single autonomous system. Exterior routing protocols are used to communicate between multiple autonomous systems.<br /><br /><br /><span style="font-weight: bold;">6. What information is included in RIPv2 routing updates that is not included in RIPv1 updates?</span><br /><br />metric<br />**subnet mask<br />area identification<br />hop count<br />autonomous system number<br /><br /><br /><span style="font-weight: bold;">7. Which routing protocol is used to exchange data between two different ISPs?</span><br /><br />**BGP<br />EIGRP<br />OSPF<br />RIP v2<br /><br /><br /><span style="font-weight: bold;">8. Refer to the exhibit. Which configuration command or commands contributed to the output that is shown?</span><br /><br />routerA(config-router)# no version 2<br />routerA(config)# interface fa0/0<br /> routerA(config-if)# ip address 172.19.0.0 255.255.0.0<br />**routerA(config-router)# network 192.168.3.0<br />routerA(config)# no ip default-gateway<br /><br /><br /><span style="font-weight: bold;">9. Refer to the exhibit. If all routers are running RIP and network 10.0.0.0 goes down, when will R3 learn that the network is no longer available?</span><br /><br />in 30 seconds<br />in 60 seconds<br />in 90 seconds<br />**Immediately<br /><br /><br /><span style="font-weight: bold;">10. What statement is true regarding an AS number?</span><br /><br />AS numbers are controlled and registered for Internet use.<br />Interior routing protocols require registered AS numbers.<br />ISPs require all customers to have registered AS numbers.<br />All routers at an ISP must be assigned the same AS number.<br /><br /><br /><span style="font-weight: bold;">11. What is the purpose of the network command used when configuring RIP?</span><br /><br />to specify whether RIPv1 or RIPv2 will be used as the routing protocol<br />to allow the router to monitor RIP updates that occur on other routers<br />**to identify which networks on the router will send and receive RIP updates<br />to configure the IP address on an interface that will use RIP<br />to identify all of the remote networks that should be reachable from the router<br /><br /><br /><span style="font-weight: bold;">12. Which command would a network administrator use to determine if the routers in an enterprise have learned about a newly added network?</span><br /><br />router# show ip address<br />router# show ip route<br />**router# show ip networks<br />router# show ip interface brief<br />router# debug ip protocol<br />router# debug rip update<br /><br /><br /><span style="font-weight: bold;">13. What is the purpose of a routing protocol?</span><br /><br />It is used to build and maintain ARP tables.<br />It provides a method for segmenting and reassembling data packets.<br />It allows an administrator to devise an addressing scheme for the network.<br />**It allows a router to share information about known networks with other routers.<br />It provides a procedure for encoding and decoding data into bits for packet forwarding.<br /><br /><br /><span style="font-weight: bold;">14. What device enables an ISP to connect with other ISPs to transfer data?</span><br /><br />**border gateway router<br />DSLAM<br />web server<br />interior router<br /><br /><br /><span style="font-weight: bold;">15. Which command will display RIP routing updates as they are sent and received?</span><br /><br />show ip route<br />show ip rip<br />debug ip rip<br />show ip protocols<br />**show ip rip database<br /><br /><br /><span style="font-weight: bold;">16. Which part of an IP packet does the router use to make routing decisions?</span><br /><br />source IP address<br />source MAC address<br />**destination IP address<br />destination MAC address<br /><br /><br /><span style="font-weight: bold;">17. What two types of businesses would benefit from registering as their own autonomous systems? (Choose two.)</span><br /><br />a home business with one ISP connection<br />**a global business with connections to multiple local ISPs<br />**a medium-sized nationwide business with Internet connectivity through different ISPs<br />a large enterprise with two connections to the same ISP<br />a small ISP with a single Internet connection through a larger ISP<br /><br /><br /><span style="font-weight: bold;">18. Which command will display RIP activity as it occurs on a router?</span><br /><br />debug ip rip<br />show ip route<br />show ip interface<br />show ip protocols<br />debug ip rip config<br />**show ip rip database<br /><br /><br /><span style="font-weight: bold;">19. Why is fast convergence desirable in networks that use dynamic routing protocols?</span><br /><br />**Routers will not allow packets to be forwarded until the network has converged.<br />Hosts are unable to access their gateway until the network has converged.<br />Routers may make incorrect forwarding decisions until the network has converged.<br />Routers will not allow configuration changes to be made until the network has converged.<br /><br /><br /><span style="font-weight: bold;">20. Which two statements describe static routes? (Choose two.)</span><br /><br />They are created in interface configuration mode.<br />**They require manual reconfiguration to accommodate network changes.<br />They automatically become the default gateway of the router.<br />**They are identified in the routing table with the prefix S<br />They are automatically updated whenever an interface is reconfigured or shutdown.<br /><br /><br /><span style="font-weight: bold;">21. Which two statements or sets of statements describe differences between link-state and distance vector routing protocols? (Choose two.)</span><br /><br />Link-state routing protocols routinely use more bandwidth for updates than do distance vector routing protocols.<br />Distance vector routing protocols update all routers at one time. Link-state routing protocols update one router at a time.<br />**Link-state routers only know about directly connected routers. Distance vector routers know about every router in the network.<br />**Link-state routing protocols update when a change is made. A network using distance vector routing protocols only updates at a specific interval.<br />Distance vector routing protocols have limited information about the entire network. Link state routing protocols know about all routers in the network.<br />In case of similar topologies, networks using link-state routing protocols typically converge more rapidly than do networks using distance vector routing protocols.<br /><br /><br /><span style="font-weight: bold;">22. Which protocol is an exterior routing protocol?</span><br /><br />**BGP<br />EIGRP<br />OSPF<br />RIP<br /><br /><br /><span style="font-weight: bold;">23. Hosts on two separate subnets cannot communicate. The network administrator suspects a missing route in one of the routing tables. Which three commands can be used to help troubleshoot Layer 3 connectivity issues? (Choose three.)</span><br /><br />**Ping<br />show arp<br />**Traceroute<br />**show ip route<br />show interface<br />show cdp neighbor detail<br /><br /><br /><span style="font-weight: bold;">24. What term refers to a group of networks that uses the same internal routing policies and is controlled by a single administrative authority?</span><br /><br />Internet<br />intranet<br />virtual private network<br />**autonomous system </span>Unknownnoreply@blogger.com2tag:blogger.com,1999:blog-4362355789213485390.post-24983684186408776972009-09-24T23:33:00.002-07:002009-09-24T23:35:15.969-07:00CCNA Discovery 2 Chapter 5 V4.1<span style="font-weight: bold;">1. In what two ways does SDM differ from the IOS CLI? (Choose two.)</span><br /><br />**SDM is used for in-band management only. The IOS CLI can be used for in-band and out-of-band management.<br />SDM is accessed through a Telnet application. The IOS CLI is accessed through a web browser.<br />SDM is available for all router platforms. The IOS CLI is available for a limited number of Cisco devices.<br />**SDM utilizes GUI buttons and text boxes. The IOS CLI requires the use of text-based commands.<br />SDM is used for advanced configuration tasks. The IOS CLI is preferred for initial basic device configuration.<br /><br /><br /><span style="font-weight: bold;">2. Which mode will a configured router display at login?</span><br /><br />global configuration mode<br />setup mode<br />ROM monitor mode<br />**user EXEC mode<br /><br /><br /><span id="fullpost"><span style="font-weight: bold;">3. Refer to the exhibit. Which password or passwords will be encrypted as a result of the configuration that is shown?</span><br /><br />virtual terminal only<br />enable mode only<br />console and virtual terminal only<br />enable mode and virtual terminal<br />only the service password<br />**all configured passwords<br /><br /><br /><span style="font-weight: bold;">4. Refer to the exhibit. Which three sets of commands are required to enable administrators to connect to the Switch1 console over Telnet for configuration and management? (Choose three.)</span><br /><br />**Switch1(config)# interface fa0/1<br /> Switch1(config-if)# ip address 192.168.2.64 255.255.255.192<br />**Switch1(config)# interface fa0/1<br /> Switch1(config-if)# ip address 192.168.2.66 255.255.255.192<br />**Switch1(config)# interface vlan 1<br /> Switch1(config-if)# ip address 192.168.2.126 255.255.255.192<br /> Switch1(config-if)# no shutdown<br />Switch1(config)# line vty 0 4<br /> Switch1(config-line)# enable password cisco<br /> Switch1(config-line)# login<br />Switch1(config)# line vty 0 15<br /> Switch1(config-line)# password cisco<br /> Switch1(config-line)# login<br />Switch1(config)# ip default-gateway 192.168.2.65<br /><br /><br /><span style="font-weight: bold;">5. How does the SYST LED on the catalyst 2960 switch indicate a POST failure?</span><br /><br />blinks rapidly amber<br />blinks rapidly green<br />**steady amber<br />steady green<br /><br /><br /><span style="font-weight: bold;">6. Refer to the exhibit. A company always uses the last valid IP address in a subnetwork as the IP address of the router LAN interface. A network administrator is using a laptop to configure switch X with a default gateway. Assuming that the switch IP address is 192.168.5.147/24, what command will the administrator use to assign a default gateway to the switch?</span><br /><br />**X(config)# ip default-gateway 192.168.5.254<br />X(config)# ip gateway 192.168.5.1<br />X(config)# ip route 0.0.0.0 0.0.0.0 192.168.5.1<br />X(config)# ip default-route 192.168.5.1<br />X(config)# ip route 192.168.5.254 255.255.255.0 fastethernet 0/0<br /><br /><br /><span style="font-weight: bold;">7. A technician has made changes to the configuration of a router. What command will allow the technician to view the current configuration before he saves the changes?</span><br /><br />**router# show running-config<br />router# show startup-config<br />router# show flash<br />router# show version<br /><br /><br /><span style="font-weight: bold;">8. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)</span><br /><br />**VTY interface<br />**console interface<br />Ethernet interface<br />secret EXEC mode<br />**privileged EXEC mode<br />router configuration mode<br /><br /><br /><span style="font-weight: bold;">9. To save time, IOS commands may be partially entered and then completed by typing which key or key combination?</span><br /><br />**Tab<br />Ctrl-P<br />Ctrl-N<br />Up Arrow<br />Right Arrow<br />Down Arrow<br /><br /><br /><span style="font-weight: bold;">10. What is the correct command sequence to configure a router host name to 'LAB_A'?</span><br /><br />**Router> enable<br /> Router# configure terminal<br /> Router(config)# hostname LAB_A<br />Router> enable<br /> Router# hostname LAB_A<br />Router> enable<br /> Router# configure router<br /> Router(config)# hostname LAB_A<br />Router> enable<br /> Router(config)# host name LAB_A<br /><br /><br /><span style="font-weight: bold;">11. Refer to the exhibit. From the router console, an administrator is unable to ping a Catalyst switch that is located in another building. What can the administrator do from her location to check the IP configuration of the attached switch?</span><br /><br />Open an SDM session with the switch from her desktop.<br />Telnet to the switch from the router console.<br />**Use the show cdp neighbors detail command from the router console.<br />The administrator must go to the switch location and make a console connection to check these settings.<br /><br /><br /><span style="font-weight: bold;">12. Which two options must be selected in SDM Express to enable a router serial interface to obtain an IP address automatically? (Choose two.)</span><br /><br />**Easy IP (IP negotiated)<br />IP unnumbered<br />No IP address<br />HDLC encapsulation<br />Frame Relay encapsulation<br />**PPP encapsulation<br /><br /><br /><span style="font-weight: bold;">13. What three settings can be made in the SDM Express basic configuration screen? (Choose three.)</span><br /><br />**host name<br />DHCP options<br />**domain name<br />interface IP addresses<br />**enable secret password<br />DNS server IP addresses<br /><br /><br /><span style="font-weight: bold;">14. Which tasks can be accomplished by using the command history feature? (Choose two.)</span><br /><br />View a list of commands entered in a previous session.<br />Recall up to 15 command lines by default.<br />**Set the command history buffer size.<br />**Recall previously entered commands.<br />Save command lines in a log file for future reference.<br /><br /><br /><span style="font-weight: bold;">15. What option within Cisco SDM Express must be configured to allow hosts that receive IP address settings from the router to resolve names on the network or Internet?</span><br /><br />**host name<br />domain name<br />DHCP address pool<br />**DNS server IP address<br /><br /><br /><span style="font-weight: bold;">16. Which three encapsulation types can be set on a serial interface by an administrator who is using SDM Express? (Choose three.)</span><br /><br />ATM<br />CHAP<br />**Frame Relay<br />**HDLC<br />PAP<br />**PPP<br /><br /><br /><span style="font-weight: bold;">17. Which command will display routing table information about all known networks and subnetworks?</span><br /><br />Router# show ip interfaces<br />Router# show ip connections<br />**Router# show ip route<br />Router# show ip networks<br /><br /><br /><span style="font-weight: bold;">18. A network administrator needs to configure a router. Which of the following connection methods requires network functionality to be accessible?</span><br /><br />console<br />AUX<br />**Telnet<br />modem<br /><br /><br /><span style="font-weight: bold;">19. Which three pieces of information about a neighbor device can be obtained by the show cdp neighbors command? (Choose three.)</span><br /><br />**platform<br />routing protocol<br />**connected interface of neighbor device<br />**device ID<br />IP addresses of all interfaces<br />enable mode password<br /><br /><br /><span style="font-weight: bold;">20. Which function is a unique responsibility of the DCE devices shown in the exhibit?</span><br /><br />transmission of data<br />reception of data<br />**clocking for the synchronous link<br />noise cancellation in transmitted data<br /><br /><br /><span style="font-weight: bold;">21. Which of the following are functions of NVRAM? (Choose two.)</span><br /><br />stores the routing table<br />**retains contents when power is removed<br />**stores the startup configuration file<br />contains the running configuration file<br />stores the ARP table<br /><br /><br /><span style="font-weight: bold;">22. Refer to the exhibit. Which series of commands will enable users who are attached to Router1 to access the remote server?</span><br /><br />Router1(config)# interface S0/0/0<br /> Router1(config-if)# ip address 64.100.0.129 255.255.255.252<br /> Router1(config-if)# clock rate 64000<br /> Router1(config-if)# no shutdown<br />Router1(config)# interface S0/0/0<br /> Router1(config-if)# ip address 64.100.0.125 255.255.255.252<br /> Router1(config-if)# no shutdown<br />Router1(config)# interface S0/0/0<br /> Router1(config-if)# ip address 64.100.0.125 255.255.255.252<br /> Router1(config-if)# clock rate 64000<br /> Router1(config-if)# no shutdown<br />**Router1(config)# interface S0/0/0<br /> Router1(config-if)# ip address 64.100.0.129 255.255.255.252<br /> Router1(config-if)# no shutdown<br /><br /><br /><span style="font-weight: bold;">23. A network technician is attempting to add an older workstation to a Cisco switched LAN. The technician has manually configured the workstation to full-duplex mode in order to enhance the network performance of the workstation. However, when the device is attached to the network, performance degrades and excess collision are detected. What is the cause of this problem?</span><br /><br />The host is configured in a different subnet from the subnet of the switch.<br />**There is a duplex mismatch between the workstation and switch port.<br />The switch port is running at a different speed from the speed of the workstation NIC.<br />The host has been configured with a default gateway that is different from that of the switch.<br /><br /><br /><span style="font-weight: bold;">24. Which of the following statements are true regarding the user EXEC mode? (Choose two.)</span><br /><br />All router commands are available.<br />**Global configuration mode can be accessed by entering the enable command.<br />A password can be entered to allow access to other modes.<br />Interfaces and routing protocols can be configured.<br />**Only some aspects of the router configuration can be viewed.<br /><br /><br /><span style="font-weight: bold;">25. Which command turns on a router interface?</span><br /><br />Router(config-if)# enable<br />Router(config-if)# no down<br />Router(config-if)# s0 active<br />Router(config-if)# interface up<br />**Router(config-if)# no shutdown </span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4362355789213485390.post-69625637949347893392009-09-24T23:33:00.001-07:002009-09-24T23:35:27.529-07:00CCNA Discovery 2 Chapter 4 V4.1<p><span style="font-weight: bold;">1. In an 8 bit binary number, what is the total number of combinations of the eight bits?</span><br /><br />128<br />254<br />255<br />**256<br />512<br />1024<br /><br /><br /><span style="font-weight: bold;">2. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.</span><br /><br />11110010<br />11011011<br />11110110<br />**11100111<br />11100101<br />11101110<br /><br /><br /><span id="fullpost"><span style="font-weight: bold;">3. How many usable hosts are available given a Class C IP address with the default subnet mask?</span><br /><br />**254<br />255<br />256<br />510<br />511<br />512<br /><br /><br /><span style="font-weight: bold;">4. Which statement describes NAT overload or PAT?</span><br /><br />Each internal address is dynamically translated to an individual external IP address.<br />A single internal address is always translated to the same unique external IP address.<br />**Many internal addresses can be translated to a single IP address using different port assignments.<br />Many internal addresses are statically assigned a single IP address and port to use for communications.<br /><br /><br /><span style="font-weight: bold;">5. Which IPv4 class of addresses provides the most networks?</span><br /><br />Class A<br />Class B<br />**Class C<br />Class D<br />Class E<br /><br /><br /><span style="font-weight: bold;">6. Which statement accurately describes public IP addresses?</span><br /><br />Public addresses cannot be used within a private network.<br />**Public IP addresses must be unique across the entire Internet.<br />Public addresses can be duplicated only within a local network.<br />Public IP addresses are only required to be unique within the local network.<br />Network administrators are free to select any public addresses to use for network devices that access the Internet.<br /><br /><br /><span style="font-weight: bold;">7. Which two statements describe classful IP addresses? (Choose two.)</span><br /><br />It is possible to determine which class an address belongs to by reading the first bit.<br />**The number of bits used to identify the hosts is fixed by the class of the network.<br />Only Class A addresses can be represented by high-order bits 100.<br />Up to 24 bits can make up the host portion of a Class C address.<br />**Up to 24 bits can be used to identify unique networks.<br />Three of the five classes of addresses are reserved for multicasts and experimental use.<br /><br /><br /><span style="font-weight: bold;">8. Company XYZ uses a network address of 192.168.4.0. It uses the mask of 255.255.255.224 to create subnets. What is the maximum number of usable hosts in each subnet?</span><br /><br />6<br />14<br />**30<br />62<br /><br /><br /><span style="font-weight: bold;">9. hat is the network broadcast address for a Class C address of 192.168.32.0 with the default subnet mask?</span><br /><br />192.168.0.0<br />192.168.0.255<br />192.168.32.0<br />192.168.32.254<br />**192.168.32.255<br /><br /><br /><span style="font-weight: bold;">10. Refer to the exhibit. Host A is connected to the LAN, but it cannot get access to any resources on the Internet. The configuration of the host is shown in the exhibit. What could be the cause of the problem?</span><br /><br />The host subnet mask is incorrect.<br />The default gateway is a network address.<br />The default gateway is a broadcast address.<br />**The default gateway is on a different subnet from the host.<br /><br /><br /><span style="font-weight: bold;">11. IPv6 increases the IP address size from 32 bits to how many bits?</span><br /><br />64<br />96<br />**128<br />192<br />256<br />512<br /><br /><br /><span style="font-weight: bold;">12. What is the range of the first octet in a Class B address?</span><br /><br />127 to 191<br />127 to 192<br />**128 to 191<br />128 to 192<br /><br /><br /><span style="font-weight: bold;">13. Which IPv4 class provides the highest number of host addresses per network?</span><br /><br />**Class A<br />Class B<br />Class C<br />Class D<br />Class E<br /><br /><br /><span style="font-weight: bold;">14. refer to the exhibit. Which range of IP addresses would allow hosts that are connected to the Router1 Fa0/0 interface to access outside networks?</span><br /><br />192.168.1.0 through 192.168.1.95<br />**192.168.1.66 through 192.168.1.94<br />192.168.1.66 through 192.168.1.96<br />192.168.1.0 through 192.168.1.127<br />192.168.1.66 through 192.168.1.128<br /><br /><br /><span style="font-weight: bold;">15 Which option shows the proper notation for an IPv6 address?</span><br /><br />2001,0db8,3c55,0015,abcd,ff13<br />2001-0db8-3c55-0015-abcd-ff13<br />2001.0db8.3c55.0015.abcd.ff13<br />**2001:0db8:3c55:0015::abcd:ff13<br /><br /><br /><span style="font-weight: bold;">16. What are two reasons that NAT was developed? (Choose two.)</span><br /><br />to preserve registered public IP addresses<br />to allow users on the public Internet to access local networks<br />**to provide a method for privately addressed LANs to participate in the Internet<br />to make routing protocols operate more efficiently<br />**to allow private addresses to be routed on the public Internet<br />to reduce overhead and CPU usage on gateway routers<br /><br /><br /><span style="font-weight: bold;">17. What must happen for a privately addressed host on an inside local network to be able to communicate with an outside destination host on the Internet?</span><br /><br />The host IP address must be translated to an outside private address.<br />The host IP address must be translated to an inside local address.<br />The host IP address must be translated to an outside local address.<br />**The host IP address must be translated to an inside global address.<br /><br /><br /><span style="font-weight: bold;">18. Which port numbers are used by PAT to create unique global addresses?</span><br /><br />255 and below<br />1024 and below<br />**1025 and above<br />64,000 and above<br /><br /><br /><span style="font-weight: bold;">19. Static NAT works by mapping a specific inside local IP address to what other specific address type?</span><br /><br />**inside global<br />outside local<br />outside global<br />private IP address<br /><br /><br /><span style="font-weight: bold;">20. What are three advantages of NAT implementations? (Choose three.)</span><br /><br />**improved security<br />improved router performance<br />decreased processor load<br />**improved scalability<br />universal application compatibility<br />**sharing few public IP addresses with many hosts </span></p>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4362355789213485390.post-35131229584579284622009-09-24T23:32:00.002-07:002009-09-24T23:35:38.186-07:00CCNA Discovery 2 Chapter 3 V4.1<span style="font-weight: bold;">1. Which two benefits can be gained by locating network equipment in a telecommunications closet, rather than in a user area? (Choose two.)</span><br /><br />faster communication speeds<br />**improved physical security<br />more resistant to hacker attempts<br />**centralized cable management<br />less electrical usage<br /><br /><br /><span style="font-weight: bold;">2. Which three issues should be noted on the technician's site survey report? (Choose three.)</span><br /><br />**unlabeled cables<br />only two power outlets per wall in each room<br />**poor physical security of network devices<br />horizontal cabling runs under 100 meters<br />**lack of UPS for critical devices<br />two users sharing the same computer<br /><br /><br /><span id="fullpost"><span style="font-weight: bold;">3. Which two types of cable are used for initial router configuration? (Choose two.)</span><br /><br />serial cable<br />**rollover cable<br />straight-through cable<br />crossover cable<br />patch cable<br />**console cable<br /><br /><br /><span style="font-weight: bold;">4. In addition to the inventory sheet, what other information about the hosts and networking equipment should be documented by the on-site technician while performing the site survey?</span><br /><br />any obsolete office equipment being stored<br />all product keys for site license software<br />**any planned growth anticipated in the near future<br />the memory requirements for installed application software<br /><br /><br /><span style="font-weight: bold;">5. Refer to the exhibit. What type of device is used to connect two networks?</span><br /><br />hub<br />**router<br />switch<br />access point<br /><br /><br /><span style="font-weight: bold;">6. It is said that the goal for availability of a communications system is "five-9s". What is meant by this?</span><br /><br />A down time of .00001% is unacceptable.<br />**A network needs to be available 99.999% of the time.<br />Five percent of all network expense covers 99% of user requirements.<br />The most critical time for network availability is from 9:00 to 5:00 p.m. five days a week.<br />The best time to do maintenance on a network is from 5:00 p.m. to 9:00 a.m. five days a week.<br /><br /><br /><span style="font-weight: bold;">7. What three things are included in a logical topology document? (Choose three.)</span><br /><br />the location of cables, computers, and other peripherals<br />**the path that the data takes through a network<br />the wireless signal coverage area<br />the wiring closet and access point locations<br />**the device names and Layer 3 addressing information<br />**the location of routing, network address translation, and firewall filtering<br /><br /><br /><span style="font-weight: bold;">8. Which device has the ability to break up broadcast and collision domains?</span><br /><br />repeater<br />hub<br />**router<br />switch<br /><br /><br /><span style="font-weight: bold;">9. Why is it important to review the results of an on-site survey report with the customer before beginning the network design?</span><br /><br />to inform the customer of how much time the upgrade will take<br />to discuss the implementation schedule for the new equipment<br />**to verify that the report accurately describes the current network and any plans for expansion<br />to layout the new network design and discuss possible equipment upgrades and replacements<br /><br /><br /><span style="font-weight: bold;">10. A client requires a networking device that is capable of expansion to suit growing network demands. What type of device will suit this requirement?</span><br /><br />a networking device with ports that can be activated and deactivated<br />**a networking device with a modular physical configuration<br />a networking device with the ability to be turned off remotely<br />a networking device with a cost per port that is as high as possible<br /><br /><br /><span style="font-weight: bold;">11. What does the use of redundant network components supply to a network?</span><br /><br />scalability<br />manageability<br />compatibility<br />**reliability<br /><br /><br /><span style="font-weight: bold;">12. What is the benefit for a company to use an ISR router?</span><br /><br />**An ISR provides the functionality of a switch, router, and firewall in one device.<br />ISRs use a PC operating system for routing traffic, thus simplifying configuration and management.<br />An ISR is immune to security attacks by hackers and so replaces all other network security measures.<br />ISRs make routing decisions at OSI Layer 7, thus providing more intelligence to the network than do other routers.<br /><br /><br /><span style="font-weight: bold;">13. Which three items are typically found in an MDF? (Choose three.)</span><br /><br />user workstations<br />**switches and routers<br />fax machines<br />**network equipment racks<br />**the point of presence<br />copier<br /><br /><br /><span style="font-weight: bold;">14. What are two advantages of having ISP-managed services? (Choose two.)</span><br /><br />does not require leasing costs for service<br />**can guarantee up to 99.999% availability<br />eliminates the need for data backup<br />**increases availability of help desk services<br />does not require a Service Level Agreement<br /><br /><br /><span style="font-weight: bold;">15. A manufacturing company is in the process of a network upgrade. Which two statements are true about the phases of the upgrade process? (Choose two.)</span><br /><br />**Phase 1 is used to determine network requirements.<br />Phase 2 includes creating an analysis report.<br />**Phase 3 is based on an implementation schedule that allows extra time for unexpected events.<br />Phase 4 is where prototypes are created and tested.<br />Phase 5 includes identifying and addressing any weaknesses in the design.<br /><br /><br /><span style="font-weight: bold;">16. When designing a network upgrade, which two tasks should the onsite technician perform? (Choose two.)</span><br /><br />configure the servers and routers prior to delivery<br />upgrade the network operating system and all client operating systems<br />**investigate and document the physical layout of the premises<br />document the final design for approval by the customer<br />**perform a site survey to document the existing network structure<br /><br /><br /><span style="font-weight: bold;">17. What is the term for the location at the customer premise where the customer network physically connects to the Internet through a telecommunications service provider?</span><br /><br />backbone area<br />**point of presence<br />network distribution facility<br />intermediate distribution frame<br /><br /><br /><span style="font-weight: bold;">18. Refer to the exhibit. Which type of twisted pair cable is used between each device?</span><br /><br />A=console, B=straight, C=crossover, D= crossover, E=straight<br />A=straight, B=straight, C=straight, D=crossover, E=console<br />A=crossover, B=straight, C=straight, D=crossover, E=crossover<br />**A=console, B=straight, C=straight, D=crossover, E=crossover<br />A=console, B=crossover, C=crossover, D=straight, E=straight<br /><br /><br /><span style="font-weight: bold;">19. In what two ways will entering into a managed service agreement with an ISP for a network upgrade affect the costs that are incurred by the customer? (Choose two.)</span><br /><br />Customer IT training costs will increase to enable operation of the new equipment.<br />The cost of hardware repairs and support will become the responsibility of the customer.<br />**Network upgrade and maintenance costs will become predictable.<br />Staffing costs will increase because the customer will need to hire additional IT staff to complete the upgrade.<br />**The company will not need to spend a large amount of money to purchase the equipment upfront.<br /><br /><br /><span style="font-weight: bold;">20. Which type of cable has a solid copper core with several protective layers including PVC, braided wire shielding, and a plastic covering?</span><br /><br />STP<br />UTP<br />**coaxial<br />fiber optic<br /><br /><br /><span style="font-weight: bold;">21. What must be added when a network expands beyond the coverage area of the current telecommunications room?</span><br /><br />MDF<br />POP<br />**IDF<br />IXP </span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4362355789213485390.post-47031421453858707422009-09-24T23:32:00.001-07:002009-09-24T23:35:49.322-07:00CCNA Discovery 2 Chapter 2 V4.1<span style="font-weight: bold;">1. Which two functions are provided by the upper layers of the OSI model? (Choose two.)</span><br /><br />placing electrical signals on the medium for transmission<br />**initiating the network communication process<br />**encrypting and compressing data for transmission<br />segmenting and identifying data for reassembly at the destination<br />choosing the appropriate path for the data to take through the network<br /><br /><br /><span style="font-weight: bold;">2. Which is a function of the transport layer of the OSI model?</span><br /><br />routes data between networks<br />converts data to bits for transmission<br />**delivers data reliably across the network using TCP<br />formats and encodes data for transmission<br />transmits data to the next directly connected device<br /><br /><br /><span id="fullpost"><span style="font-weight: bold;">3. Which common Layer 1 problem can cause a user to lose connectivity?</span><br /><br />incorrect subnet mask<br />incorrect default gateway<br />**loose network cable<br />NIC improperly installed<br /><br /><br /><span style="font-weight: bold;">4. Which three command line utilities are most commonly used to troubleshoot issues at Layer 3? (Choose three.)</span><br /><br />**ping<br />a packet sniffer<br />Telnet<br />**ipconfig<br />**Traceroute<br /><br /><span style="font-weight: bold;">5. Which address is used by the router to direct a packet between networks?</span><br /><br />source MAC address<br />destination MAC address<br />source IP address<br />**destination IP address<br /><br /><br /><span style="font-weight: bold;">6. What is the correct encapsulation order when data is passed from Layer 1 up to Layer 4 of the OSI model?</span><br /><br />**bits, frames, packets, segments<br />frames, bits, packets, segments<br />packets, frames, segments, bits<br />segments, packets, frames, bits<br /><br /><br /><span style="font-weight: bold;">7. What are two goals of the ISP help desk? (Choose two.)</span><br /><br />conserving support resources<br />**network optimization<br />competitive scalability<br />**customer retention<br />sales of network services<br /><br /><br /><span style="font-weight: bold;">8. In what two ways do Level 1 and Level 2 help desk technicians attempt to solve a customer's problems? (Choose three.)</span><br /><br />**talking to the customer on the telephone<br />upgrading hardware and software<br />**using various web tools<br />making an onsite visit<br />installing new equipment<br />**with remote desktop sharing applications<br /><br /><br /><span style="font-weight: bold;">9. A customer calls the help desk about setting up a new PC and cable modem and being unable to access the Internet. What three questions would the technician ask if the bottom-up troubleshooting approach is used? (Choose three.)</span><br /><br />**Is the NIC link light blinking?<br />What is the IP address and subnet mask?<br />Can the default gateway be successfully pinged?<br />**Is the network cable properly attached to the modem?<br />**Is the Category 5 cable properly connected to the network slot on the PC?<br />Can you access your e-mail account?<br /><br /><br /><span style="font-weight: bold;">10. A customer calls to report a problem accessing an e-commerce web site. The help desk technician begins troubleshooting using a top-down approach. Which question would the technician ask the customer first?</span><br /><br />**Can you access other web sites?<br />Is there a firewall installed on your computer?<br />What is your IP address?<br />Is the link light lit on your NIC card?<br /><br /><br /><span style="font-weight: bold;">11. Which statement describes the process of escalating a help desk trouble ticket?</span><br /><br />The help desk technican resolves the customer problem over the phone and closes the trouble ticket.<br />Remote desktop utilities enable the help desk technician to fix a configuration error and close the trouble ticket.<br />**After trying unsuccessfully to fix a problem, the help desk technician sends the trouble ticket to the onsite support staff.<br />When the problem is solved, all information is recorded on the trouble ticket for future reference.<br /><br /><br /><span style="font-weight: bold;">12. What are two functions of the physical layer of the OSI model? (Choose two.)</span><br /><br />adding the hardware address<br />**converting data to bits<br />encapsulating data into frames<br />**signal generation<br />routing packets<br /><br /><br /><span style="font-weight: bold;">13. A customer calls the ISP help desk after setting up a new PC with a cable modem but being unable to access the Internet. After the help desk technician has verified Layer 1 and Layer 2, what are three questions the help desk technician should ask the customer? (Choose three.)</span><br /><br />**What is your subnet mask?<br />**What is your IP address?<br />Is the NIC link light blinking?<br />**Can you ping the default gateway?<br />Is the network cable properly attached to the cable modem?<br />Is the network cable correctly connected to the network port on the PC?<br /><br /><br /><span style="font-weight: bold;">14. Which scenario represents a problem at Layer 4 of the OSI model?</span><br /><br />An incorrect IP address on the default gateway.<br />A bad subnet mask in the host IP configuration.<br />**A firewall filtering traffic addressed to TCP port 25 on an email server.<br />An incorrect DNS server address being given out by DHCP.<br /><br /><br /><span style="font-weight: bold;">15. What are two basic procedures of incident management? (Choose two.)</span><br /><br />**opening a trouble ticket<br />using diagnostic tools to identify the problem<br />surveying network conditions for further analysis<br />configuring new equipment and software upgrades<br />**adhering to a problem-solving strategy<br />e-mailing a problem resolution to the customer<br /><br /><br /><span style="font-weight: bold;">16. Which level of support is supplied by an ISP when providing managed services?</span><br /><br />Level 1<br />Level 2<br />**Level 3<br />Level 4<br /><br /><br /><span style="font-weight: bold;">17. What is the first step that is used by a help desk technician in a systematic approach to helping a customer solve a problem?</span><br /><br />identify and prioritize alternative solutions<br />isolate the cause of the problem<br />**define the problem<br />select an evaluation process<br /><br /><br /><span style="font-weight: bold;">18. A network technician has isolated a problem at the transport layer of the OSI model. Which question would provide further information about the problem?</span><br /><br />**Do you have a firewall that is configured on your PC?<br />Do you have a link light on your network card?<br />Is your PC configured to obtain addressing information using DHCP?<br />What default gateway address is configured in your TCP/IP settings?<br />Can you ping http://www.cisco.com?<br /><br /><br /><span style="font-weight: bold;">19. An ISP help desk technician receives a call from a customer who reports that no one at their business can reach any websites, or get their e-mail. After testing the communication line and finding everything fine, the technician instructs the customer to run nslookup from the command prompt. What does the technician suspect is causing the customer's problem?</span><br /><br />improper IP address configuration on the host<br />hardware failure of the ISR used to connect the customer to the ISP<br />bad cables or connections at the customer site<br />**failure of DNS to resolve names to IP addresses<br /><br /><br /><span style="font-weight: bold;">20. Which layers of the OSI model are commonly referred to as the upper layers?</span><br /><br />**application, presentation, session<br />application, session, network<br />presentation, transport, network<br />presentation, network, data link<br />session, transport, network</span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4362355789213485390.post-13489544603760330622009-09-24T23:28:00.000-07:002009-09-24T23:35:57.833-07:00CCNA Discovery 2 Chapter 1 V4.1<p><b>1. Which two things can be determined by using the ping command? (Choose two.)</b><br /><br />the number of routers between the source and destination device<br />the IP address of the router nearest the destination device<br />**the average time it takes a packet to reach the destination and for the response to return to the source<br />**whether or not the destination device is reachable through the network<br />the average time it takes each router in the path between source and destination to respond<br /><br /><br /><b>2. What are three main types of high-bandwidth connection options used by medium- to large-sized businesses? (Choose three.)</b><br /><br />DSL<br />cable modem<br />Ethernet<br />**metro Ethernet<br />**T1<br />**T3<br /><br /><br /><span id="fullpost"><b>3. What is the maximum T1 transmission speed?</b><br /><br />56 kbps<br />128 kbps<br />**1.544 Mbps<br />2.4 Mbps<br /><br /><br /><b>4. Which of the following start the test of destination reachability?</b><br /><br />**echo request issued by source<br />echo reply issued by source<br />echo request issued by destination<br />echo reply issued by destination<br /><br /><br /><b>5. Which statement describes a function of a Tier 1 ISP?</b><br /><br />**peers with other similarly sized ISPs to form the global Internet backbone<br />uses the services of Tier 3 ISPs to connect to the global Internet backbone<br />pays Tier 2 ISPs for transit services to connect across continents<br />limits the offered services to small geographic areas<br /><br /><br /><b>6. At which point do individuals and small businesses connect directly to the ISP network to obtain Internet access?</b><br /><br />**at a POP<br />at an IXP<br />at a Metro Ethernet link<br />on the ISP extranet<br /><br /><br /><b>7.What information is contained in the numbered RFCs maintained by the IETF?</b><br /><br />the rules for acceptable use of websites and e-mail<br />the descriptions of various hardware components that connect to the Internet<br />**the specifications and rules for how devices communicate over an IP network<br />the standards for cabling and wiring for local Ethernet networks<br /><br /><br /><b>8. Which network support services team is responsible for testing a new customer connection and for monitoring the ongoing operation of the link?"</b><br /><br />customer service<br />help desk<br />**network operations<br />on-site installation<br /><br /><br /><b>9. Which network support services team identifies whether the client site has existing network hardware and circuits installed?</b><br /><br />customer service<br />help desk<br />network operations<br />**planning and provisioning<br /><br /><br /><b>10. Which ISP network support systems team will typically contact the customer once a new circuit is ready and guide the customer in setting up passwords and other account information?</b><br /><br />**help desk<br />customer service<br />network operations center<br />on-site installation team<br />planning and provisioning<br /><br /><br /><b>11. What feature allows network devices to be scalable?</b><br /><br />a fixed number of interfaces<br />ease of repair<br />**modularity<br />low maintenance requirements<br />low cost<br /><br /><br /><b>12. Which command generated this output?</b><br /><br />1 12.0.0.2 4 msec 4 msec 4 msec<br />2 23.0.0.3 20 msec 16 msec 16 msec<br />3 34.0.0.4 16 msec 18 msec 16 msec<br />**Router# traceroute 34.0.0.4<br />Router# nslookup 34.0.0.4<br />Router# ping 34.0.0.4<br />Router# telnet 34.0.0.4<br /><br /><br /><b>13. Which network utility helps determine the location of network problems and identifies routers that packets travel across?</b><br /><br />ping<br />ipconfig<br />**traceroute<br />ixp<br /><br /><br /><b>14. What interconnects the Internet backbone?</b><br /><br />gateway routers<br />**IXPs<br />POPs<br />satellite dishes<br /><br /><br /><b>15. What units are used to measure Internet bandwidth?</b><br /><br />**bits per second<br />bytes per second<br />hertz<br />megabytes per second<br />packets per second<br /><br /><br /><b>16. The IT manager of a medium-sized business wishes to house the company-owned web servers in a facility that offers round-the-clock controlled access, redundant power, and high-bandwidth Internet access. Which ISP service will fulfill this need?</b><br /><br />web hosting<br />planning and provisioning<br />application hosting<br />**equipment colocation<br />Tier 1 ISP services<br /><br /><br /><b>17. What is the purpose of an RFC?</b><br /><br />to provide the connection point for multiple ISPs to the Internet<br />**to document the development and approval of an Internet standard<br />to connect a business to an ISP<br />to provide data communication services to ISP customers<br />to monitor network performance and connection status of ISP clients<br /><br /><br /><b>18. When did the Internet become available for use by businesses and consumers?</b><br /><br />1979<br />1984<br />**1991<br />1999<br />2000<br /><br /><br /><b>19. What was the original purpose of the Internet?</b><br /><br />voice communication<br />marketing<br />**research<br />commerce<br /><br /><br /><b>20. What three support service teams are commonly found within an ISP? (Choose three.)</b><br /><br />**help desk<br />computer support<br />application readiness<br />**network operations center<br />**planning and provisioning<br />implementation and documentation </span></p>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4362355789213485390.post-41222390831647330502009-04-28T11:56:00.001-07:002009-09-24T23:30:32.945-07:00CCNA 2 Chapter 7 V4.1<span style="font-weight: bold;">1. Which two statements are true about the OSI and TCP/IP models? (Choose two.)</span><br />The two bottom layers of the TCP/IP model make up the bottom layer of the OSI model.<br />The TCP/IP model is a theoretical model and the OSI model is based on actual protocols.<br />• The OSI network layer is comparable to the Internet layer of the TCP/IP model.<br />The TCP/IP model specifies protocols for the physical network interconnection.<br />• The TCP/IP model is based on four layers and the OSI model is based on seven layers.<br /><br /><span style="font-weight: bold;">2. To meet customer expectations, an ISP must guarantee a level of service that is based on what two factors? (Choose two.)</span><br />accessibility<br />adaptability<br />• availability<br />• reliability<br />scalability<br /><br /><span id="fullpost"><span style="font-weight: bold;">3. User1 is sending an e-mail to </span><!-- e --><a style="font-weight: bold;" href="mailto:User2@cisco.com">User2@cisco.com</a><!-- e --><span style="font-weight: bold;">. What are two characteristics of the process of sending this data? (Choose two.)</span><br />• It utilizes TCP port 110.<br />A TCP connection is established directly between the User1 and User2 client computers in order to send the e-mail message.<br />• It utilizes a store and forward process.<br />The same application layer protocol is used to send the e-mail and retrieve it from the destination server.<br />SMTP is used to send the e-mail message to the mail servers.<br /><br /><span id="fullpost"><span style="font-weight: bold;">4. Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?</span><br />Host1 sends an ACK message to Host2.<br />Host1 sends a SYN message to Host2.<br />Host1 sends a SYN-ACK message to Host2.<br />Host2 sends an ACK message to Host1.<br />Host2 sends a SYN message to Host1.<br />• Host2 sends a SYN-ACK message to Host1.<br /><br /><span style="font-weight: bold;">5. What are three characteristics of network reliability? (Choose three.)</span><br />• Redundant hardware provides enhanced reliability.<br />Reliability is measured as a percent.<br />Reliability is the responsibility of the ISP customers.<br />• Fault tolerance is a measure of reliability.<br />• The longer the MTBF, the greater the reliability.<br /><br /><span style="font-weight: bold;">6. Which two statements describe the FTP protocol? (Choose two.)</span><br />It uses well-known port 23.<br />The protocol interpreter is responsible for the data transfer function.<br />• In passive data connections, the FTP client initiates the transfer of data.<br />• It requires two connections between client and server.<br />FTP servers open a well-known port on the client machine.<br /><br /><span style="font-weight: bold;">7. What is the function of the TCP three-way handshake?</span><br />• It enables the synchronization of port numbers between source and destination hosts.<br />It immediately triggers the retransmission of lost data.<br />• It synchronizes both ends of a connection by allowing both sides to agree upon initial sequence numbers.<br />It identifies the destination application on the receiving host.<br /><br /><span style="font-weight: bold;">8. What are three characteristics of HTTPS? (Choose three.)</span><br />It uses a different client request-server response process than HTTP uses.<br />It specifies additional rules for passing data between the application and data link layers.<br />• It supports authentication.<br />It allows more simultaneous connections than HTTP allows.<br />• It encrypts packets with SSL.<br />• It requires additional server processing time.<br /><br /><span style="font-weight: bold;">9. Which DNS zone resolves an IP address to a qualified domain name?</span><br />dynamic lookup<br />forward lookup<br />resolution lookup<br />• reverse lookup<br /><br />10.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisR1IWRzK64176vnzHq4hxYPBeuOqjT_6Na9WFVOE5wPbosYNTwmIyeUlu80YTr7tchVXktPcKPV2YO91JXsX_U-W_eplfG00HHza32CmfugiKXEZtt5_6z58zkcG4xSOAs-vWnsFm3531/s1600-h/10.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 144px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisR1IWRzK64176vnzHq4hxYPBeuOqjT_6Na9WFVOE5wPbosYNTwmIyeUlu80YTr7tchVXktPcKPV2YO91JXsX_U-W_eplfG00HHza32CmfugiKXEZtt5_6z58zkcG4xSOAs-vWnsFm3531/s400/10.jpg" alt="CCNA 2 Chapter 7 V4.1" id="BLOGGER_PHOTO_ID_5327036708621940802" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><span style="font-weight: bold;">What type of update allows client computers to register and update their resource records with a DNS server whenever changes occur?</span><br />• dynamic<br />zone transfer<br />local recursive query<br />root domain query<br />top-level domain query<br /><br /><span style="font-weight: bold;">11. Refer to the exhibit. Which two statements are true about this file? (Choose two.)</span><br />If the gateway address changes, the file will be updated dynamically.<br />• The command ping fileserv will use IP address 172.16.5.10.<br />• If the ping <!-- m --><a class="postlink" href="http://www.cisco.com/">http://www.cisco.com</a><!-- m --> command is issued, the file will be checked for the Cisco web server IP address before DNS is queried.<br />The file must be created by the user if it is to be used by a workstation.<br />Name to IP address mappings are added to the file after they are received from DNS.<br /><br /><span style="font-weight: bold;">12. Which two tasks are the responsibility of the local DNS server? (Choose two.)</span><br />maintaining a large number of cached DNS entries<br />maintaining the ISP server<br />• mapping name-to-IP addresses for internal hosts<br />• forwarding name resolution requests to a caching-only server<br />forwarding all name resolution requests to root servers on the Internet<br /><br /><span style="font-weight: bold;">13. What are three unique characteristics of UDP? (Choose three.)</span><br />connection oriented<br />full-duplex operation<br />• low overhead<br />• no flow control<br />• no error-recovery function<br />reliable transmission<br /><br /><span style="font-weight: bold;">14. A manufacturing company is looking into subscribing to services from a new ISP. The company requires hosted world wide web, file transfer, and e-mail services. Which three protocols represent the key application services that are required by the company? (Choose three.)</span><br />• FTP<br />• HTTP<br />ICMP<br />PPP<br />Telnet<br />• SMTP<br /><br /><span style="font-weight: bold;">15. Which two options correctly match protocol and well-known port number? (Choose two.)</span><br />DNS - 25<br />FTP - 110<br />• HTTP - 80<br />POP3 - 25<br />• SMTP - 25<br /><br /><span style="font-weight: bold;">16. Within TCP, what combination makes up a socket pair?</span><br />source port with destination port<br />source IP address with destination port<br />source IP address and destination IP address<br />• source IP address and port with a destination IP address and port<br /><br /><span style="font-weight: bold;">17. Which protocol is used to send e-mail, either from a client to a server or from a server to another server?</span><br />SNMP<br />FTP<br />• SMTP<br />HTTPS<br /><br /><span style="font-weight: bold;">18. Refer to the exhibit. The PC is requesting HTTP data from the server. What is a valid representation of source and destination sockets for this request?</span><br />Source - 192.168.1.17:80 ; Destination - 192.168.2.39:80<br />Source - 192.168.1.17:80 ; Destination - 192.168.2.39:1045<br />• Source - 192.168.1.17:1045 ; Destination - 192.168.2.39:80<br />Source - 192.168.1.17:1045 ; Destination - 192.168.2.39:1061<br /><br /><span style="font-weight: bold;">19. What type of DNS server is typically maintained by an ISP?</span><br />• caching-only<br />root<br />second-level<br />top-level<br /><br /><span style="font-weight: bold;">20. A client is communicating with a server on a different segment of the network. How does the server determine what service is being requested by the client?</span><br />The server will apply the default service configured in directory services.<br />The server will use ARP to discover the appropriate service from the local router.<br />The server will send a request to the client asking for the appropriate service.<br />• The server will determine the appropriate service from the destination port field.<br /><br />21.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhcGfStpZRzpYnZcCJIrBMESfXPzz8EXNqTr4ZFOh0frQrOZykQXN1TyBMnzG9BH767eYd3M7tM3fDPwrb20Uh2iNp3AtuYbPzcjrGIJpr5SyNF5GeVPon2yEOj9cff4rVcfcGN_sSqTBv/s1600-h/21.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 125px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhcGfStpZRzpYnZcCJIrBMESfXPzz8EXNqTr4ZFOh0frQrOZykQXN1TyBMnzG9BH767eYd3M7tM3fDPwrb20Uh2iNp3AtuYbPzcjrGIJpr5SyNF5GeVPon2yEOj9cff4rVcfcGN_sSqTBv/s400/21.jpg" alt="CCNA 2 Chapter 7 V4.1" id="BLOGGER_PHOTO_ID_5327036907972120130" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><span style="font-weight: bold;">When a host is communicating with multiple applications on the same server at the same time, which of the following will have the same value for each session? (Choose two.)</span><br />• IP address<br />• MAC address<br />session number<br />sequence number<br /><br /><br /><span style="font-weight: bold;">22. Which three fields do a TCP header and UDP header have in common? (Choose three.)</span><br />• checksum<br />• destination port<br />• source port</span></span>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-4362355789213485390.post-32738257834869223902009-04-28T11:55:00.003-07:002009-09-24T23:30:32.946-07:00CCNA 2 Final V4.11 A company is developing an Internet store for its website. Which protocol should be used to transfer credit card information from customers to the company web server?<br /><br />FTPS<br />HTTP<br />** HTTPS<br />WEP2<br />TFTP<br /><br />2 Refer to the exhibit. A new branch office has been added to the corporate network and a new router is to be installed to allow branch office users to access the database server at headquarters. How should the serial 0/0/0 interface of the new branch office router be configured to connect to the headquarters router?<br /><br />branch_23(config-if)# ip address 192.168.5.19 255.255.255.240<br />branch_23(config-if)# no shutdown<br />branch_23(config-if)# encapsulation hdlc<br /><br />branch_23(config-if)# ip address 192.168.5.25 255.255.255.240<br />branch_23(config-if)# no shutdown<br />branch_23(config-if)# encapsulation ppp<br /><br />branch_23(config-if)# no shutdown<br />branch_23(config-if)# encapsulation ppp<br />branch_23(config-if)# ip address 192.168.5.33 255.255.255.240<br /><br />**branch_23(config-if)# encapsulation ppp<br />branch_23(config-if)# ip address 192.168.5.21 255.255.255.240<br />branch_23(config-if)# no shutdown<br /><br /><span id="fullpost">3Which two commands ensure that any password that permits access to the privileged EXEC mode is not shown in plain text when the configuration files are displayed? (Choose two.)<br /><br />** Router(config)# enable secret cisco<br />Router(config)# enable cisco<br />Router(config)# encryption-password all<br />Router(config)# enable login encrypted<br />Router(config)# enable password encryption<br />** Router(config)# service password-encryption<br /><br />4A new network is to be configured on a router. Which of the following tasks must be completed to configure this interface and implement dynamic IP routing for the new network? (Choose three.)<br /><br />** Select the routing protocol to be configured.<br />** Assign an IP address and subnet mask to the interface<br />Update the ip host configuration information with the device name and new interface IP address.<br />** Configure the routing protocol with the new network IP address.<br />Configure the routing protocol with the new interface IP address and subnet mask.<br />Configure the routing protocol in use on all other enterprise routers with the new network information.<br /><br />5 How does TCP ensure the reliable transfer of data?<br /><br />if data segments are not received from the source, the destination requests that the segments be resent.<br />If an acknowledgment of the transmitted segments is not received from the destination in a predetermined amount of the time, the source resends the data.<br />** TCP uses the SYN-ACK portion of the three-way handshake to ensure that all data has been received.<br />The TCP Protocol Interpreter process verifies the transmitted data at source and destination.<br /><br />6 A network administrator is asked to design a system to allow simultaneous access to the Internet for 250 users. The ISP for this network can only supply five public IPs. What can be used to accomplish this task?<br /><br />routable translation<br />dynamic translation<br />static translation<br />** port address translation<br /><br />7What is the most commonly used exterior routing protocol?<br /><br />** BGP<br />RIP<br />OSPF<br />EIGRP<br /><br />8 Refer to the exhibit. The network administrator needs to configure the router with a name. Which command will the administrator use to configure the router name?<br /><br />Router# ip hostname Boise<br />Router# enable hostname Boise<br />Router(config-line)# name Boise<br />** Router(config)# hostname Boise<br />Router(config)# ip hostname Boise<br /><br />9Why are port numbers included in the TCP header of a segment?<br /><br />to indicate the correct router interface that should be used to forward a segment<br />to identify which switch ports should receive or forward the segment<br />** to determine which Layer 3 protocol should be used to encapsulate the data<br />to enable a receiving host to forward the data to the appropriate application<br />to allow the receiving host to assemble the packet in the proper order<br /><br />10What is the purpose of the routing process?<br /><br />to encapsulate data that is used to communicate across a network<br />** to select the paths that are used to direct traffic to destination networks<br />to convert a URL name into an IP address<br />to provide secure Internet file transfer<br />to forward traffic on the basis of MAC addresses<br /><br />11Which two statements are true about the use of the debug ip rip command on a Cisco router? (Choose two.)<br /><br />** The debug ip rip command displays RIP routing activity in real time.<br />**The debug ip rip command can be issued at the user EXEC configuration mode.<br />The debug ip rip command displays a combination of the information that is displayed by the show ip route and show ip protocols commands.<br />Because of router processor usage, the debug ip rip command should be used only when necessary.<br />The debug ip rip command should be used instead of the show ip route command whenever possible.<br /><br />12What minimum configurations must be set on a host to allow a request to be sent to <!-- m --><a class="postlink" href="http://www.cisco.com/">http://www.cisco.com/</a><!-- m -->? (Choose four.)<br /><br />**DNS server<br />WINS server<br />**IP address<br />NetBIOS<br />** subnet mask<br />** default gateway<br /><br />13A Catalyst 2960 switch has been taken out of storage to be used as a temporary replacement for another switch that needs to be repaired. About a minute after the switch has started, the SYST LED on the front of the switch transitions from blinking green to amber. What is the meaning of the amber SYST LED?<br /><br />The switch has no configuration file in NVRAM.<br />** The switch has failed POST and must be sent for service.<br />The switch is functioning properly.<br />The switch is in half-duplex mode.<br /><br />14Refer to the exhibit. Which combination of cables and symbols is correct?<br /><br />A - crossover, B - straight-through, C - straight-through<br />A - crossover, B - rollover, C - straight-through<br />**A - straight-through, B -crossover, C - straight-through<br />A - straight-through, B -straight-through, C - straight-through<br />A - straight-through, B - straight-through, C - crossover<br />A - rollover, B - straight-through, C - straight-through<br /><br />15After an unsuccessful ping to the local router, the technician decides to investigate the router. The technician observes that the lights and fan on the router are not operational. In which layer of the OSI model is the problem most likely occurring?<br /><br />transport<br />network<br />data link<br />** physical<br /><br />16What are three characteristics of the TCP protocol? (Choose three.)<br /><br />exchanges datagrams unreliably<br />is used to send IP error messages<br />forces the retransmission of unacknowledged packets<br />** creates a virtual session between end-user applications<br />**carries the IP address of the destination host in the TCP header<br />is responsible for breaking messages into segments and reassembling them at their destination<br /><br />17Refer to the exhibit. The network shown is connected using services from the same ISP. How will the Fohi router dynamically learn routes to the 192.168.16.16/28, 192.168.16.32/28, and 192.168.16.64/28 subnetworks?<br /><br />with BGP<br />**with a static route<br />with a directly connected route<br />with an interior routing protocol<br /><br />18Refer to the exhibit. Which type of UTP cable should be used to connect Host A to Switch1?<br /><br />rollover<br />console<br />crossover<br />**straight-through<br /><br />19When customers use credit cards to make purchases at a small business, a modem is heard dialing a telephone number to transfer the transaction data to the central office. What type of WAN serial connection is in use?<br /><br />leased line<br />packet switched<br />** circuit switched<br />point-to-point<br /><br />20 A user reports being unable to access the Internet. The help desk technician employs a bottom-up approach to troubleshooting. The technician first has the user check the patch cable connection from the PC to the wall, and then has the user verify that the NIC has a green link light. What will the technician have the user do next?<br /><br />Enter an IP address into the WWW browser address bar to see if DNS is at fault.<br />Use traceroute to identify the device along the path to the ISP that may be at fault.<br />** Verify the IP address, subnet, and gateway settings using ipconfig on the PC .<br />Connect to the user home router to check firewall settings for blocked TCP ports.<br /><br />21 A ping 192.1.1.20 command is issued on workstation A to determine if workstation B can be reached. What events will occur if this command is successful? (Choose two.)<br /><br />The router will block the ping request message.<br />The router will reply to the echo request with a proxy ping response.<br />Workstation A will send a UDP ping request message to workstation B.<br />Workstation B will send a UDP ping reply message to workstation A.<br />** Workstation A will send an ICMP echo request message to workstation B.<br />** Workstation B will send an ICMP echo reply message to workstation A.<br /><br />22How does a router know of paths to destination networks? (Choose two.)<br /><br />**inspection of the destination IP address in data packets<br />ARP requests from connected routers<br />manual configuration of routes<br />** updates from other routers<br />DHCP information broadcasts<br />updates from the SMTP management information base<br /><br />23Refer to the exhibit. Which two statements describe the data conversation shown? (Choose two.)<br /><br />** The data conversation was started by the HTTP application process running on the client.<br />The data conversation is identified by TCP port 80 on the client.<br />The user started the data conversation by sending an e-mail.<br />The IP address of the Internet server is 192.168.17.43 .<br />**The Internet server will send data to port 8547 on the client.<br /><br />24What is one purpose of the TCP three-way handshake?<br /><br />sending echo requests from the source to the destination host to establish the presence of the destination<br />determining the IP address of the destination host in preparation for data transfer<br />requesting the destination to transfer a binary file to the source<br />**synchronizing sequence numbers between source and destination in preparation for data transfer<br /><br />25Which type of address is 192.168.17.111/28?<br /><br />host address<br />network address<br />**broadcast address<br />multicast address<br /><br />26A customer reports connectivity problems to an ISP technician. Upon questioning the customer, the technician discovers that all network applications are functioning except for FTP. What should the technician suspect is the problem?<br /><br />** misconfigured firewall<br />bad port on switch or hub<br />misconfigured IP addressing on the customer's workstation<br />wrong DNS server configured on the customer's workstation<br />wrong default gateway configured on the customer's workstation<br /><br /><br />27The show ip route command was executed on one of the routers shown in the graphic and the following output was displayed:<br />C 192.168.4.0/24 is directly connected, Serial0/0<br />R 192.168.5.0/24 [120/1] via 192.168.4.2, 00:00:19, Serial0/0<br />R 192.168.1.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1<br />R 192.168.2.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1<br />C 192.168.3.0/24 is directly connected, Serial0/1<br />From which router was this command executed?<br /><br />A<br />B<br />C<br />D<br /><br />28Refer to the exhibit. Which two sets of commands are required to configure passwords for all management ports on a Catalyst 2960 switch? (Choose two.)<br /><br />ALSwitch(config)# interface vlan 1<br />ALSwitch(config-if)# password cisco<br />ALSwitch(config-if)# login<br /><br />**ALSwitch(config)# line vty 0 4<br />ALSwitch(config-line)# password cisco<br />ALSwitch(config-line)# login<br /><br />ALSwitch(config)# line vty 0 15<br />ALSwitch(config-line)# password cisco<br />ALSwitch(config-line)# login<br />ALSwitch(config)# enable secret class<br /><br />ALSwitch(config)# enable password cisco<br />ALSwitch(config)# interface fa0/1<br />ALSwitch(config-if)# password cisco<br />ALSwitch(config-if)# no shutdown<br /><br />**ALSwitch(config)# line cons 0<br />ALSwitch(config-line)# password cisco<br />ALSwitch(config-line)# login<br />29A user reports being able to access the Internet but not being able to download e-mail from the mail server at the ISP. What should the user check on the user workstation?<br /><br />** the POP3 and SMTP server settings in the e-mail application<br />the patch cable connections at the back of the workstation and at the wall plate<br />the DHCP settings in the operating system<br />the IP address, mask, and default gateway values<br />the NIC drivers<br /><br />30Refer to the graphic. Which command will configure a static route on Router A to direct traffic from LAN A that is destined for LAN C?<br /><br />RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.5.2<br />RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.3.2<br />**RouterA(config)# ip route 192.168.5.0 255.255.255.0 192.168.3.2<br />RouterA(config)# ip route 192.168.3.0 255.255.255.0 192.168.3.1<br />RouterA(config)# ip route 192.168.3.2 255.255.255.0 192.168.4.0<br /><br />31Which subnet masks could be used when subnetting a Class B IP address? (Choose two.)<br /><br />255.255.255.240<br />** 255.255.192.0<br />** 255.255.0.0<br />255.192.0.0<br />240.0.0.0<br />255.0.0.0<br /><br />32 Refer to the exhibit. The network administrator has configured the RTA and RTB interfaces. In order to allow hosts that are attached to RTA to reach the server that is attached to RTB, a static route from RTA to the server LAN and a default route from RTB back to RTA need to be configured. Which two commands will the administrator use to accomplish these tasks on the two routers? (Choose two.)<br /><br />**RTA(config)# ip route 10.16.10.5 255.255.255.252 10.16.10.6<br />RTA(config)# ip route 0.0.0.0 0.0.0.0 10.16.10.6<br />RTA(config)# ip route 10.16.10.96 255.255.255.252 10.16.10.6<br />RTB(config)# ip route 10.16.10.6 255.255.255.248 10.16.10.6<br />**RTB(config)# ip route 0.0.0.0 0.0.0.0 S0/0/1<br />RTB(config)# ip route 0.0.0.0 0.0.0.0 10.16.10.6<br /><br />33How do port filtering and access lists help provide network security?<br /><br />**They prevent specified types of traffic from reaching specified network destinations.<br />They alert network administrators to various type of denial of service attacks as they occur.<br />They prevent viruses, worms, and Trojans from infecting host computers and servers.<br />They enable encryption and authentication of confidential data communications.<br /><br />34 Refer to the exhibit. The network administrator of the building in the graphic needs to choose the type of cable best suited to add ServerB to the network. Which cable type is the best choice?<br /><br />STP<br />UTP<br />coaxial<br />**fiber optic<br /><br />35What is used by a routing protocol to determine the best path to include in the routing table?<br /><br />Convergence time<br />Default distance<br />** Metric<br />Type of router<br /><br />36Refer to the exhibit. Which IP addresses could be assigned to the hosts in the diagram? (Choose two.)<br /><br />192.168.65.31<br />192.168.65.32<br />** 192.168.65.35<br />** 192.168.65.60<br />192.168.65.63<br />192.168.65.64<br /><br />37Given the network 192.168.25.0 shown in the graphic, which subnet mask would accommodate the number of hosts in each subnet?<br /><br />255.255.0.0<br />255.255.224.0<br />255.255.255.0<br />** 255.255.255.224<br />255.255.255.240<br />255.255.255.248<br /><br />38 Which two protocols allow network devices to report their status and events to a centralized network management device? (Choose two.)<br /><br />** Syslog<br />Telnet<br />HTTP<br />HTTPS<br />** SNMP<br /><br />39What is true regarding the differences between NAT and PAT?<br /><br />PAT uses the word "overload" at the end of the access-list statement to share a single registered address.<br />Static NAT allows an unregistered address to map to multiple registered addresses.<br />Dynamic NAT allows hosts to receive the same global address each time external access is required.<br />**PAT uses unique source port numbers to distinguish between translations.<br /><br />40Refer to the exhibit. The graphic shows the output of a command issued on router RTB. According to the output, what two statements are true of router RTB? (Choose two.)<br /><br />**The router is connected to a router named Boise.<br />Router RTB is connected to a Cisco 1841 router.<br />Router RTB is directly connected to two other routers.<br />**The IP address of the router interface connected to router RTB is 192.168.2.6 .<br />The RTB router is connected to two Cisco devices by Fast Ethernet links.<br /><br />41Refer to the exhibit. The network administrator uses the command below to configure a default route to the ISP network :<br />RTB(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.6<br />A ping issued from the ISP is successful to router RTB. However, ping echo request packets arrive at a host that is attached to the Fa0/0 interface of RTB, and the replies do not make it back to the ISP router. What will fix this problem?<br /><br />The ISP must be configured to forward packets from the 192.168.1.0 network.<br />**The ip route command needs to be edited so that the next hop address is 10.1.1.5.<br />The ip route command needs to be edited so that the 192.168.1.1 address is the next hop address.<br />The ip route command should be removed from the RTB router configuration.<br /><br />42 A network technician is using a network management station to gather data about the performance of devices and links within the ISP. Which application layer protocol makes this possible?<br /><br />**SNMP<br />FTP<br />DHCP<br />SMTP<br /><br />43What are two purposes of DNS? (Choose two.)<br /><br />to dynamically assign IP addressing information to network hosts<br />to simplify the administration of host and default gateway addressing on client computers<br />to assign TCP port numbers to hosts as part of the data transfer process<br />**to resolve human-readable domain names to numeric IP addresses<br />**to replace the static HOSTS file with a more practical dynamic system<br /><br />44A hacker attempts to reach confidential information that is stored on a server inside the corporate network. A network security solution inspects the entire packet, determines that it is a threat, and blocks the packet from entering the inside network. Which security measure protected the network?<br /><br />an IDS<br />**an IPS<br />a host-based firewall<br />Anti-X software<br /><br />45 How many host addresses may be assigned on each subnetwork when using the 130.68.0.0 network address with a subnet mask of 255.255.248.0?<br /><br />30<br />256<br />**2046<br />2048<br />4094<br />4096<br /><br />46In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another?<br /><br />**destination network address<br />source network address<br />source MAC address<br />well known port destination address<br /><br />47 A small tire retailer requires a low-cost WAN connection to its headquarters in order to manage its inventory and process customer sales in real time. Which WAN connection type is best suited to its needs?<br /><br />Sonet<br />T3<br />**dialup<br />DSL<br />leased line<br /><br />48The command copy tftp running-config has been entered on the router. What will this command do?<br /><br />copy the configuration in RAM to a server<br />**copy the configuration file from a server to RAM<br />copy the configuration file in NVRAM to RAM<br />copy the configuration file in NVRAM to a server<br />copy the configuration file from a server to NVRAM<br /><br />49Refer to the exhibit. The network administrator needs to configure the Fa0/0 interface of RTB so that hosts from RTA can connect to the server that is attached to RTB. Which two commands will the administrator use to accomplish this task? (Choose two.)<br /><br />RTB# ip address 192.168.102.98 255.255.255.248<br />RTB(config-if)# ip address 192.168.102.99 255.255.255.252<br />RTB(config)# ip address 192.168.102.97 255.255.255.252<br />RTB(config)# no shutdown<br />**RTB(config-if)# no shutdown<br />**RTB(config-if)# ip address 192.168.102.97 255.255.255.252<br /><br />50Refer to the exhibit. A NOC technician at an ISP enters the command shown. What are two reasons to use this command? (Choose two.)<br /><br />to map the path to 192.168.1.7<br />**to test reachability to 192.168.1.7<br />to locate connectivity problems along the route to 192.168.1.7<br />to identify the ISPs that interconnect the NOC with the remote host with the address 192.168.1.7<br />**to measure the time that packets take to reach 192.168.1.7 and return to the technician's workstation</span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4362355789213485390.post-73158022312086989762009-04-28T11:55:00.001-07:002009-09-24T23:30:32.947-07:00CCNA 2 Chapter 9 V4.1How many usable host addresses does the 192.168.1.0/25 subnet provide?<br />254<br />128<br />127<br /><span style="font-weight: bold;">126</span>***<br />64<br />62<br /><br />2<br />A network technician has isolated a problem at the transport layer of the OSI<br />model. Which question would provide further information about the problem?<br /><span style="font-weight: bold;">Do you have a firewall that is configured on your PC?</span>***<br />Do you have a link light on your network card?<br />Is your PC configured to obtain addressing information using DHCP?<br />What default gateway address is configured in your TCP/IP settings?<br />Can you ping <!-- m --><a class="postlink" href="http://www.cisco.com/">http://www.cisco.com</a><!-- m -->?<br /><br /><span id="fullpost">3<br />Refer to the exhibit. A network administrator is in the process of sending a<br />preconfigured text file to a router. When the administrator pastes the<br />configuration into the router, an error message appears. What is the problem with<br />the IP addressing scheme?<br />Serial0/0 is configured with a network address.<br />The IP address on FastEthernet0/0 overlaps with the IP on FastEthernet0/1.<br />Serial0/1 is configured with a broadcast address.<br /><span style="font-weight: bold;">The IP address on FastEthernet0/0 overlaps with the IP on Serial0/1.</span>***<br /><br />4<br />A user can access any web page on the Internet but cannot access e-mail. What<br />troubleshooting method would be most efficient for troubleshooting this issue?<br /><span style="font-weight: bold;">top-down</span>***<br />bottom-up<br />divide-and-conquer<br />impossible to determine from this information<br /><br />5<br />Refer to the exhibit. What are two possible causes for the interface status?<br />(Choose two.)<br />The loopback address is not set.<br /><span style="font-weight: bold;">The encapsulation type is mismatched.</span>***<br />A cable is not attached to the interface.<br /><span style="font-weight: bold;">Keepalive messages are not being received.</span>***<br />The interface is administratively shut down.<br /><br />6<br />Refer to the exhibit. Host H1 on the LAN is not able to access the FTP server<br />across the Internet. Which two configuration statements are causing this problem?<br />(Choose two.)<br />There is no route to the Internet.<br />The IP address on Fa0/0 is incorrect.<br />The IP address on S0/0/0 is incorrect.<br /><span style="font-weight: bold;">The NAT command on the Fa0/0 interface is applied in the wrong direction.</span>***<br /><span style="font-weight: bold;">The NAT command on the S0/0/0 interface is applied in the wrong direction.</span>***<br /><br />7<br />Which two conditions identify issues that are confined to Layer 1? (Choose two.)<br /><span style="font-weight: bold;">cables that exceed maximum length</span>***<br />encapsulation errors<br />viruses and worms that create excessive broadcast traffic<br /><span style="font-weight: bold;">poor termination of cables</span>***<br />receiving "line protocol down" messages on the router console<br /><br />8<br />A network administrator is upgrading a Cisco 1841 router by adding a WIC-2T module<br />card. Which show command can the administrator use to verify that the module is<br />correctly recognized by the router?<br />show flash:<br /><span style="font-weight: bold;">show version</span>***<br />show ip route<br />show startup-configuration<br /><br />9<br />Hosts on two separate subnets cannot communicate. The network administrator<br />suspects a missing route in one of the routing tables. Which three commands can be<br />used to help troubleshoot Layer 3 connectivity issues? (Choose three.)<br /><span style="font-weight: bold;">ping</span>***<br />show arp<br /><span style="font-weight: bold;">traceroute</span>***<br /><span style="font-weight: bold;">show ip route</span>***<br />show controllers<br />show cdp neighbor<br /><br />10<br />Refer to the exhibit. Which statement is true regarding the IP address<br />configuration?<br />Interfaces Fa0/0 and Fa0/1 can be in the same subnet.<br />Interface Fa0/0 and NetworkA can be in the same subnet.<br /><span style="font-weight: bold;">Interface Fa0/0 and NetworkB can be in the same subnet.</span>***<br />Interface Fa0/1 and NetworkB can be in the same subnet.<br /><br />11<br />A network administrator plugs a new PC into a switch port. The LED for that port<br />changes to solid green. What statement best describes the current status of the<br />port?<br />There is a duplex mismatch error.<br />There is a link fault error. This port is unable to forward frames.<br /><span style="font-weight: bold;">The port is operational and ready to transmit packets.</span>***<br />This port has been disabled by management and is unable to forward frames.<br />The flash memory is busy.<br /><br />12<br />Refer to the exhibit. Which three statements are true about the output of the show<br />ip interface brief command? (Choose three.)<br /><span style="font-weight: bold;">FastEthernet0/0 is functioning correctly.</span>***<br /><span style="font-weight: bold;">The shutdown command has been applied on Serial0/0.</span>***<br />FastEthernet0/0 was configured by the startup-config at bootup.<br />Serial0/0 is experiencing a Layer 1 network problem.<br /><span style="font-weight: bold;">FastEthernet0/1 is experiencing a Layer 2 network problem.</span>***<br />Because the port is down, Serial0/1 has an IP address that does not show in<br />the output.<br /><br />13<br />Refer to the exhibit. Users on the 10.12.10.0/24 network are unable to access<br />anyone on the 10.10.10.0/24 network. What two problems exist in the network?<br />(Choose two.)<br /><span style="font-weight: bold;">R2 is using a different version of RIP.</span>***<br /><span style="font-weight: bold;">R2 has a missing network statement.</span>***<br />R1 has an incorrect network statement.<br />R3 has an incorrect network statement.<br />A routing loop is occurring between all three routers.<br /><br />14<br />Refer to the exhibit. The PC is trying to ping router B at 192.168.2.2, but it<br />fails. What is the problem?<br />The PC is on the wrong subnet.<br /><span style="font-weight: bold;">The default gateway on the PC should be 192.168.1.1.</span>***<br />The default gateway should be 192.168.2.2.<br />The DNS server is incorrect.<br />The IP address for Fa0/0 on router A is incorrect.<br /><br />15<br />An administrator is creating a lab to simulate a WAN connection. During the setup,<br />the administrator notices that there are different encapsulation types on each end<br />of the serial connection. At what layer of the OSI model is this problem<br />occurring?<br /><span style="font-weight: bold;">Layer 2</span>***<br />Layer 4<br />Layer 5<br />Layer 6<br /><br />16<br />Refer to the exhibit. A router initially boots up to ROMMON mode. The<br />administrator enters the dir flash: command and sees the output that is shown.<br />What should the administrator do next?<br />Load a new IOS onto the router by the use of TFTP.<br />Load a new IOS onto the router via XMODEM.<br /><span style="font-weight: bold;">Boot the router using the reset command in ROMMON.</span>***<br />Erase the file in flash and reboot the router.<br /><br />17<br />A PC is able to reach devices that are located both inside and outside the<br />network. However, when trying to reach an FTP server that is located on the same<br />subnet, the PC fails to make a connection. The administrator has several other PCs<br />that are located in the same subnet try a connection to the FTP server and they<br />are successful. Which troubleshooting tool can be used to determine the problem<br />between the PC and the FTP server?<br />cable tester<br />digital multimeter<br /><span style="font-weight: bold;">protocol analyzer</span>***<br />network analyzer<br /><br />18<br />Refer to the exhibit. Which IP address is misconfigured and is causing<br />connectivity problems between hosts and servers?<br />HostA<br />HostB<br />Server1<br /><span style="font-weight: bold;">Server2</span>***<br />R1 Fa0/0<br />R1 Fa0/1<br /><br />19<br />Which problem is associated with Layer 4 of the OSI model?<br /><span style="font-weight: bold;">A firewall is blocking Telnet packets to a host.</span>***<br />A host has an incorrect IP address.<br />A router has no route to a host.<br />A host sent a malformed HTTP request.<br /><br />20<br />A user is having trouble accessing the Internet. A network administrator begins by<br />verifying that the IP address of the PC is correctly configured. Next the<br />administrator pings the default gateway. Based on this information, what type of<br />troubleshooting method is the administrator employing?<br />top-down<br />bottom-up<br /><span style="font-weight: bold;">divide-and-conquer</span>***<br />impossible to determine from this information</span>Unknownnoreply@blogger.com2tag:blogger.com,1999:blog-4362355789213485390.post-25333317119171159752009-04-28T11:54:00.001-07:002009-09-24T23:30:51.736-07:00CCNA 4 Final Exam V4.0<p><span style="font-weight: bold;">1. Refer to the exhibit. A pre-sales system engineer receives a diagram of the current network WAN connectivity from a customer. EIGRP is the routing protocol used on the WAN. Based on the default operation of EIGRP, which statement is true about the routing table on router R1?</span><br /><br />There is a single route to the 192.168.16.0/28 LAN via the use of the T1 connection.<br /><br />There is a single route to the 192.168.16.0/28 LAN via the use of the DSL connection.<br /><br /><span style="color: rgb(0, 0, 255);">There is a single route to the 192.168.16.0/28 LAN via the use of the Metro Ethernet connection.</span><br /><br />EIGRP installs all three routes to the 192.168.16.0/28 LAN and load balances the traffic.<br /><br /><br /><br /><span style="font-weight: bold;">2. A new host needs to be connected to VLAN 1. Router RA is attached to the VTP trunk and configured as shown in the output contained in the graphic. Which of the following IP addresses should be assigned to this new host?</span><br /><br />192.168.1.1 /26<br /><br />192.168.1.11 /28<br /><br /><span style="color: rgb(0, 0, 255);">192.168.1.22 /28</span><br /><br />192.168.1.33 /28<br /><br />192.168.1.44 /28<br /><br />192.168.1.55 /28<br /><br /><br /><br /><span id="fullpost"><span style="font-weight: bold;">3. Refer to the exhibit. A NetworkingCompany designer is reviewing a diagram of a customer network. What two risks or issues can be identified in the topology that is shown? (Choose two.)</span><br /><br /><span style="color: rgb(0, 0, 255);">The firewall router and ISP connection represent a single point of failure.<br /><br />A failure of the switch that connects the Cisco Call Manager to the network will cause the entire IP telephony system to fail.</span><br /><br />Using Layer 3 switches to interconnect the data center servers to the IP phones introduces too much delay.<br /><br />The IP phones need to be redundantly connected to the switches to prevent single points of failure at the access layer.<br /><br />If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable.<br /><br /><br /><br /><span style="font-weight: bold;">4. An engineer who is part of a sales team has been asked to select technologies and equipment capabilities to meet the network requirements of the prospective client. The engineer is also responsible for diagramming the placement and interconnection of various network devices and services. Which role is this engineer performing?</span><br /><br />post-sales field engineer<br /><br />account manager<br /><span style="color: rgb(0, 0, 255);"><br />pre-sales engineer</span><br /><br />network designer<br /><br /><br /><br /><span style="font-weight: bold;">5. Refer to the exhibit. Two network engineers are setting up a prototype network to test a new Frame Relay network design. One of the engineers connects the cables and powers up all of the devices per the test plan. The second engineer uses a console cable to connect to the BR1 router, configures the Frame Relay connection and issues a show interfaces serial 2/0 command. What does the output of this command indicate to the engineers?</span><br /><br />A no shutdown command must be entered on the interface.<br /><br />The IP address has not yet been configured on the interface.<br /><br />The WAN encapsulation method is incorrect on the interface.<br /><br /><span style="color: rgb(0, 0, 255);">The cable that connects BR1 to FR2 may not be correct or is not connected properly.</span><br /><br /><br /><br /><span style="font-weight: bold;">6. After an administrator installs a WIC into a two-slot router and issues the show version command, the newly installed interfaces in the WIC cannot be seen in the router output. What is a possible reason why the newly installed interfaces are not displayed in the router output?</span><br /><br />The interface is not configured properly.<br /><br />The WIC was put into slot 0 instead of slot 1.<br /><br />The WIC was not physically installed in the slot properly.<br /><br /><span style="color: rgb(0, 0, 255);">The show version command cannot be used to validate the presence of installed interfaces.<br /></span><br /><br /><br /><span style="font-weight: bold;">7. Refer to the exhibit. What can be concluded from the output that is shown?</span><br /><br />MDF_2811 has a MAC address of 2294:300F:0000.<br /><br />A Cisco 3750 switch is connected to the FastEthernet1/0/1 port on MDF_2811.<br /><br />MDF_2811 is installed in the main distribution facility on floor 28 of building 11.<br /><br /><span style="color: rgb(0, 0, 255);">Device 3750-24_IDF2 is running Cisco IOS Software Release 12.2(25)SEE2.</span><br /><br /><br /><br /><span style="font-weight: bold;">8. Refer to the exhibit. A network technician is performing an initial installation of a new switch in the east wing. The technician removes the switch from the box, connects the switch to a router that supports the 10.255.254.0/24 network, and adds the configuration that is shown. The technician notifies the network administrator that the switch has been installed. The network administrator then attempts to telnet to the switch from host 192.168.0.1 to complete the switch configuration. What are the results of this attempt to telnet?</span><br /><br />The switch refuses the connection.<br /><br />The connection to the switch times out.<br /><br /><span style="color: rgb(0, 0, 255);">The network administrator is prompted to login.</span><br /><br />The connection is established at the user EXEC prompt.<br /><br /><br /><br /><span style="font-weight: bold;">9. A NetworkingCompany customer is interested in creating an e-commerce business, which includes a network upgrade and the addition of a new server farm. By offering their products on the web, the company expects to increase revenue and reduce wait times to process orders. The network designer proposes to implement the server farm in a new data center and to add a new T1 circuit to handle the expected traffic. What are two business goals of the NetworkingCompany customer? (Choose two.)</span><br /><br />install a new T1 circuit<br /><br /><span style="color: rgb(0, 0, 255);">increase revenue</span><br /><br />implement a new server farm<br /><br /><span style="color: rgb(0, 0, 255);">reduce wait times to process orders</span><br /><br />install a new data center<br /><br /><br /><br /><span style="font-weight: bold;">10. Refer to the exhibit. To demonstrate the importance of using contiguous IP addressing in a hierarchical network design, a network designer configures a prototype network with the use of a network simulator. Which EIGRP configuration commands should the designer enter on router R1 to correctly advertise a single summary route to router BR1 for the campus LAN?</span><br /><br /><br /><br /><span style="font-weight: bold;">11. What makes the Cisco EasyVPN application a useful tool for VPN implementation?</span><br /><br />It provides encryption algorithms unavailable in other systems.<br /><br />It ensures that remote workers actually use the VPN for connectivity.<br /><br /><span style="color: rgb(0, 0, 255);">It simplifies the configuration tasks for the device that is used as the VPN server.</span><br /><br />It allows a greater variety of network devices to be used for VPN connections.<br /><br /><br /><br /><span style="font-weight: bold;">12. A local car dealership recently purchased an automobile financing company. The owner of the dealership issues a contract to NetworkingCompany to integrate the finance company network into the car dealership network. A router in the existing finance company network requires a password for both Telnet and console access, but no one remembers the passwords. What can the NetworkingCompany network technician do to obtain or change the passwords and gain access to the router?</span><br /><br />Use a TFTP server to download a new configuration file to the router that contains the passwords used on the car dealership network and then reload the router.<br /><br />Connect a rollover cable to the serial0/0 port of the router in order to bypass the password security, and use the show running-config command to obtain the passwords.<br /><br /><span style="color: rgb(0, 0, 255);">Connect a console cable to the router, power cycle the router, issue a Ctrl-Break to enter ROM monitor mode, and change the configuration register to bypass the startup configuration.</span><br /><br />Connect the router to another Cisco router at the car dealership, use the show cdp neighbors command to obtain an IP address of the router, and use SSH to gain secure access in order to view the passwords.<br /><br /><br /><br /><span style="font-weight: bold;">13. A network administrator is troubleshooting connectivity problems on a small IPv6 network that consists of two network segments that are connected by a single router. The administrator can ping the IP addresses of local hosts on each segment from the router. Hosts on one network segment cannot successfully ping the IP addresses of hosts on the other network segment. What is the most likely cause of the connectivity problem between the segments?</span><br /><br />incorrect VLAN assignments on each segment<br /><br />broadcast storm that is caused by a malfunctioning NIC on a host<br /><br />incorrect DNS mappings of host names to IPv6 addresses<br /><br /><span style="color: rgb(0, 0, 255);">IPv6 traffic forwarding not configured on the router</span><br /><br /><br /><br /><span style="font-weight: bold;">14. At the distribution layer of a hierarchical network, what are two advantages of using Layer 3 devices instead of Layer 2 switches? (Choose two.)</span><br /><br />enables the creation of large multisite VLANs<br /><br />creates fewer IP subnets to configure and manage<br /><br />reduces the number of redundant links required<br /><br /><span style="color: rgb(0, 0, 255);">reduces the complexity of STP configurations<br /><br />enables traffic filtering based on subnet addresses</span><br /><br /><br /><br /><span style="font-weight: bold;">15. A NetworkingCompany engineer is on a support call resolving technical problems for a client network. After the issue is resolved, the engineer also provides a training session for the client's network support staff. Which position on the networking company team is this engineer performing?</span><br /><br /><span style="color: rgb(0, 0, 255);">post-sales field engineer</span><br /><br />pre-sales engineer<br /><br />network designer<br /><br />account manager<br /><br /><br /><br /><span style="font-weight: bold;">16. What is the main purpose of the access layer in a hierarchically designed network?</span><br /><br />perform routing and packet manipulation<br /><br />supply redundancy and failover protection<br /><br />provide a high-speed, low-latency backbone<br /><br /><span style="color: rgb(0, 0, 255);">serve as a network connection point for end-user devices </span><br /><br /><br /><br /><span style="font-weight: bold;">17. A router has been removed from the network for maintenance. A new Cisco IOS software image has been successfully downloaded to a server and copied into the flash of the router. What should be done before placing the router back into service?</span><br /><br />Back up the new image.<br /><br />Copy the running configuration to NVRAM.<br /><br />Delete the previous version of the Cisco IOS software from flash.<br /><br /><span style="color: rgb(0, 0, 255);">Restart the router and verify that the new image starts successfully.</span><br /><br /><br /><br /><span style="font-weight: bold;">18. A NetworkingCompany customer requires VPN connectivity for workers who must travel frequently. To support the VPN server, the customer router must be upgraded to a new Cisco IOS software version with the Advanced IP Services feature set. What should the field engineer do before copying the new IOS to the router?</span><br /><br />Set the router to load the new IOS image file directly from the TFTP server on the next reboot.<br /><br />Delete the currently installed IOS by using the erase flash: command, and reload the router<br /><br />Issue the show running-configuration command to determine the features of the currently installed IOS image file.<br /><br /><span style="color: rgb(0, 0, 255);">Issue the show version and the show flash commands to ensure that the router has enough memory and file space to support the new IOS image. </span><br /><br /><br /><br /><span style="font-weight: bold;">19. The main office of a NetworkingCompany customer currently connects to three branch offices via three separate point-to-point T1 circuits. The customer network uses RIPv2 as the routing protocol within both the LAN and the WAN. The account manager proposes a change to a Frame Relay network because the costs are lower. A single local loop connection can be installed at the main office with three separate PVCs to connect the branch offices. How can the main office edge router be configured to enable the customer to continue to use RIP as the WAN routing protocol?</span><br /><br />Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote routers.<br /><br />To prevent the Frame Relay network from causing a routing loop, disable split horizon on the serial interface.<br /><br /><span style="color: rgb(0, 0, 255);">Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP address to each one.</span><br /><br />Configure the serial interface with a single interface DLCI number and create frame-relay map statements for each remote site address.<br /><br /><br /><br /><span style="font-weight: bold;">20. A high school uses a fractional T1 for Internet access. Wireless network access is provided in approximately 30 percent of the physical campus. Tests performed recently by the IT administrators indicate that the T1 circuit is operating at full capacity. The school district IT design team is asked to propose a network upgrade plan to address two business goals:</span><br /><br />1. Provide wireless network connectivity for students in 90 percent of the physical campus.<br />2. Improve Internet access for all students and faculty.<br /><br />The design team proposes to upgrade the memory of the core router that is connected to the ISP and to purchase additional wireless access points.<br /><br />What can be concluded about the proposal that is presented by the design team?<br /><br /><span style="color: rgb(0, 0, 255);">The proposal addresses only the goal to increase the wireless coverage.</span><br /><br />The proposal addresses only the goal to improve Internet access.<br /><br />The proposal addresses both business goals.<br /><br />The proposal addresses neither business goal.<br /><br /><br /><br /><span style="font-weight: bold;">21. Refer to the exhibit. The network administrator is configuring the port security feature on switch SWC. The administrator issued the command show port-security interface fa 0/2 to verify the configuration. What can be concluded from the output that is shown? (Choose three.)</span><br /><br />This port is currently up.<br /><br />The port is configured as a trunk link.<br /><br /><span style="color: rgb(0, 0, 255);">There is no device currently connected to this port.</span><br /><br />Three security violations have been detected on this interface.<br /><br />Switchport mode for this interface is access-mode.<br /><br /><span style="color: rgb(0, 0, 255);">Security violations will cause this port to shut down immediately.<br /></span><br /><br /><br /><span style="font-weight: bold;">22. What are two advantages of using a simulation tool to test an IP addressing scheme? (Choose two.)</span><br /><br />Address configuration errors can be addressed using out-of-band connections.<br /><br />Placement of subnets and route summarization can be verified.<br /><br /><span style="color: rgb(0, 0, 255);">An engineer can test physical security without leaving the office or lab.</span><br /><br /><span style="color: rgb(0, 0, 255);">The addressing scheme can be tested for scalability</span>.<br /><br />The effects of combining new with existing infrastructure can be measured.<br /><br />It provides real-time monitoring of a production network.<br /><br /><br /><br /><span style="font-weight: bold;">23. Refer to the exhibit. A field engineer is called into a customer's office to determine a problem with connectivity in the network. Based on the customer's IP addressing scheme, what is causing the problem?</span><br /><br />The VLSM scheme is correct as shown.<br /><br />The WAN that connects R1 to R3 has an incorrect mask.<br /><br /><span style="color: rgb(0, 0, 255);">The WAN that connects R1 to R2 overlaps with the R3 LAN.</span><br /><br />The R1 LAN is incorrect because subnet zero cannot be used with VLSM.<br /><br /><br /><br /><span style="font-weight: bold;">24. A new WIC is installed in an available router slot. At what point during the router startup process does the router test the card for hardware problems?</span><br /><br />after the configuration from NVRAM is loaded into RAM<br /><br />when the bootstrap program is loaded into RAM<br /><br />after the configuration from NVRAM is loaded into ROM<br /><br /><span style="color: rgb(0, 0, 255);">during the power-on self-test (POST)</span><br /><br /><br /><br />25. Refer to the exhibit. A NetworkingCompany engineer is characterizing an existing network for a new customer. The engineer issues a show run command on the branch router to gather configuration information. What is the engineer able to determine as a result of viewing the output of this command?<br /><br /><span style="color: rgb(0, 0, 255);">The branch office router has two routes to the main office LAN in the routing table. </span><br /><br />The default route for the branch office traffic is the router that is located at the main office.<br /><br />A connection through ISP-A will be used to reach the main office LAN if the Frame Relay network is unavailable.<br /><br />By using both the DSL and the Frame Relay connection, the branch office router will load balance traffic that is destined for the main office LAN.<br /><br /><br /><br /><span style="font-weight: bold;">26. A configuration file needs to be loaded into the RAM of a router from a TFTP server. What should an administrator know before accomplishing this task?</span><br /><br />the router IP address and the operating system that is used by the TFTP server<br /><br /><span style="color: rgb(0, 0, 255);">the TFTP server IP address and the name of the configuration file on the server</span><br /><br />the router IP address and the name of the router configuration file in NVRAM<br /><br />the TFTP server IP address and the router interface through which the file will be loaded<br /><br /><br /><br /><span style="font-weight: bold;">27. A network designer must select a routing protocol for the network of a customer. The currently installed network contains both Cisco and non-Cisco routers, and there is no budget to replace them. The designer plans on implementing both VLSM and route summarization in the new network design. Which two protocols can provide the necessary functionality for this LAN? (Choose two.)</span><br /><br />RTP<br /><br />RSTP<br /><br />RIPv1<br /><br /><span style="color: rgb(0, 0, 255);">RIPv2</span><br /><br />EIGRP<br /><br /><span style="color: rgb(0, 0, 255);">OSPF</span><br /><br /><br /><br /><span style="font-weight: bold;">28. Which two weaknesses in a proposed network design can be identified by setting up a prototype network and performing tests on it? (Choose two.)</span><br /><br />congestion and inadequate bandwidth in the provider Frame Relay network<br /><br /><span style="color: rgb(0, 0, 255);">costs of the proposed equipment exceed the customer budget<br /><br />potential points of failure that are critical to the network</span><br /><br />limited scalability that can present problems if the network grows faster than anticipated<br /><br />poor documentation of existing network topology and design<br /><br /><br /><br /><span style="font-weight: bold;">29. A user in a large office calls tech support to complain that the PC no longer connects to the Internet or to any network resources, but seems otherwise normal. The help desk technician asks the caller to talk to nearby users to see if other machines are affected. After a few minutes, the caller reports that several immediate neighbors have the same problem, but those seated further away do not. Assuming that the description is accurate, what should be checked next?</span><br /><br />power outlet to the PC that is used by the caller<br /><br /><span style="color: rgb(0, 0, 255);">workgroup switch in the telecommunications room</span><br /><br />cable between any network outlet and the telecommunications room<br /><br />cable between the PC that is used by the caller and the network outlet it connects to<br /><br />cable between the PC that is used by a neighbor and the network outlet the neighbor PC it connects to<br /><br /><br /><br /><span style="font-weight: bold;">30. Which of the following are characteristics of the core layer of the hierarchical network design model? (Choose three.)</span><br /><br /><span style="color: rgb(0, 0, 255);">redundant paths</span><br /><br />high-level policy enforcement<br /><br />packet manipulation<br /><br />media transitions<br /><br />rapid forwarding of traffic<br /><br />no packet filtering<br /><br /><br /><span style="font-weight: bold;">31. A network designer needs to perform prototype testing on a multisite network design to verify that failure domains are not larger than specified in the proposal. What would be the most efficient way to conduct this test?</span><br /><br />Use simulation software to check the IP addressing scheme for errors.<br /><br />Power down lab equipment and ping from one host to all other hosts.<br /><br />Disconnect links between lab equipment and ping end-to-end across the network.<br /><br /><span style="color: rgb(0, 0, 255);">Delete devices or links in simulation software and ping from each host to all other hosts.</span><br /><br /><br /><br /><span style="font-weight: bold;">32. A customer has asked a network engineer to prototype the new IP addressing and summarization strategy for a large, multisite network implementation. Which tool is appropriate for testing the complete addressing scheme?</span><br /><br />Cisco SDM<br /><br /><span style="color: rgb(0, 0, 255);">network simulation tool</span><br /><br />actual network equipment in a lab<br /><br />current network of the customer<br /><br /><br /><br /><span style="font-weight: bold;">33. During a review of the proposed bill of materials, the NetworkingCompany account manager realizes that the systems engineer included a lower cost, less capable switch model for the access layer connectivity than was specified by the network designer. When questioned, the systems engineer responds that the switches recommended by the designer cannot be purchased within the budget limitations of the customer. Which action should the account manager take?</span><br /><br />Inform the customer that the project cannot be completed given the unreasonable budget constraints.<br /><br /><span style="color: rgb(0, 0, 255);">Communicate any risks associated with the equipment substitution and obtain customer approval to proceed.</span><br /><br />Because the customer is probably aware that the budget limitations will require lower cost, less capable equipment, the account manager should do nothing.<br /><br />Because the customer is probably aware that the budget limitations will require lower cost, less capable equipment, the account manager should do nothing.<br /><br /><br /><br /><span style="font-weight: bold;">34. Refer to the exhibit. What is the spanning-tree role of all the enabled interfaces of SW11?</span><br /><br />alternate<br /><br />backup<br /><br /><span style="color: rgb(0, 0, 255);">designated</span><br /><br />root<br /><br /><br /><br /><span style="font-weight: bold;">35. After performing a password recovery operation on a router, the network field engineer copies the running configuration to the startup configuration and then reloads the router. The router boots successfully but immediately enters the setup mode. The engineer manually loads the startup configuration using the copy start run command and verifies that the configuration is correct and the passwords are reset. What can cause the router to enter setup mode rather than load the correct startup configuration file?</span><br /><br />The field engineer configured the incorrect passwords in the startup configuration file.<br /><br /><span style="color: rgb(0, 0, 255);">The configuration register setting was not changed back to the correct value before the router was reloaded.</span><br /><br />The running configuration was not successfully saved to the startup configuration before the router was reloaded.<br /><br />During the password recovery process, the engineer should have copied the startup configuration to the running configuration before reloading the router.<br /><br /><br /><br /><span style="font-weight: bold;">36. An HWIC-4ESW, four-port switch module needs to be installed in a Cisco 1841 router that currently has a WIC-2T module in slot 0. What should the network technician do first?</span><br /><br /><span style="color: rgb(0, 0, 255);">Turn off power to the router before installing the new module.</span><br /><br />Remove the WIC-2T module so that the new module can be installed in slot 0.<br /><br />Shut down all Fast Ethernet ports on the router until the switch module installation is complete.<br /><br />Configure the router Cisco IOS software to support an internal trunk link between the switch and router module.<br /><br /><br /><br /><span style="font-weight: bold;">37. Refer to the exhibit. Based on the EIGRP configuration that is shown, what can the field engineer conclude about the EIGRP authentication between RouterA and RouterB?</span><br /><br />Authentication will fail because only one key is configured.<br /><br />Authentication will fail because the key chain names do not match.<br /><br /><span style="color: rgb(0, 0, 255);">Authentication will succeed and EIGRP updates can be exchanged.</span><br /><br />Authentication will fail because the key chain names must match the router names.<br /><br /><br /><br /><span style="font-weight: bold;">38. Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of an access layer switch and connects three PCs to test the configuration. The engineer attempts to ping from each PC to the other connected PCs. Which three statements describe the expected results of pinging from one host to another? (Choose three.)</span><br /><br />Host1 can ping Host2.<br /><br /><span style="color: rgb(0, 0, 255);">Host1 cannot ping Host2.</span><br /><br /><span style="color: rgb(0, 0, 255);">Host1 can ping Host3.</span><br /><br />Host1 cannot ping Host3.<br /><br />Host2 can ping Host3.<br /><br /><span style="color: rgb(0, 0, 255);">Host2 cannot ping Host3.</span><br /><br /><br /><br /><span style="font-weight: bold;">39. Refer to the exhibit. The two switches that are shown will not form a trunk. What is the most likely cause of this problem?</span><br /><br />The native VLANs are improperly configured.<br /><br />All the hosts are on the same VLAN and a trunk is not needed.<br /><br /><span style="color: rgb(0, 0, 255);">Both ports are set to dynamic auto.</span><br /><br />The trunk should be configured using the switchport mode access command.<br /><br /><br /><br /><span style="font-weight: bold;">40. During prototype testing, the network designer performs a test to determine the ability of the network to recover from a link or device failure. Which design goal is validated if the test is a success?</span><br /><br />scalability<br /><br />manageability<br /><br /><span style="color: rgb(0, 0, 255);">availability</span><br /><br />security<br /><br /><br /><br /><span style="font-weight: bold;">41. What are two suggested best practices to implement when securing network devices? (Choose two.)</span><br /><br />Configure VLAN 1 as the native VLAN.<br /><br /><span style="color: rgb(0, 0, 255);">Disable unused ports on switches.<br /><br />Enable SSH and disable Telnet.</span><br /><br />Consolidate guest traffic and internal employee traffic.<br /><br />Ensure that logs are stored locally on routers.<br /><br /><br /><br />42. Refer to the exhibit. What does the JAX router do with traffic that is destined for a web server with an IP address of 128.107.10.24?<br /><br /><span style="color: rgb(0, 0, 255);">The traffic is sent out Serial 0/0/0.</span><br /><br />The router sends the traffic out all interfaces other than the one it came in on.<br /><br />A request is sent to neighboring routers for paths to the 128.107.0.0 network.<br /><br />The packets are placed into a queue until a better route is discovered via RIP.<br /><br /><br /><br /><span style="font-weight: bold;">43. When should a network designer specify that a dedicated firewall appliance be used at the perimeter of the network rather than a router with a Cisco IOS software-based firewall feature set?</span><br /><br />There are multiple servers in the DMZ.<br /><br /><span style="color: rgb(0, 0, 255);">The network is large in size and network traffic can overload the device.</span><br /><br />Traffic filtering is needed on the internal network.<br /><br />Multiple levels of access to the network are needed.<br /><br /><br /><br /><span style="font-weight: bold;">44. Which two events occur when the command RTA(config)# frame-relay map ip 10.1.1.1 22 is issued on a router? (Choose two.)</span><br /><br />DLCI 22 replaces the MAC address in the ARP table for entry 10.1.1.1.<br /><br />The remote router that is connected to network 10.1.1.0 enters 22 the DLCI for host 10.1.1.1.<br /><br />Inverse-ARP is used to add an entry for 10.1.1.1 into the Frame Relay map table using DLCI 22.<br /><br /><span style="color: rgb(0, 0, 255);">A Layer 2 address is statically mapped to a Layer 3 address.<br /><br />RTA uses DLCI 22 to forward data to 10.1.1.1.</span><br /><br /><br /><br /><span style="font-weight: bold;">45. Refer to the exhibit. When creating an extended ACL to deny traffic from the 192.168.30.0 network destined for the Web server 209.165.201.30, where is the best location for applying the ACL?</span><br /><br /><span style="color: rgb(0, 0, 255);">R3 Fa0/0 inbound</span><br /><br />R3 S0/0/1 outbound<br /><br />R2 S0/0/1 inbound<br /><br />ISP Fa0/0 outbound<br /><br /><br /><span style="font-weight: bold;">46. Why would a designer choose a flat network over a hierarchical network design?</span><br /><br />to make it easier to filter unwanted traffic<br /><br />to be able to implement QoS<br /><br /><span style="color: rgb(0, 0, 255);">to keep costs low in small networks </span><br /><br />to reduce the size of failure domains<br /><br /><br /><br /><span style="font-weight: bold;">47. Refer to the exhibit. What does the status in the output indicate about the DLCI?</span><br /><br /><span style="color: rgb(0, 0, 255);">The switch has the DLCI configured but it is not usable by this router.</span><br /><br />The DLCI was previously configured in the switch but is no longer there.<br /><br />It is usable but has little activity.<br /><br />The DLCI has been renamed for that PVC.<br /><br /><br /><br /><span style="font-weight: bold;">48. The network designer recommends using RSTP in the design of a new data center. There are multiple redundant Layer 2 switches and links contained in the new design. What is the benefit of using RSTP in this situation over standard STP?</span><br /><br />Redundant links are not blocked.<br /><br />Routing tables converge more quickly.<br /><br /><span style="color: rgb(0, 0, 255);">Spanning Tree convergence times are reduced. </span><br /><br />Fewer redundant links are required to maintain connectivity.<br /><br /><br /><br /><span style="font-weight: bold;">49. A network administrator wants to load a configuration file from a TFTP server into NVRAM on a router. How should the administrator create a startup-config file in NVRAM that matches the contents of the configuration file on the TFTP server?</span><br /><br />Copy the configuration file from a TFTP server by using the command copy tftp startup-config.<br /><br />Copy the configuration file from a TFTP server by using the command copyfilename startup-config.<br /><br />Copy the file to RAM from a console connection by using the copy tftp running-config command. Then reload the router to use the new configuration.<br /><br /><span style="color: rgb(0, 0, 255);">Paste the configuration file to the command line of the router while in global configuration mode. Then issue the copy startup-config running-config command.</span><br /><br /><br /><br /><span style="font-weight: bold;">50. What can be broadcast over the wireless network to help a guest user conveniently log in to the network and use wireless services?</span><br /><br /><span style="color: rgb(0, 0, 255);">SSID</span><br /><br />VPN authentication<br /><br />WPA encryption<br /><br />VLAN parameters<br /><br />WEP keys<br /><br /><br /><br /><span style="font-weight: bold;">51. Which two options are true about discontiguous networks? (Choose two.)</span><br /><br />The routing problems of discontiguous subnetworks can be resolved easily by using the RIPv2 default configuration.<br /><br />The default configuration of all classless routing protocols can prevent problems that are caused by discontiguous networks.<br /><br />Automatic route summarization can cause problems in a network with discontiguous subnets.<br /><br />A network that runs a classful routing protocol will have problems if discontiguous subnets exist in the network.<br /><br />Automatic route summarization helps resolve problems with a network with discontiguous subnetworks.<br /><br /><br /><br /><span style="font-weight: bold;">52. Refer to the exhibit. A network associate is configuring a new router to provide routing between VLANs. The associate removes the router from the box and connects the Fa0/0 interface to a trunking port on the switch. After the configuration is applied to the router, the traffic between VLANs still fails. What is causing this to occur?</span><br /><br />The NWRnStick router needs a routing protocol configured.<br /><br />The NWRnStick router needs additional Fast Ethernet interfaces installed.<br /><br /><span style="color: rgb(0, 0, 255);">The subinterfaces of the NWRnStick router should have IP addresses applied.</span><br /><br />All the subinterfaces of the NWRnStick router should be configured in the same VLAN.<br /><br /><br /><br /><span style="font-weight: bold;">53. A company has an IT staff that is not highly trained. What two features or technologies must the network designer identify as training needs in order for the staff to understand the basic operation of VPNs? (Choose two.)</span><br /><br />access control lists<br /><br /><span style="color: rgb(0, 0, 255);">encryption algorithms</span><br /><br />Frame Relay configuration<br /><br />QoS operation<br /><br /><span style="color: rgb(0, 0, 255);">tunneling protocols</span><br /><br />VLAN configuration<br /><br /><br /><br /><span style="font-weight: bold;">54. Which statement is true about implementing QoS in a network?</span><br /><br />Voice traffic automatically receives the highest priority.<br /><br />QoS guarantees enough bandwidth to every application.<br /><br />QoS increases actual bandwidth on a link to ensure voice quality.<br /><br /><span style="color: rgb(0, 0, 255);">Voice traffic requires priority over other data traffic because it is sensitive to delays.</span><br /><br /><br /><br /><span style="font-weight: bold;">55. Which three enhancements does IPv6 offer over IPv4? (Choose three.)</span><br /><br />easier implementation and configuration<br /><br />more effective IP security<br /><br /><span style="color: rgb(0, 0, 255);">integrated IP mobility support<br /><br />simplified header information</span><br /><br />fewer reserved IP addresses<br /><br /><span style="color: rgb(0, 0, 255);">eliminates the need to implement DHCP</span><br /><br /><br /><br />56. Refer to the exhibit. What happens if the network administrator issues the commands shown when an ACL called Managers already exists on the router?<br /><br />The commands overwrite the Managers ACL that is already on the router.<br /><br /><span style="color: rgb(0, 0, 255);">The commands are added at the end of the Managers ACL that is already on the router.</span><br /><br />The commands are added at the beginning of the Managers ACL that is already on the router.<br /><br />The network administrator receives an error stating that the ACL already exists.<br /><br /><br /><br /><span style="font-weight: bold;">57. A technician is configuring a router for routing using EIGRP. The technician enters the EIGRP router configuration mode command:</span><br /><br />Router(config-router)# variance 3<br /><br />What is the effect of entering this command?<br /><br /><span style="color: rgb(0, 0, 255);">It enables unequal cost load balancing.</span><br /><br />It adjusts the cost of all EIGRP routes to 3.<br /><br />It restricts the number of EIGRP feasible successor routes to 3.<br /><br />It enables EIGRP equal cost load balancing over a maximum of 3 routes.<br /><br /><br /><br /><span style="font-weight: bold;">58. A small bookstore would like to offer wireless connectivity for customers with laptops. Which wireless components or devices will provide connectivity to the customers with the least possible cost to the bookstore?</span><br /><br />standalone access points<br /><br />wireless LAN controllers<br /><br /><span style="color: rgb(0, 0, 255);">standalone lightweight access points</span><br /><br />lightweight access point and wireless LAN controller</span></p>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4362355789213485390.post-63376225390122358262009-04-28T11:53:00.003-07:002009-09-24T23:30:51.737-07:00CCNA 4 Chapter 9 V4.01<br />Which two statements describe factors that influence the layout of a<br />proposal? (Choose two.)<br /><br />Proposal layouts are required to use sans serif typefaces.<br /><br /><span style="color: rgb(0, 0, 255);">A specific proposal layout is followed when one is specified in the RFP.<br /><br />A designer chooses the layout if a written RFP does not specify an outline.</span><br /><br />The software that is used to create the proposal dictates the proposal layouts.<br /><br />Proposal layouts are required to use a format that is designed by the network engineer.<br /><br /><br />2<br />What two items are typically included in the executive summary of a<br />proposal? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">project scope summary</span><br /><br />high-level implementation plan<br /><br />quotes for all needed equipment<br /><br />technical requirements for the design<br /><br /><span style="color: rgb(0, 0, 255);">emphasis on the benefits that meet the goals of the customer</span><br /><br /><br /><span id="fullpost">3<br />Which proposal section describes the intended routing protocol, security<br />mechanisms, and addressing for the planned network?<br /><br /><span style="color: rgb(0, 0, 255);">logical design<br /></span><br />physical design<br /><br />executive summary<br /><br />implementation plan<br /><br />network requirements<br /><br /><br />4<br />Which occurrence would indicate a failure of the design phase?<br /><br />The incorrect model switches were ordered.<br /><br />There is no customer signoff for task completion.<br /><br />New requirements are identified after implementation begins.<br /><br /><span style="color: rgb(0, 0, 255);">The new network capacity is inadequate to support required traffic.</span><br /><br /><br />5<br />A network installation team is assigned to replace all core switches in an<br />existing data center. No other upgrades are planned. Which kind of installation is this?<br /><br />a new installation<br /><br />a fork-lift installation<br /><br /><span style="color: rgb(0, 0, 255);">a phased installation</span><br /><br />a green field installation<br /><br /><br />6<br />What service is provided Cisco standard warranty?<br /><br />software application maintenance<br /><br /><span style="color: rgb(0, 0, 255);">replacement of defected hardware</span><br /><br />next business day delivery of replacement parts<br /><br />access to the Cisco Technical Assistance Center (TAC) 24 hours a day, 7 days a week<br /><br /><br />7<br />An upgraded version of the Cisco IOS has been purchased. However,<br />the CD arrived damaged. How will this loss be covered?<br /><br />a hardware warranty<br /><br /><span style="color: rgb(0, 0, 255);">a software warranty</span><br /><br />the Cisco SMARTnet Service<br /><br />an additional service contract<br /><br /><br />8<br />A company informs the account manager that the installation of a new<br />edge router at the customer remote branch location cannot be done at the scheduled time<br />because of a large order that the branch office needs to complete. As a result, the end date of the<br />project must be adjusted to accommodate the additional time. What is the action should the<br />account manager take?<br /><br />Cancel the order for the new edge router.<br /><br />Work with designer to redesign the branch network.<br /><br />Instruct the technician to complete the install of the router at on the date in the contract.<br /><br /><span style="color: rgb(0, 0, 255);">Adjust the timeline documentation to show the company how the delay will affect the<br />project completion date.</span><br /><br /><br />9<br />NetworkingCompany completes the installation of a network upgrade for<br />a retail customer. All of the onsite tests complete successfully and the customer IT staff approves<br />the results of the tests. The manager of the retail store contacts NetworkingCompany to inform<br />the company that the store will not pay for the upgrade until a recently purchased software<br />package is installed and tested on the network. Which two items that are contained in the<br />proposal can the account manager refer to when discussing this issue with the store manager?(Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">the project scope</span><br /><br />the bill-of-material<br /><br />the project timeline<br /><br /><span style="color: rgb(0, 0, 255);">the terms and conditions</span><br /><br />the business goals of the customer<br /><br />the evaluation of the current network<br /><br /><br />10<br />The operation of a new branch location network is delayed because a<br />VPN cannot be configured and established between the branch location and the main office. It is<br />determined that the router at the main office does not have enough memory and does not have<br />the correct Cisco IOS version image to support the VPN features. To prevent this delay, this<br />problem should have been identified and corrected during which part of the design project?<br /><br />the preparation of the business case<br /><br />the prioritizing of the technical goals<br /><br /><span style="color: rgb(0, 0, 255);">the characterization of the existing network</span><br /><br />the implementation of the approved design<br /><br /><br />11<br />The NetworkingCompany team is tasked to prepare an implementation<br />schedule for a customer. It is determined that the new firewalls and wireless controllers that are<br />specified in the design cannot be delivered and installed within the agreed upon time frame. The<br />NetworkingCompany informs the customer of the problem. What two options can the<br />NetworkingCompany team take to ensure the success of the project? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">plan to add additional staff and resources to shorten the installation time after the new<br />equipment is delivered</span><br /><br />eliminate redundancy in the design to reduce the amount of equipment that is needed<br /><br /><span style="color: rgb(0, 0, 255);">renegotiate a new time frame with the customer to accommodate the delay</span><br /><br />delay the installation of the security devices and controllers until a later time<br /><br />redesign the network to use only readily available equipment and software<br /><br /><br />12<br />AAA Financial Services Company is performing implementation planning<br />for a core switch upgrade. The company has 200 financial software programmers that work<br />billable hours during the week. They have critical, scheduled money transfer transmissions that<br />occur at hourly intervals every night. There are two, two-hour long IT maintenance windows<br />scheduled for software upgrades, one on Saturday and one on Sunday. The bank advertises<br />online banking as available 24 hours on business days and 21 hours on the weekends. However,<br />a network upgrade that is necessary to replace some switches is expected to take four hours.<br />Because of rack constraints, this time includes three hours to remove the old switches before the<br />new switches can be installed and one hour to test the logical configuration. How should the<br />implementation scheduling be handled<br /><br />Defer the software upgrades. Use the Saturday window to perform the hardware<br />installation. Use the Sunday window to perform the logical testing.<br /><br />Coordinate and publish a separate four-hour downtime during Friday to perform the<br />complete switch installation and testing process. Use the Saturday and Sunday windows to<br />correct any outage problems after the Friday window.<br /><br />Coordinate and publish two, four-hour downtimes incorporating the published Saturday<br />and Sunday windows. Defer any software upgrades until the new network is proven to be working<br />correctly with the old software. Use the Sunday window as a fallback scheduling period if there<br />are problems necessitating backing out of the Saturday window.<br /><br /><span style="color: rgb(0, 0, 255);">Coordinate and publish an eight-hour downtime incorporating the Saturday window. This<br />will allow four hours for installation and logical testing, one hour for troubleshooting and decision,<br />and three hours to roll back to the previous configuration if the new switching cannot pass the<br />logical testing. Defer any software upgrades until the new network is proven to be working<br />correctly with the old software.</span><br /><br /><br />13<br />Included in a Bill of Materials (BOM) for a SOHO wired implementation is<br />a Cisco 2811 router, Catalyst 2560 switch, four PCs, three laptops, and a networked printer.<br />Wireless LAN capability will be implemented on this network. Which two equipment types must be<br />added to the BOM to implement this request? (Choose two.)<br /><br />DNS server<br /><br />LAN switch<br /><br /><span style="color: rgb(0, 0, 255);">wireless NICs</span><br /><br />DHCP server<br /><br /><span style="color: rgb(0, 0, 255);">wireless access points</span><br /><br /><br />14<br />A customer has just taken delivery of a Cisco 2811 router and Catalyst<br />3560 switch. Included with the purchase is the SMARTnet Service. Which two resources are<br />included with SMARTnet Service? (Choose two.)<br /><br />signature file updates<br /><br /><span style="color: rgb(0, 0, 255);">technical support from TAC<br /><br />maintenance releases for OS</span><br /><br />software application major releases<br /><br />software application maintenance and minor releases<br /><br /><br />15<br />A Cisco 1841 router has been purchased without an agreement for<br />SMARTnet Service. What two items are guaranteed under the standard warranty? (Choose two.)<br /><br />access to TAC<br /><br /><span style="color: rgb(0, 0, 255);">replacement of defective physical media</span><br /><br />advanced replacement of hardware parts<br /><br />access to a renewable standard warranty contract<br /><span style="color: rgb(0, 0, 255);"><br />under normal use, replacement of defective hardware</span><br /><br /><br />16<br />Upon completion of a proposal, a network design team must sell their<br />ideas to two key stakeholders. Who are these two stakeholders? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">customers</span><br /><br />licensing boards<br /><br />cabling contractors<br /><br /><span style="color: rgb(0, 0, 255);">internal management</span><br /><br />project implementation team<br /><br /><br />17<br />What are two important guidelines when creating a slide presentation for<br />a meeting with a customer? (Choose two.)<br /><br />Use all capital letters on words and phrases when possible for added emphasis.<br /><br />Provide varied background graphics to enhance viewer interest.<br /><br /><span style="color: rgb(0, 0, 255);">Use contrasting colors for background and text to aid visibility.</span><br /><br />Change fonts frequently to denote differences in subject matter.<br /><span style="color: rgb(0, 0, 255);"><br />Use bulleted text to lead the discussion.</span><br /><br /><br />18<br />In order to finalize a project proposal, an account manager of a<br />networking company creates the terms and conditions section. What are two clauses that should<br />be included in this section? (Choose two.)<br /><br />cost summary<br /><br />installation steps<br /><br /><span style="color: rgb(0, 0, 255);">change order procedures<br /><br />problem resolution process</span><br /><br />maintenance contract quotation<br /><br /><br />19<br />Which two items will a systems engineer include in an implementation plan? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">references to design documents</span><br /><br />the business goals of the customer<br /><br />diagrams of the existing traffic flows<br /><br /><span style="color: rgb(0, 0, 255);">the steps to install and test the network</span><br /><br />cost of each network device and component<br /><br /><br />20<br />Which statement describes a phased installation into an existing network?<br /><br />A phased installation generally takes less time and expense than a green-field installation.<br /><br />A phased installation is not suitable for large, multi-site network installations or upgrades.<br /><br /><span style="color: rgb(0, 0, 255);">A phased installation requires detailed planning in order to avoid disruption of user services.<br /></span><br />A phased installation involves building an entire replacement network and migrating users<br />over to it.</span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4362355789213485390.post-51194308674154197712009-04-28T11:53:00.001-07:002009-09-24T23:30:51.738-07:00CCNA 4 Chapter 8 V4.01<br />Which mechanism is used to create a floating static route?<br /><br /><span style="color: rgb(0, 0, 255);">administrative distance</span><br /><br />cost<br /><br />hop count<br /><br />passive interface<br /><br /><br />2<br />IPSec operates at which layer of the OSI model?<br /><br />application<br /><br /><span style="color: rgb(0, 0, 255);">network</span><br /><br />datalink<br /><br />transport<br /><br /><br /><span id="fullpost">3<br />Which is true regarding Frame Relay LMI?<br /><br /><span style="color: rgb(0, 0, 255);">There are three LMI types standardized by ANSI, ITU-T, and Cisco.</span><br /><br />Routers at each end of a Frame Relay virtual circuit must always use the same LMI type.<br /><br />The LMI type must be manually configured.<br /><br />The only function of LMI is to verify the connection between the router and the Frame<br />Relay switch.<br /><br /><br />4<br />Which statement identifies the IP address design for subinterfaces that<br />are configured for a Frame Relay network?<br /><br />Multipoint configurations require the IP address of each subinterface on each router to be<br />in its own subnet.<br /><br /><span style="color: rgb(0, 0, 255);">Multipoint configurations require IP addresses for each subinterface on each router to be<br />a part of the same subnet.<br /></span><br />Point-to-point configurations require IP addresses for each subinterface on each router to<br />be a part of the same subnet.<br /><br />Point-to-point configurations do not require IP addresses on each subinterface on each router.<br /><br />Multipoint configurations do not require IP addresses on each subinterface on each router.<br /><br /><br />5<br />Which three algorithms can be used to encrypt user data in an IPSec VPN framework? (Choose three.)<br /><br /><span style="color: rgb(0, 0, 255);">3DES<br /><br />AES</span><br /><br />Diffie-Hellman<br /><br /><span style="color: rgb(0, 0, 255);">DES</span><br /><br />ESP<br /><br />SHA<br /><br /><br />6<br />Which flag is set by a Frame Relay switch to inform the receiving station that congestion was experienced?<br /><br />BECN<br /><br />DE<br /><br /><span style="color: rgb(0, 0, 255);">FECN</span><br /><br />FCS<br /><br /><br />7<br />Refer to the exhibit. The complete configuration of a Frame Relay interface on the Chicago router<br />is shown. How does the Chicago router know which DLCI is mapped to the IP address of the<br />remote router?<br /><br />DE<br /><br />CIR<br /><br />FECN<br /><br /><span style="color: rgb(0, 0, 255);">Inverse ARP</span><br /><br /><br />8<br />What statement correctly defines the purpose of the split horizon rule?<br /><br />marks the route unreachable in a routing update that is sent to other routers<br /><br /><span style="color: rgb(0, 0, 255);">prevents routers from advertising a network through the interface from which the update came</span><br /><br />prevents routers from accepting higher cost routes to networks previously marked as<br />inaccessible before the timer expires<br /><br />limits the number of hops a packet can traverse through the network before it should be discarded<br /><br /><br />9<br />Which PVC status suggests that the router recognizes the DLCI configured on its interface as<br />being present on the Frame Relay switch, but the PVC associated with the DLCI is not capable of<br />end-to-end communication?<br /><br />active<br /><br />deleted<br /><br /><span style="color: rgb(0, 0, 255);">inactive</span><br /><br />idle<br /><br /><br />10<br />Refer to the exhibit. Which router command is used to associate a Layer 2 address with the<br />corresponding Layer 3 address?<br /><br />Miller(config-if)#frame-relay map ip 172.16.150.1 110<br /><br />Miller(config-if)#frame-relay map ip 172.16.150.1 112<br /><br /><span style="color: rgb(0, 0, 255);">Miller(config-if)#frame-relay map ip 172.16.150.2 110</span><br /><br />Miller(config-if)#frame-relay map ip 172.16.150.2 112<br /><br /><br />11<br />A network administrator issued the command show frame-relay pvc. The response from the<br />router shows the status of a PVC as deleted. What is the reason for this status?<br /><br />The DLCI is using the wrong LMI type.<br /><br />The DLCI is usable but has little activity.<br /><br />The DLCI is programmed in the switch but the circuit is not usable.<br /><br /><span style="color: rgb(0, 0, 255);">The DLCI configured on the CPE device does not match the DLCI.</span><br /><br /><br />12<br />What is one benefit of using a network simulation software package?<br /><br /><span style="color: rgb(0, 0, 255);">The network design can be tested before it is actually implemented.</span><br /><br />Simulation software packages are quickly updated to support new network technologies<br />and devices.<br /><br />Simulated devices have the same features as actual devices, allowing for detection of all<br />potential problems.<br /><br />Software packages can simulate all possible network traffic conditions, giving an accurate<br />prediction of network performance.<br /><br /><br />13<br />What are two components a network designer considers when planning a VPN? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">encryption algorithm for privacy and security<br /><br />encapsulation protocol to use when creating the VPN tunnel</span><br /><br />switching technology to optimize VPN WAN throughput<br /><br />tunneling technology for guarding against data corruption<br /><br />routing protocol on the gateway for optimum performance<br /><br /><br />14<br />When identifying VPN requirements for endpoint users, what care must be taken to protect the<br />network when remote users log in from unsecured public locations?<br /><br />Ensure that the user has VPN client software that allows access to all internal resources.<br /><br />Ensure that the VPN user traffic does not slow down internally sourced traffic on the network.<br /><br />Ensure that there are no obstacles to hamper the users from accessing all internal resources.<br /><br /><span style="color: rgb(0, 0, 255);">Ensure that remote users can only access network resources that are appropriate to their<br />job function.</span><br /><br /><br />15<br />Which two components are key elements when implementing a VPN? (Choose two.)<br /><br />concentration<br /><br /><span style="color: rgb(0, 0, 255);">encryption</span><br /><br />prioritization<br /><br />compression<br /><br /><span style="color: rgb(0, 0, 255);">encapsulation</span><br /><br /><br />16<br />What tool can help ease the configuration of VPN servers on routers?<br /><br /><span style="color: rgb(0, 0, 255);">Cisco SDM</span><br /><br />PIX Firewall<br /><br />Cisco VPN Concentrator<br /><br />Cisco Adaptive Security Appliances<br /><br /><br />17<br />What is used to identify the path to the next frame-relay switch in a Frame Relay network?<br /><br />CIR<br /><br /><span style="color: rgb(0, 0, 255);">DLCI</span><br /><br />FECN<br /><br />BECN<br /><br /><br />18<br />Which two statements are true regarding VPN security? (Choose two.)<br /><br />Users may only establish a VPN connection from secure locations and never from public areas.<br /><br />Users that connect to a network through a VPN do not have to log in to resources on the network.<br /><br /><span style="color: rgb(0, 0, 255);">Users that connect to a network through a VPN are are considered trusted users on the network.<br /><br />Users may establish a VPN connection from unsecure locations such as airports and hotel lobbies.</span><br /><br />Users that connect to a network through a VPN should have access to all the resources<br />on the network.<br /><br /><br />19<br />Refer to the exhibit. What is placed in the address field of a frame that will travel from the Orlando<br />office to the DC office?<br /><br />MAC address of the Orlando router<br /><br />MAC address of the DC router<br /><br />192.168.1.25<br /><br />192.168.1.26<br /><br /><span style="color: rgb(0, 0, 255);">DLCI 100</span><br /><br />DLCI 200<br /><br /><br />20<br />Two directly connected routers are able to ping each other through the<br />Serial 0/0/0 interfaces. A network administrator changes the encapsulation on one router to PPP,<br />and the other is left at the default value. What statement would appear in the output of the show<br />interfaces command issued on one of the routers?<br /><br />Serial 0/0/0 is up, line protocol is up<br /><br />Serial 0/0/0 is down, line protocol is down<br /><br /><span style="color: rgb(0, 0, 255);">Serial 0/0/0 is up, line protocol is down</span><br /><br />Serial 0/0/0 is down, line protocol is up<br /><br />Serial 0/0/0 is administratively down, line protocol is down<br /><br /><br />21<br />Refer to the exhibit. What statement is true about the configuration shown for R2?<br /><br /><span style="color: rgb(0, 0, 255);">R2 is configured as the Frame Relay switch.</span><br /><br />R2 is configured as the main site in a multipoint Frame Relay WAN prototype.<br /><br />R2 is configured as the main site in a point-to-point Frame Relay WAN prototype.<br /><br />R2 is configured as a remote site in a multipoint Frame Relay WAN prototype.<br /><br />R2 is configured as a remote site in a point-to-point Frame Relay WAN prototype.<br /><br /><br />22<br />A company uses serial interfaces on its border router to connect to branch offices<br />through WAN connections. The security policy dictates that the encapsulation should use PPP<br />with authentication protocol CHAP. Which statement is true about the configuration requirement of CHAP?<br /><br /><span style="color: rgb(0, 0, 255);">Both the username and password are case sensitive</span>.<br /><br />Neither the username nor the password is case sensitive.<br /><br />The username is case sensitive but the password is not case sensitive.<br /><br />The password is case sensitive but the username is not case sensitive.<br /><br /><br /><span style="color: rgb(255, 0, 0);">23</span><br />Which two statements about split tunnels are true? (Choose two.)<br /><br />Local LAN printing will use the VPN tunnel.<br /><br />The traffic load on the VPN server is increased.<br /><br />Traffic to the corporate network will be encrypted.<br /><br />There is a reduced security risk to the corporate network.<br /><br />All traffic travels across the VPN tunnel from client to server.<br /><br />Traffic to public web sites and general Internet navigation is not encrypted.<br /><br /><br />24<br />An IP address has been assigned to the S0/0/0 interface of a new Cisco router.<br />The administrator wishes to quickly test basic connectivity with the serial interface of an adjoining<br />Cisco router via the use of the default WAN protocol. Which WAN protocol will be used for this test?<br /><br />PPP<br /><br />Frame Relay<br /><br />DSL<br /><br /><span style="color: rgb(0, 0, 255);">HDLC</span><br /><br />ATM<br /><br /><br />25<br />Which two statements about split tunnels are true? (Choose two.)<br /><br />Local LAN printing will use the VPN tunnel.<br /><br />The traffic load on the VPN server is increased.<br /><br /><span style="color: rgb(0, 0, 255);">Traffic to the corporate network will be encrypted.</span><br /><br />There is a reduced security risk to the corporate network.<br /><br />All traffic travels across the VPN tunnel from client to server.<br /><br /><span style="color: rgb(0, 0, 255);">Traffic to public web sites and general Internet navigation is not encrypted.</span></span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4362355789213485390.post-31434649959417480762009-04-28T11:52:00.003-07:002009-09-24T23:30:51.739-07:00CCNA 4 Chapter 7 V4.01<br />A network engineer has decided to pilot test a portion of a new network design rather than rely on<br />a prototype for proof-of-concept. What are two advantages of pilot testing a design concept?(Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">The test network experiences real-world network traffic.</span><br /><br />Users within the enterprise are not affected by the test.<br /><br /><span style="color: rgb(0, 0, 255);">Network response can be tested in unplanned and unpredictable situations.</span><br /><br />Unlikely failure conditions can be conveniently tested.<br /><br />Network response can be tested in a highly controlled simulated environment.<br /><br /><br />2<br />While preparing a network test plan document, a network designer records all initial and modified<br />device configurations. Which section of the document typically contains this information?<br /><br /><span style="color: rgb(0, 0, 255);">Appendix</span><br /><br />Test Procedures<br /><br />Test Description<br /><br />Actual Results and Conclusions<br /><br />Anticipated Results and Success Criteria<br /><br /><span id="fullpost"><br />3<br />Refer to the exhibit. A network designer creates a test plan that includes the specification shown.<br />In which section of the test plan would this specification be found?<br /><br />Test Description<br /><br />Test Procedures<br /><br />Design and Topology Diagram<br /><br />Actual Results and Conclusions<br /><span style="color: rgb(0, 0, 255);"><br />Anticipated Results and Success Criteria</span><br /><br /><br />4<br />What OSI model Layer 2 security measure can a network engineer implement when prototyping<br />network security?<br /><br />a firewall at the network edge<br /><br /><span style="color: rgb(0, 0, 255);">port security at the access design layer</span><br /><br />port security at the distribution design layer<br /><br />IP access control lists at the access design layer<br /><br /><br />5<br />How do designers decide which network functions need to be included in the prototype test?<br /><br /><span style="color: rgb(0, 0, 255);">They select the functions that align with the business goals.</span><br /><br />They select the functions that occur at the network core.<br /><br />They select the functions that do not exist in the existing network.<br /><br />They select the functions from a list of generic network operations.<br /><br /><br />6<br />Refer to the exhibit. During prototype testing of the Cisco network shown, connectivity must be<br />verified. Assuming all connections are working and CDP is enabled on all devices and interfaces,<br />on which device was the command issued?<br /><br /><span style="color: rgb(0, 0, 255);">R1</span><br /><br />S1<br /><br />R3<br /><br />S2<br /><br />R5<br /><br />S3<br /><br /><br />7<br />Refer to the exhibit. During prototyping, Layer 2 functionality is being tested. Based on the output<br />shown, which two pieces of information can be determined? (Choose two.)<br /><br />Switch1 is the root bridge.<br /><br />Interface Fa0/2 on Switch1 has no role in the operation of spanning tree.<br /><br /><span style="color: rgb(0, 0, 255);">Interface Fa0/2 on Switch1 is the alternate port used to reach the root bridge.<br /><br />Based on the entries in the "Role" column, it can be concluded that RSTP has been implemented.<br /></span><br />Interface Fa0/1 on Switch1 is the forwarding port selected for the entire spanning-tree<br />topology.<br /><br /><br />8<br />What Rapid Spanning Tree Protocol (RSTP) state is given to the forwarding port elected for every<br />switched Ethernet LAN segment?<br /><br />root<br /><br />backup<br /><br />alternate<br /><br /><span style="color: rgb(0, 0, 255);">designated</span><br /><br /><br />9<br />Refer to the exhibit. During prototype testing, verification of VLAN connectivity is being<br />performed. Based on the information shown, what command produced the output?<br /><br />show spanning-tree<br /><span style="color: rgb(0, 0, 255);"><br />show interfaces trunk</span><br /><br />show cdp neighbors<br /><br />show interfaces<br /><br />show ip interface brief<br /><br /><br />10<br />Switch port Fa0/24 was previously configured as a trunk, but now it is to be used to connect a<br />host to the network. How should the network administrator reconfigure switch port Fa0/24?<br /><br /><span style="color: rgb(0, 0, 255);">Use the switchport mode access command from interface configuration mode.</span><br /><br />Enter the switchport nonegotiate command from interface configuration mode.<br /><br />Administratively shut down and re-enable the interface to return it to the default.<br /><br />Enter the no switchport mode trunk command in interface configuration mode.<br /><br />Use the switchport access vlan vlan number command from interface configuration mode<br />to remove the port from the trunk and add it to a specific VLAN.<br /><br /><br />11<br />Refer to the exhibit. The redundant paths are of equal bandwidth and EIGRP is the routing<br />protocol in use. Which statement describes the data flow from Server to PC2?<br /><br /><span style="color: rgb(0, 0, 255);">EIGRP load balances across the R3 to R1 and R3 to R2 links.</span><br /><br />EIGRP load balances across the R1 to Switch3 and R2 to Switch3 paths.<br /><br />EIGRP load balances across the Switch1 to Switch3 and Switch1 to Switch2 paths.<br /><br />EIGRP does not load balance in this topology.<br /><br /><br />12<br />A network designer needs to determine if a proposed IP addressing scheme allows efficient route<br />summarization and provides the appropriate amount of scalability to a design. What is useful for<br />validating a proposed hierarchical IP addressing scheme?<br /><br />NBAR<br /><br />a pilot network<br /><br />a route summary<br /><span style="color: rgb(0, 0, 255);"><br />a network simulator</span><br /><br />a physical topology ma<br /><br /><br />13<br />In the router command encapsulation dot1q 10, what does the number 10 represent?<br /><br />the metric used for a particular route<br /><br /><span style="color: rgb(0, 0, 255);">the number of the VLAN associated with the encapsulated subinterface</span><br /><br />the priority number given to the device for the election process<br /><br />the number that must match the Fast Ethernet subinterface number<br /><br />the number used to program the router for unequal cost path load balancing<br /><br /><br />14<br />Refer to the exhibit. The users on the 192.168.10.192 network are not allowed Internet access.<br />The network design calls for an extended ACL to be developed and tested. Where should the<br />ACL be placed for the least effect on other network traffic?<br /><br />inbound on Fa0/0 of R3<br /><br />outbound on Fa0/0 of R3<br /><br /><span style="color: rgb(0, 0, 255);">inbound on Fa0/1 of R3</span><br /><br />outbound on Fa0/1 of R3<br /><br />inbound on Fa0/1 of R2<br /><br />outbound on S0/0 of R2<br /><br /><br />15<br />Refer to the exhibit. What two measures can be taken to address the areas of weakness circled<br />in the network design? (Choose two.)<br /><br />Provide redundant connections to all end users.<br /><br />Add another core switch to increase redundancy.<br /><br /><span style="color: rgb(0, 0, 255);">Add a switch in the server block connecting the server farm to each core switch.</span><br /><br />Add an additional switch to the DMZ and direct links from the new switch to the core switches.<br /><br /><span style="color: rgb(0, 0, 255);">Provide a redundant firewall router connecting to a second ISP, the core switches, and the DMZ.</span><br /><br /><br />16<br />Why is it important to record baseline measurements of a prototype network?<br /><br />Test results show security weaknesses after the baseline tests are run.<br /><br />The baseline is the point at which the network is operating at its fullest potential.<br /><br />Baseline measurements define a point at which network traffic has exceeded the designed capabilities of the network.<br /><br />T<span style="color: rgb(0, 0, 255);">est results are compared to the baseline to see how the test conditions increase processor use or decrease available bandwidth.</span><br /><br /><br />17<br />Refer to the exhibit. A network administrator has been given the task of creating a design for a<br />temporary classroom building that is to be set up outside an overcrowded school. In testing the<br />prototype, it is found that the student PC cannot ping the teacher PC. All the switch interfaces are<br />active and connected properly, as is interface Fa0/0 of the router. Given that only the commands<br />shown have been added to the router configuration, what is the source of the problem?<br /><br /><span style="color: rgb(0, 0, 255);">The IP settings on the student PC are incorrect.</span><br /><br />The default gateway on the teacher PC is misconfigured.<br /><br />The router Fa0/0 interface has not been configured as a VLAN trunk.<br /><br />The Fa0/0 physical interface has not been configured with an IP address and subnet mask.<br /><br />The administrator forgot to configure a routing protocol to allow the ping packets to reach<br />the teacher PC subnet.<br /><br /><br />18<br />Refer to the exhibit. Why are interfaces Fa0/11, Fa0/23, and Fa0/24 not shown in this switch output?<br /><br /><span style="color: rgb(0, 0, 255);">Interfaces Fa0/11, Fa0/23, and Fa0/24 are trunks.</span><br /><br />Interfaces Fa0/11, Fa0/23, and Fa0/24 are shutdown.<br /><br />Interfaces Fa0/11, Fa0/23, and Fa0/24 are blocking.<br /><br />Interfaces Fa0/11, Fa0/23, and Fa0/24 failed diagnostics<br /><br /><br />19<br />Refer to the exhibit. A network technician is performing an initial installation of a new switch in the<br />east wing. The technician removes the switch from the box, makes the connections to the<br />network, and adds the configuration shown. The technician notifies the network administrator that<br />the switch has been installed. When the network administrator at the home office attempts to<br />telnet to the switch from host 192.168.0.1, the connection fails. What action should the network<br />technician take?<br /><br />Add an enable password to the switch.<br /><br /><span style="color: rgb(0, 0, 255);">Add a default gateway to the switch configuration.</span><br /><br />Configure the switch with an IP access list to permit the host connection.<br /><br />Enable the physical interfaces of the switch with the no shutdown command.<br /><br /><br />20<br />Refer to the exhibit. After all the interfaces have stabilized, what is the spanning-tree state of all<br />the enabled interfaces of SW11?<br /><br />discarding<br /><br /><span style="color: rgb(0, 0, 255);">forwarding</span><br /><br />learning<br /><br />listening</span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4362355789213485390.post-29771636076721603072009-04-28T11:52:00.001-07:002009-09-24T23:30:51.740-07:00CCNA 4 Chapter 6 V4.01<br />A network engineer researched whether there are mechanisms available to help with the<br />transition from an IPv4 addressing structure to IPv6. What three options did the engineer find?(Choose three.)<br /><br /><span style="color: rgb(0, 0, 255);">A protocol translation mechanism allows communication between the IPv4 and IPv6 networks.</span><br /><br />A packet analyzer determines the addressing structure and converts it to the appropriate IPv4 or IPv6 scheme.<br /><br />New Core devices that support IPV6 must be purchased.<br /><br />A protocol converter changes IPv4 packets into IPv6 packets and vice versa.<br /><br /><span style="color: rgb(0, 0, 255);">A dual-stack network design allows both IPv4 and IPv6 addressing to be used on all network devices.<br /><br />Tunneling allows IPv4 packets to be encapsulated so that they can traverse IPv6<br />networks and vice versa.</span><br /><br /><br />2<br />When should the command no auto-summary be used?<br /><br />with RIP version 1, to enable classless routing<br /><br />with RIP version 2, to enable classless routing<br /><br />with RIP version 1, when discontigous networks exist<br /><br /><span style="color: rgb(0, 0, 255);">with RIP version 2, when discontigous networks exist</span><br /><br /><span id="fullpost"><br />3<br />Refer to the exhibit. What must an administrator do on R3 to ensure that update packets are sent<br />with subnet mask information?<br /><br />Add the commands:<br />R3(config-router)# auto-summary<br />R3(config-router)# no version 2<br /><span style="color: rgb(0, 0, 255);"><br />Add the commands:<br />R3(config-router)# version 2<br />R3(config-router)# no auto-summary</span><br /><br />Change the network statement on R3:<br />R3(config)# network 10.10.4.0<br /><br />Add the command:<br />R3(config)# ip route 0.0.0.0 0.0.0.0 s0/0<br /><br /><br />4<br />What best describes a discontiguous network?<br /><br />combines several classfull networking address<br /><br />contains more than one route to a destination<br /><br />implements more than one routing protocol<br /><br /><span style="color: rgb(0, 0, 255);">separated from the rest of the hierarchical group by another network</span><br /><br /><br />5<br />Refer to the exhibit. A company has decided to add a new workgroup. If the subnetting scheme<br />for the network uses contiguous blocks of addresses, what subnet is assigned to WGROUP3?<br /><br />172.16.3.12/29<br /><br /><span style="color: rgb(0, 0, 255);">172.16.3.16/29<br /></span><br />172.16.3.20/29<br /><br />172.16.3.24/29<br /><br />172.16.3.32/29<br /><br /><br />6<br />A network administrator is using the 10.0.0.0/8 network for the company. The administrator must<br />create a masking scheme to support 750 users at the main office and 620 users at the remote<br />office. What mask should be assigned to the 10.0.0.0/8 network to preserve the most addresses?<br /><br />255.255.255.0<br /><br />/19<br /><br />/20<br /><br /><span style="color: rgb(0, 0, 255);">255.255.252.0</span><br /><br />/23<br /><br />/21<br /><br /><br />7<br />What is another format for the IPv6 address 1080:0000:0000:0000:0000:0000:1267:01A2?<br /><br /><span style="color: rgb(0, 0, 255);">1080::1267:01A2</span><br /><br />1080:0:0:0:0:1267:01A2<br /><br />1080::0:1267:01A2<br /><br />1080:::::1267.01A2<br /><br /><br />8<br />How many bits make up an IPv6 address?<br /><br />32<br /><br />48<br /><br />64<br /><br /><span style="color: rgb(0, 0, 255);">128</span><br /><br /><br />9<br />After activating IPv6 traffic forwarding, configuring IPv6 addresses, and globally configure RIPng,<br />what is the remaining step to activate RIPng?<br /><br />Enter the ipv6 router rip name command and then use network statements to activate RIPng on the interfaces.<br /><br /><br />Enter the ipv6 router rip name command and then specify which interfaces run RIPng,<br />which are passive, and which only receive.<br /><br /><span style="color: rgb(0, 0, 255);">Enter the interface mode for each IPv6 interface and enable RIPng with the ipv6 rip name enable command.</span><br /><br />Enter the interface mode for each IPv6 interface and enable the multicast group FF02::9,<br />and then activate RIPng globally using the ipv6 router rip name command.<br /><br />Enter the router rip command, and then activate RIPng using the version command.<br /><br />RIPng then automatically runs on all IPv6 interfaces.<br /><br /><br />10<br />Refer to the exhibit. The IT management has determined that the new subnet for WGROUP3<br />needs to be broken down into four more subnets. What would the subnet mask be for the four<br />newly created subnets within WGROUP3?<br /><br />255.255.128.0<br /><br /><span style="color: rgb(0, 0, 255);">255.255.192.0</span><br /><br />255.255.224.0<br /><br />255.255.248.0<br /><br />255.255.252.0<br /><br /><br />11<br />Refer to the exhibit. What is the first usable IP address that can be assigned to the WGROUP3<br />switch?<br /><br />172.16.50.96/27<br /><br /><span style="color: rgb(0, 0, 255);">172.16.50.97/27</span><br /><br />172.16.50.98/27<br /><br />172.16.50.99/27<br /><br />255.255.255.0<br /><br /><br />12<br />Refer to the exhibit. Which set of router commands is required to turn on unequal-cost load<br />sharing so that RTRA selects the path A-B-E and the lowest cost path A-C-E to the Internet?<br /><br /><span style="color: rgb(0, 0, 255);">RTRA(config)# router eigrp 1<br />RTRA(config-router)# variance 2</span><br /><br />RTRA(config)# router eigrp 1<br />RTRA(config-router)# variance 1<br /><br />RTRA(config)# router eigrp 1<br />RTRA(config-router)# maximum-paths 2<br /><br />RTRA(config)# router eigrp 1<br />RTRA(config-router)# maximum-paths 1<br /><br /><br />13<br />Refer to the exhibit. Assuming that the default EIGRP configuration is running on both routers,<br />which statement is true about Router A reaching the 2.2.2.0/24 network?<br /><br /><span style="color: rgb(0, 0, 255);">The no auto-summary command needs to be issued to disable automatic summarization.</span><br /><br />The network 2.2.2.0 command needs to be issued to ensure that Router A recognizes the 2.2.2.0 network.<br /><br />EIGRP supports VLSM and automatically recognizes the 2.2.2.0 network.<br /><br />EIGRP does not support VLSM; therefore it cannot be used with discontiguous networks.<br /><br /><br />14<br />Refer to the exhibit. The network administrator wants router RTA to send only the summarized<br />route of 10.10.0.0/16 to RTC. Which configuration accomplishes this?<br /><br />RTA(config)# interface s0/0<br />RTA(config-if)# ip summary-address eigrp 101 10.10.0.0 255.255.0.0<br />RTA(config-if)# exit<br />RTA(config)# router eigrp 101<br />RTA(config-router)# no auto-summary<br /><br /><span style="color: rgb(0, 0, 255);">RTA(config)# interface s0/1<br />RTA(config-if)# ip summary-address eigrp 101 10.10.0.0 255.255.0.0<br />RTA(config-if)# exit<br />RTA(config)# router eigrp 101<br />RTA(config-router)# no auto-summary</span><br /><br />RTA(config)# interface s0/0<br />RTA(config-if)# ip summary-address eigrp 101 10.10.0.0 255.255.0.0<br /><br />RTA(config)# interface s0/1<br />RTA(config-if)# ip summary-address eigrp 101 10.10.0.0 255.255.0.0<br /><br /><br />15<br />What is a good design practice when developing a hierarchical addressing scheme?<br /><br />Address the nodes in the Access Layer and work toward the Core Layer.<br /><br />Assign addresses to the Core devices before planning the addressing scheme for the server farm.<br /><br /><span style="color: rgb(0, 0, 255);">Determine where statically configured addressing will be implemented.</span><br /><br />Determine what percentage of devices are wired and what percentage of devices are wireless.<br /><br /><br />16<br />A network administrator is asked to design a new addressing scheme for a corporate network.<br />Presently, there are 850 users at the head office, 220 users at sales, 425 at manufacturing, and<br />50 at the research site. Which statement defines the correct VLSM addressing map with minimal<br />waste using the 172.17.0.0/16 network?<br /><br />172.17.0.0/20 head office<br />172.17.1.0/21 manufacturing<br />172.17.1.0/22 sales<br />172.17.3.0/26 research<br /><br />172.17.48.0/19 head office<br />172.17.16.0/20 manufacturing<br />172.17.48.128/25 sales<br />172.17.48.0/26 research<br /><br /><span style="color: rgb(0, 0, 255);">172.17.0.0/22 head office<br />172.17.4.0/23 manufacturing<br />172.17.5.0/24 sales<br />172.17.6.0/26 research</span><br /><br />172.17.2.0/22 head office<br />172.17.3.0/23 manufacturing<br />172.17.4.0/26 sales<br />172.17.4.128/25 research<br /><br /><br />16<br />How would the routes for networks 172.16.1.0/24, 172.16.3.0/24, and 172.16.15.0/24 be summarized?<br /><br /><span style="color: rgb(0, 0, 255);">172.16.0.0/20</span><br /><br />172.16.0.0/21<br /><br />172.16.0.0/22<br /><br />172.16.0.0/24<br /><br /><br />17<br />What two advantages does CIDR provide to a network? (Choose two.)<br /><br />dynamic address assignment<br /><br />automatic route redistribution<br /><br /><span style="color: rgb(0, 0, 255);">reduced routing update traffic<br /><br />easier management of summarization<br /></span><br />automatic summarization at classfull boundaries<br /><br /><br />18<br />Which statement describes MD5 authentication for neighbor authentication?<br /><br /><span style="color: rgb(0, 0, 255);">All passwords are sent in clear text when neighbors first learn about each other.</span><br /><br />Only the initiating router sends its password using encrypted text when it first discovers a new router.<br /><br />All routers send their password using encrypted text only when they first learn of each other.<br /><br />All routers send their password using encrypted text each time they exchange update packets.<br /><br /><br />19<br />Refer to the exhibit. What are the broadcast addresses for each subnet?<br /><br />Admin - 172.16.31.0<br />QA - 172.16.1.127<br />Development - 172.16.2.255<br />Sales - 172.16.32.255<br /><br />Admin - 172.16.31.255<br />QA - 172.16.1.255<br />Development - 172.16.3.255<br />Sales - 172.16.63.255<br /><br /><span style="color: rgb(0, 0, 255);">Admin - 172.16.31.255<br />QA - 172.16.1.127<br />Development - 172.16.3.255<br />Sales - 172.16.63.255</span><br /><br />Admin - 172.16.31.0<br />QA - 172.16.1.255<br />Development - 172.16.2.255<br />Sales - 172.16.32.255<br /><br /><br />20<br />Refer to the exhibit. The IT management is adding three VLANs to the wgroup3 switch.<br />The current subnet will be broken down to support 14 hosts for each of the new VLANs.<br />What will the new subnet mask be for these VLANs?<br /><br />255.255.255.192<br /><br /><span style="color: rgb(0, 0, 255);">255.255.255.240</span><br /><br />255.255.248.0<br /><br />255.255.255.224<br /><br />255.255.240.0<br /><br />255.255.255.248<br /><br /><br />21<br />An administrator is configuring IPv6 on a router. The steps that<br />have already been completed are:<br />1. Activate IPv6 traffic forwarding.<br />2. Configure IPv6 addresses.<br />3. Globally configure RIPng.<br /><br />What is the remaining step to complete the activation of RIPng?<br /><br />Enter the ipv6 router rip name command and then use network statements to<br />activate RIPng on the interfaces.<br /><br />Enter the ipv6 router rip name command and then specify which interfaces run<br />RIPng, which are passive, and which only receive.<br /><br /><span style="color: rgb(0, 0, 255);">Enter the interface mode for each IPv6 interface and enable RIPng with the ipv6<br />rip name enable command.</span><br /><br />Enter the interface mode for each IPv6 interface and enable the multicast group<br />FF02::9, and then activate RIPng globally using the ipv6 router rip name command.<br /><br />Enter the router rip command, and then activate RIPng using the version<br />command. RIPng then automatically runs on all IPv6 interfaces.<br /><br /><br />22<br />Which range includes all available networks in the 192.168.8.0/21 network?<br /><br />192.168.8.0/24 - 192.168.14.0/24<br /><span style="color: rgb(0, 0, 255);"><br />192.168.8.0/24 - 192.168.15.0/24</span><br /><br />192.168.8.0/24 - 192.168.16.0/24<br /><br />192.168.8.0/24 - 192.168.17.0/24<br /><br /><br />23<br />Which two are best practices for creating a new IP addressing<br />scheme for a network? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">Plan and allow for significant growth.</span><br /><br />Assign addresses to the access layer before any other layer.<br /><span style="color: rgb(0, 0, 255);"><br />Plan the entire addressing scheme before assigning any addresses.</span><br /><br />Begin with the access layer network summary addresses and work to the edge.<br /><br />Plan the addressing scheme to meet the current minimum requirement needs.<br /><br />Implement statically assigned addresses to all hosts in the distribution layer first.<br /><br /><br />24<br />Refer to the exhibit. Which subnet will provide sufficient addresses for the Production<br />network with minimal waste?<br /><br />172.16.0.192/26<br /><br /><span style="color: rgb(0, 0, 255);">172.16.0.192/27</span><br /><br />172.16.0.224/26<br /><br />172.16.0.160/26<br /><br />172.16.0.144/27<br /><br /><br />25<br />A network designer is implementing a new network for a company.<br />The designer is using all new Cisco equipment and has decided to select a hierarchical<br />routing protocol for the network. The designer wishes to minimize traffic from routing<br />updates but also needs fast routing convergence in the event of a topology change. Also,<br />the existing IP addressing scheme requires that the selected protocol support VLSM.<br />Which routing protocol should be chosen?<br /><br />BGP<br /><br />RIP v1<br /><br />RIP v2<br /><br /><span style="color: rgb(0, 0, 255);">OSPF</span><br /><br />EIGRP</span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4362355789213485390.post-68065773072831271442009-04-28T11:51:00.004-07:002009-09-24T23:30:51.741-07:00CCNA 4 Chapter 5 V4.01<br />Which rule should be followed when implementing the security requirements of a network design?<br /><br />Always use a common security plan for all business needs.<br /><br />As standard practice, lower access restrictions for users if cost is too high.<br /><br /><span style="color: rgb(0, 0, 255);">Avoid reducing security in order to add additional network capabilities.</span><br /><br />When possible, implement an IDS to protect users from spam.<br /><br /><br />2<br />What limitations of the 2960 switch prevent it from providing the services needed in the<br />Distribution layer?<br /><br />It is limited to copper connections.<br /><br />It does not support QoS.<br /><br />It does not support voice VLAN capability.<br /><br /><span style="color: rgb(0, 0, 255);">It does not support route summarization.</span><br /><br /><span id="fullpost"><br />3<br />When considering converged network designs, it is important to identify appropriate service<br />demands. What is a concern when preparing a network design to fit this environment?<br /><br />business data compensation for sensitivity to noise<br /><br />location and placement of firewalls<br /><br /><span style="color: rgb(0, 0, 255);">voice-level quality of service</span><br /><br />security policy requirements<br /><br /><br />4<br />Which three design requirements are implemented at the access layer? (Choose three.)<br /><br /><span style="color: rgb(0, 0, 255);">PoE<br /><br />VLANs</span><br /><br />high-density routing<br /><br />packet filtering<br /><br />rapidly converging routing protocols<br /><br /><span style="color: rgb(0, 0, 255);">QoS traffic classification and marking</span><br /><br /><br />5<br />Refer to the exhibit. Which statement is true regarding how the ISP router filters traffic?<br /><br />Traffic from the 64.100.0.1 address to any destination on the Internet is denied.<br /><br />Traffic from any source address entering the ISP router interface s0/0/0 is permitted.<br /><br />Only traffic with a source address of 64.100.0.1/30 is allowed into the ISP router interface s0/0/0.<br /><br /><span style="color: rgb(0, 0, 255);">All traffic from the 64.100.0.0/21 network can access the Internet.</span><br /><br />Traffic from any source address can access the 64.100.0.0/21 network.<br /><br /><br />6<br />Which two factors should be considered when designing a wireless LAN that provides seamless<br />roaming capabilities? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">use of a wireless controller to manage IP addressing</span><br /><br />type of routing protocols<br /><br />location of existing wired clients<br /><br /><span style="color: rgb(0, 0, 255);">coverage</span><br /><br />position of MDF<br /><br /><br />7<br />What are three features of a Catalyst 2960 switch? (Choose three.)<br /><br />network layer functionality<br /><br /><span style="color: rgb(0, 0, 255);">redundant power availability</span><br /><br />route summarization<br /><br /><span style="color: rgb(0, 0, 255);">SNMP<br /><br />switch clustering</span><br /><br />inter-VLAN routing<br /><br /><br />8<br />A company lists this equipment in their network design:<br />Two Catalyst 4503 Layer 3 switches<br />One 5500 security appliance firewall<br />Two Catalyst 6509 switches<br />Two lightweight access points<br />Two Catalyst 2960 switches<br /><br />Which two types of devices would be appropriate to use at the access layer to provide end-user<br />connectivity? (Choose two.)<br /><br />Catalyst 4503 switches<br /><br />Cisco 1841 router<br /><br />Catalyst 6509 switches<br /><br /><span style="color: rgb(0, 0, 255);">lightweight access points<br /><br />Catalyst 2960 switches</span><br /><br /><br />9<br />Which two statements are true regarding the following extended ACL? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">access-list 101 deny tcp 172.16.3.0 0.0.0.255 any eq 20<br />access-list 101 deny tcp 172.16.3.0 0.0.0.255 any eq 21<br />access-list 101 permit ip any any</span><br /><br />FTP traffic originating from network 172.16.3.0/24 is denied.<br /><br />All traffic is implicitly denied.<br /><br />FTP traffic destined for the 172.16.3.0/24 network is denied.<br /><br /><span style="color: rgb(0, 0, 255);">Telnet traffic originating on network 172.16.3.0/24 is denied.<br /></span><br />Web traffic originating from 172.16.3.0 is permitted.<br /><br /><br />10<br />Which statement applies to a large network with thousands of nodes?<br /><br />Each wireless phone is normally in a separate VLAN for security reasons.<br /><br />Multiple firewalls exist throughout the access layer for maximum security protection.<br /><br />Firewalls cannot be implemented in the multilayer switches and routers.<br /><br /><span style="color: rgb(0, 0, 255);">Intrusion detection is more likely to be performed by a separate device rather than integrated into a switch or router</span><br /><br /><br />11<br />on campus. The college currently has only wired network device access. Which two devices must<br />be incorporated into the network design to best accommodate roaming for wireless IP phones?(Choose two.)<br /><br />voice VLAN capable switch<br /><br />autonomous AP<br /><br />PoE switch<br /><br /><span style="color: rgb(0, 0, 255);">Cisco wireless LAN controller</span><br /><br />2960 switch with 48 100-Mb ports<br /><br /><span style="color: rgb(0, 0, 255);">lightweight access points</span><br /><br /><br />12<br />What type of WAN service is Frame Relay?<br /><br />dedicated<br /><br />cell switched<br /><br /><span style="color: rgb(0, 0, 255);">packet switched</span><br /><br />circuit switched<br /><br /><br />13<br />Refer to the exhibit. What is an advantage of having two links connected between the two<br />switches shown?<br /><br />provides redundancy in case one of the switches fails<br /><br />provides connectivity to Switch1 when the link to the server fails<br /><br /><span style="color: rgb(0, 0, 255);">provides connectivity when one of the connections between the switches fails</span><br /><br />provides power to the other switch when the other switch has lost AC power<br /><br /><br />14<br />What is the function of the access layer in the Cisco three-layer hierarchical internetworking model?<br /><span style="color: rgb(0, 0, 255);"><br />provides QoS classification and marking</span><br /><br />implements a fast-converging routing protocol<br /><br />uses routed interconnections between devices<br /><br />aggregates traffic and performs route summarization<br /><br /><br />15<br />When applying network security, what security measure should be implemented first?<br /><br /><span style="color: rgb(0, 0, 255);">securing the network devices</span><br /><br />implementing the firewalls or filters at the enterprise edge<br /><br />applying security to resources accessed by internal users<br /><br />applying ACLs to the interfaces of the routers in the internal network<br /><br /><br />16<br />What characteristic of a network supports high availability?<br /><br />VPNs<br /><br />high-bandwidth paths to servers<br /><br /><span style="color: rgb(0, 0, 255);">redundancy<br /></span><br />wireless management<br /><br /><br />17<br />What is integrated into a Cisco IP phone to reduce the number of ports needed in the wiring closet?<br /><br />hub<br /><br />router<br /><br /><span style="color: rgb(0, 0, 255);">switch</span><br /><br />firewall appliance<br /><br /><br />18<br />Which network design process identifies where to place access points?<br /><br /><span style="color: rgb(0, 0, 255);">site survey</span><br /><br />risk assessment<br /><br />scalability design<br /><br />network protocol analysis<br /><br /><br />19<br />Using expandable, modular network devices is a key element of what network design criteria?<br /><br />availability<br /><br />performance<br /><br /><span style="color: rgb(0, 0, 255);">scalability</span><br /><br />security<br /><br /><br />20<br />What is a primary function of a wireless LAN controller?<br /><br /><span style="color: rgb(0, 0, 255);">tuning each AP channel for optimal coverage</span><br /><br />providing PoE to the wireless clients<br /><br />distributing VLAN information to the wireless clients<br /><br />serving as the point of connection between wireless clients and the wired LAN<br /><br /><br />21<br />What characteristic in a routing protocol allows it to support the network design criteria for availability?<br /><br />CIDR support<br /><br />fast convergence<br /><br />timed updates<br /><br />VLSM suppor<br /><br /><br />22<br />A network designer is evaluating the network security implementation for<br />an organization. The designer recommends adding network security devices in front of<br />the server farm, although network security devices have been deployed in the Enterprise<br />Edge for two years. What type of attack can be effectively prevented with this recommendation?<br /><br />virus attack<br /><br /><span style="color: rgb(0, 0, 255);">internal attack</span><br /><br />Internet attack<br /><br />phishing attack<br /><br /><br />23<br />Refer to the exhibit. The branch office needs constant access to the servers in the<br />enterprise headquarters. Therefore, a backup Frame Relay link is added. A network<br />administrator is configuring the routers in the branch office to make sure that when the<br />backup Frame Relay link is used, only the traffic to access the enterprise headquarters is<br />allowed. Which statement is true about the routing configuration on branch office edge routers?<br /><br />The command ip route 0.0.0.0 0.0.0.0 serial 0/0 50 should be configured on BE2.<br /><br />The command ip route 128.107.0.0 255.255.0.0 serial 0/0 50 should be configured on BE1.<br /><br /><span style="color: rgb(0, 0, 255);">The command ip route 128.107.0.0 255.255.0.0 serial 0/0 50 should be configured on BE2.</span><br /><br />The command ip route 192.135.250.0 255.255.255.0 serial 0/0 50 should be<br />configured on BE1.<br /><br /><br />24<br />An automobile sales company is establishing a new, small sales showroom<br />in a downtown area. To update the inventory database, the new sales office will need a<br />WAN connection to the headquarters that is located in the suburban area. The WAN<br />connection should be around a 4 Mb/s connection. Which WAN service will provide the<br />most economical approach to meet the requirement?<br /><br /><span style="color: rgb(0, 0, 255);">DSL<br /></span><br />ATM<br /><br />T1 line<br /><br />Frame Relay<br /><br /><br />25<br />A network designer is selecting a WAN technology for connections<br />between the headquarters of an organization and its branch offices. In this context, what<br />is one advantage of choosing Frame Relay over a T1 line?<br /><br />more secure<br /><br /><span style="color: rgb(0, 0, 255);">flexible bandwidth</span><br /><br />shared media across the link<br /><br />efficiency with fixed length packet size</span>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-4362355789213485390.post-82490710507735362009-04-28T11:51:00.003-07:002009-09-24T23:30:51.742-07:00CCNA 4 Chapter 4 V4.01<br />In addition to the technical considerations, what other major factor is used to evaluate the<br />success of a network installation?<br /><br />final project costs<br /><br />maintenance costs<br /><br /><span style="color: rgb(0, 0, 255);">user satisfaction</span><br /><br />statistics describing the performance of network devices<br /><br /><br />2<br />Which two network applications are most affected by network congestion and delays? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">IP telephony<br /><br />live video webcasts</span><br /><br />audio file downloads<br /><br />online banking services<br /><br />file archival and retrieval<br /><br /><br /><span id="fullpost">3<br />What two Cisco tools can be used to analyze network application traffic? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">NBAR<br /><br />NetFlow</span><br /><br />AutoQoS<br /><br />Wireshark<br /><br />Custom Queuing<br /><br /><br />4<br />In network design, which technology can be implemented to prioritize traffic based on its<br />importance and technical requirements?<br /><br />STP<br /><br /><span style="color: rgb(0, 0, 255);">QoS</span><br /><br />RTP<br /><br />TCP<br /><br />VPN<br /><br /><br />5<br />What are two characteristics of voice over IP traffic? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">Voice packets tend to be small.<br /><br />Voice packets must be processed in real time.</span><br /><br />Voice packets can effectively use TCP reliability features.<br /><br />Voice traffic can survive packet drops and retransmission delays.<br /><br />Voice packets must be converted to analog before being sent across the IP network.<br /><br />Voice packets automatically receive a higher priority value than other types of packets.<br /><br /><br />6<br />What are two things that a network designer can do to determine current and anticipated network<br />traffic flows? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">Survey end users to obtain customer input.</span><br /><br />Upgrade the Cisco IOS software in all networking devices to optimize traffic flow.<br /><br />Limit the analysis to host-to-server traffic because host-to-host traffic is unimportant.<br /><br />Run a network traffic analysis to determine which applications are in use and by whom.<br /><br /><span style="color: rgb(0, 0, 255);">Conduct an inventory of all networking devices that includes model numbers and memory configurations</span><br /><br /><br />7<br />A company that has a traditional telephone system wants to convert to IP telephony. Which two<br />factors should be considered for the design? (Choose two.)<br /><br />Digital communications systems have greater noise than analog systems when<br />processing voice traffic.<br /><br /><span style="color: rgb(0, 0, 255);">Voice-enabled routers or a server must be used for call control and signaling.</span><br /><br />Voice to IP conversions can cause router overhead.<br /><br /><span style="color: rgb(0, 0, 255);">Power to the phones can be supplied through properly equipped patch panels or switches.</span><br /><br />The cost to combine voice and data VLANs can be a considerable amount.<br /><br /><br />8<br />Several web and email servers have recently been installed as part of an enterprise network. The<br />security administrator has been asked to provide a summary of security features that can be<br />implemented to help prevent unauthorized traffic from being sent into or out of sensitive internal<br />networks. Which three features should the security administrator recommend? (Choose three.)<br /><br /><span style="color: rgb(0, 0, 255);">firewalls</span><br /><br />priority queuing<br /><br /><span style="color: rgb(0, 0, 255);">access control lists<br /><br />intrusion detection systems<br /></span><br />DHCP<br /><br />128-bit WEP<br /><br /><br />9<br />The design of an IP telephony system needs to meet the technical requirements to provide a<br />connection to the PSTN as well as provide high-quality voice transmissions using the campus<br />network. Which two elements directly affect the ability of the design to meet these requirements?(Choose two.)<br /><br />voice-enabled firewall<br /><br />PoE switches and patch panels<br /><br />redundant backbone connectivity<br /><br /><span style="color: rgb(0, 0, 255);">voice-enabled router at the enterprise edge<br /><br />separate voice and data VLANs with QoS implemented</span><br /><br /><br />10<br />When implementing VoIP services, which two design considerations should be followed?(Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">Confirm that network jitter is minimal.<br /></span><br />Use TCP to reduce delays and dropped packets.<br /><br />Establish priority queuing to ensure that large data packets are sent uninterrupted.<br /><br />Disable real-time protocols to reduce queuing strategy demands.<br /><br /><span style="color: rgb(0, 0, 255);">Ensure that packet delays do not exceed 150 ms.</span><br /><br /><br />11<br />What design strategy should be followed when designing a network that uses video on demand?<br /><br />implement the appropriate routing protocol to ensure that data segments arrive in order<br /><br />implement different QoS queues based on the type of video traffic being distributed<br /><br /><span style="color: rgb(0, 0, 255);">install servers to store the data in a centrally located server farm</span><br /><br />configure queuing in the core routers to ensure high availability<br /><br /><br />12<br />When implementing QoS in traffic queues, what is the first step the designer should take to<br />ensure that traffic is properly prioritized?<br /><br />define QoS policies<br /><br />define traffic classes<br /><br />determine traffic patterns<br /><br /><span style="color: rgb(0, 0, 255);">identify traffic requirements</span><br /><br />identify networking equipment<br /><br /><br />13<br />Which two statements are characteristics of file transfer traffic flows? (Choose two.)<br /><br />RTP should be used.<br /><br />Traffic is predictable.<br /><br />Packets are small in size.<br /><br /><span style="color: rgb(0, 0, 255);">Transfers are throughput intensive.<br /><br />Response-time requirements are low.</span><br /><br /><br />14<br />Which two items can be determined by diagramming internal traffic flow? (Choose two.)<br /><br />the type of ISP services needed<br /><br />the capabilities of end-user devices<br /><br /><span style="color: rgb(0, 0, 255);">the areas where network congestion may occur</span><br /><br />the location of VPN servers used to connect teleworkers<br /><br /><span style="color: rgb(0, 0, 255);">locations where high-bandwidth connections are required</span><br /><br /><br />15<br />Which two traffic types are examples of external traffic flows? (Choose two.)<br /><br />A user in the IT department telnets to the core layer router.<br /><br /><span style="color: rgb(0, 0, 255);">A user in marketing connects to the web server of a competitor.</span><br /><br />A user in the IT department telnets into the access layer switch.<br /><br /><span style="color: rgb(0, 0, 255);">A user in the services department logs in to a web-based email program.</span><br /><br />A user in accounting connects to an FTP server that is connected to the access layer<br />switch.<br /><br /><br />16<br />Which service can be provided by the NetFlow Cisco utility?<br /><br />network planning and mapping<br /><br />IDS and IPS capabilities<br /><br /><span style="color: rgb(0, 0, 255);">peak usage times and traffic routing</span><br /><br />network billing and accounting application<br /><br />security and user account restrictions<br /><br />source and destination UDP port mapping<br /><br /><br />17<br />Refer to the exhibit. If ACL 150 identifies only voice traffic from network 192.168.10.0/24 and no<br />other traffic, which queue will voice traffic from other networks use?<br /><br />high<br /><br />normal<br /><br />medium<br /><br /><span style="color: rgb(0, 0, 255);">default</span><br /><br /><br />18<br />Refer to the exhibit. After configuring QoS, a network administrator issues the command show<br />queueing interface s0/1. What two pieces of information can an administrator learn from the<br />output of this command? (Choose two.)<br /><br />queue traffic definitions<br /><br />priority list protocol assignments<br /><br /><span style="color: rgb(0, 0, 255);">type of queuing being implemented<br /><br />number of packets placed in each queue</span><br /><br />queuing defaults that have been changed<br /><br />queuing has not been applied to this interface<br /><br /><br />19<br />An analysis of network protocols reveals that RTP and RTCP are being used. What uses these<br />protocols?<br /><br />IDS<br /><br />VPN<br /><br />WLAN<br /><br />firewall<br /><br /><span style="color: rgb(0, 0, 255);">real-time video</span><br /><br /><br />20<br />A company is considering adding voice and video to the data networks. Which two statements are<br />true if voice and video are added? (Choose two.)<br /><br />PoE switches must be purchased.<br /><br /><span style="color: rgb(0, 0, 255);">More UDP-based traffic flows will be evident.</span><br /><br />Response times will be increased even if QoS is implemented.<br /><br /><span style="color: rgb(0, 0, 255);">QoS will most likely be implemented to prioritize traffic flows.</span><br /><br />VPNs will most likely be implemented to protect the voice traffic.<br /><br /><br />21<br />Refer to the exhibit. Which option correctly matches the terms on top with its definition on the<br />bottom?<br /><br />A=1, B=3, C=2, D=4<br /><br />A=2, B=1, C=4, D=3<br /><br />A=2, B=4, C=1, D=3<br /><br />A=3, B=2, C=4, D=1<br /><br /><span style="color: rgb(0, 0, 255);">A=4, B=3, C=1, D=2</span><br /><br />A=4, B=2, C=3, D=1<br /><br /><br />22<br />A database server is configured to purge all data that is 60 days old. Ten data items that are 60<br />days old are to be purged. However, there is a failure halfway through the transaction, and the<br />entire transaction is voided. What type of transaction action occurred?<br /><br /><span style="color: rgb(0, 0, 255);">atomic</span><br /><br />consistent<br /><br />durable<br /><br />isolated<br /><br /><br />23<br />What is the primary goal of QoS?<br /><br />classification of traffic<br /><br />filtering and queuing voice traffic<br /><br />reducing bandwidth requirements<br /><br /><span style="color: rgb(0, 0, 255);">providing priority service to selected traffic</span><br /><br /><br />24<br />Which technology provides a mechanism for implementing QoS at Layer 2?<br /><br />ToS<br /><br /><span style="color: rgb(0, 0, 255);">CoS</span><br /><br />DSCP<br /><br />IP precedence<br /><br /><br />25<br />A customer purchases tickets online and pays using a credit card, but the<br />system goes down before the transaction is complete. What transaction type retains a<br />record of this transaction after the system failure so that the customer will still receive the<br />tickets and the credit card account will be debited accordingly?<br /><br />atomic<br /><br />consistent<br /><br /><span style="color: rgb(0, 0, 255);">durable</span><br /><br />isolated<br /><br /><br />26<br />Refer to the exhibit. The network design documents include requirements to prevent<br />switching loops, to provide link-specific failover, and to provide Layer 3 recovery. Which<br />two protocols would be needed to provide the support? (Choose two.)<br /><br />HDLC<br /><br /><span style="color: rgb(0, 0, 255);">HSRP</span><br /><br />PPP<br /><br /><span style="color: rgb(0, 0, 255);">RSTP</span><br /><br />VTP<br /><br /><br />27<br />network design must minimize latency to support real-time streaming<br />applications. Which two protocols enable control and scalability of the network resources<br />and minimize latency by incorporating QoS mechanisms? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">RTCP</span><br /><br />HSRP<br /><br />RSTP<br /><br /><span style="color: rgb(64, 0, 255);">RTP<br /></span><br />RPC<br /><br /><br />28<br />Which two major differences are associated with IP telephony when<br />compared to traditional telephony that uses a PBX? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">manages phones centrally</span><br /><br />utilizes centralized call routing<br /><br /><span style="color: rgb(0, 0, 255);">creates peer-to-peer relationships between phones</span><br /><br />requires a separate infrastructure to support data transfer<br /><br />requires significant manual configuration when adding, moving, or changing phones<br /><br /><br />29<br />When QoS is implemented in a converged network, which two factors can<br />be controlled to improve performance? (Choose two.)<br /><br />link speed<br /><br /><span style="color: rgb(0, 0, 255);">delay</span><br /><br />packet routing<br /><br /><span style="color: rgb(0, 0, 255);">jitter</span><br /><br />packet addressing</span>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-4362355789213485390.post-8456267250838550152009-04-28T11:51:00.001-07:002009-09-24T23:30:51.742-07:00CCNA 4 Chapter 3 V4.01<br />It is important to identify the details of network sections and devices that will be affected or<br />involved in a new design. This information is included in which section of the Network Design<br />Requirements Document?<br /><br />Project Goal<br /><br /><span style="color: rgb(0, 0, 255);">Project Scope</span><br /><br />Technical Requirements<br /><br />Current State of the Network<br /><br /><br />2<br />Which two pieces of information does the network designer need to determine if the Cisco IOS of<br />a router requires an upgrade? (Choose two.)<br /><br />amount of NVRAM installed<br /><br /><span style="color: rgb(0, 0, 255);">model number of the router</span><br /><br />number of interfaces and installed HWICs<br /><br /><span style="color: rgb(0, 0, 255);">installed Cisco IOS feature set and version</span><br /><br />error statistics for each interface<br /><br /><br /><span id="fullpost">3<br />Which three pieces of information need to be considered when selecting the proper Cisco IOS<br />version for an upgrade? (Choose three.)<br /><br />processor ID<br /><br />interface type<br /><br /><span style="color: rgb(0, 0, 255);">amount of DRAM</span><br /><br />bootstrap version<br /><br /><span style="color: rgb(0, 0, 255);">device make and model<br /><br />size of system flash memory</span><br /><br /><br />4<br />What are two practices a network technician should follow when installing a new interface card in<br />a router? (Choose two.)<br /><br />Be sure the interface card faceplate does not touch the chassis rear panel.<br /><br />Do not tighten the captive screws until the router has been powered on and recognizes the card.<br /><br />Store the blank faceplate inside the card slot to be used if the card is removed.<br /><br /><span style="color: rgb(0, 0, 255);">Handle the interface card by the edges to avoid static discharge.<br /><br />Push the interface card into place until the edge connector is seated securely</span><br /><br /><br />5<br />The new serial interface card for the router arrives and the network technician reads that it is hotswappable.<br />What does this mean?<br /><br />The card cannot be installed while the router is powered on because static discharge<br />could damage the card.<br /><br />The card cannot be installed until the router is powered off and completely cooled down.<br /><br /><span style="color: rgb(0, 0, 255);">The card can be installed while the router is powered on if the router supports this technology.</span><br /><br />The card is a replacement and must be installed in the same slot as the card it is<br />replacing.<br /><br /><br />6<br />Refer to the exhibit. A network administrator issues the command shown to gain knowledge about<br />a poorly documented network. Which two pieces of information can the network administrator<br />discover from the command output? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">One connected device has router capability.</span><br /><br />The entire network contains a total of five Cisco devices with CDP enabled.<br /><br />None of the directly connected network devices have been configured with an IP address.<br /><br />Device EDGE_2811 is connected to port Fast Ethernet 0/0 on device C3750-24_MDF.<br /><br /><span style="color: rgb(0, 0, 255);">Five Cisco devices with CDP enabled are directly connected to device C3750-24_MDF</span><br /><br /><br />7<br />Refer to the exhibit. Which of the three Cisco IOS images shown will load into RAM?<br /><br />The router selects an image depending on the value of the configuration register.<br /><br />The router selects the third Cisco IOS image because it is the most recent IOS image.<br /><br />The router selects the second Cisco IOS image because it is the smallest IOS image.<br /><br /><span style="color: rgb(0, 0, 255);">The router selects an image depending on the boot system command in the configuration.</span><br /><br />The router selects the third Cisco IOS image because it contains the advipservicesk9<br />image.<br /><br /><br />8<br />An administrator wants to download a new Cisco IOS software version to the local router. Which<br />command performs this task?<br /><br /><span style="color: rgb(0, 0, 255);">copy tftp flash</span><br /><br />copy flash run<br /><br />copy start tftp<br /><br />copy flash tftp<br /><br />copy tftp start<br /><br /><br />9<br />Refer to the exhibit. The top of the output shows the Cisco Feature Navigator regarding a Cisco<br />IOS image that the administrator wants to install on a router. Below it is the output from the show<br />version command for that router. Which statement is true regarding the capacity of the router to<br />run this Cisco IOS image?<br /><br /><span style="color: rgb(0, 0, 255);">There is not enough DRAM and flash.</span><br /><br />There is enough DRAM and flash.<br /><br />There is enough DRAM but not enough flash.<br /><br />There is enough flash but not enough DRAM.<br /><br /><br />10<br />Which two items are objectives of a WLAN design site survey? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">identify coverage areas<br /><br />determine primary AP locations</span><br /><br />determine what AP equipment should be purchased<br /><br />determine how many users will access the WLAN<br /><br />identify the bottleneck of the LAN infrastructure<br /><br /><br />11<br />Refer to the exhibit. Which two actions improve the weaknesses of the topology shown, assuming<br />that each access layer segment is in its own subnet? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">Implement redundant links to each server by adding additional NICs.</span><br /><br />Implement a reduntant link from all access layer switches to Admin, Dist, and Server Farm.<br /><br /><span style="color: rgb(0, 0, 255);">Implement a backup firewall with a link to a secondary ISP and implement a redundant link to the DMZ.</span><br /><br />Implement reduntant links from the existing firewall to all access layer switches.<br /><br />Implement redundant links from the DMZ to Admin and Dist.<br /><br /><br />12<br />A company is beginning to analyze their new Cisco IOS upgrade requirements. What is one of the<br />router components that a network administrator must consider when selecting a new Cisco IOS version?<br /><br />processor type<br /><br />storage space in NVRAM<br /><br /><span style="color: rgb(0, 0, 255);">interfaces and modules to be supported</span><br /><br />compatibility of the bootstrap version with the new Cisco IOS software<br /><br /><br />13<br />An employee at a company notices that the wireless signal strength indicator on his laptop<br />fluctuates from good to low. The network administrator decides to do a site survey of that area.<br />Which three factors need to be included in the survey? (Choose three.)<br /><br />type and model number of the WNIC of the laptop<br /><br /><span style="color: rgb(0, 0, 255);">number of users in the area<br /><br />location of the AP</span><br /><br />list of MAC addresses filtered by the AP<br /><br />number of simultaneous applications running on the laptop of the employee<br /><br /><span style="color: rgb(0, 0, 255);">location of walls and filing cabinets in the office</span><br /><br /><br />14<br />The new network design for AnyCompany must include support of voice and video traffic. Before<br />upgrading, the network designer checks whether the existing devices can support the new<br />requirements. Which three items does the designer need to check? (Choose three.)<br /><br />number of routers and switches owned by AnyCompany<br /><br />routers that will support extra ASICs and WWICs<br /><br /><span style="color: rgb(0, 0, 255);">size of DRAM and flash on each device<br /><br />routers that will support HWICs and VWICs</span><br /><br />system bootstrap version on each router and switch<br /><br /><span style="color: rgb(0, 0, 255);">modules supported on the loaded Cisco IOS</span><br /><br /><br />15<br />A new Cisco IOS version has been copied into flash from a TFTP server. When a reload is issued<br />to upgrade the Cisco IOS, the router freezes part of the way through the loading process. What<br />could be the problem?<br /><br /><span style="color: rgb(0, 0, 255);">There is enough flash but not enough RAM in the router.</span><br /><br />The new HWIC cards have not been installed yet.<br /><br />The TFTP server needs to be present during a reload.<br /><br />The new Cisco IOS should have been loaded into NVRAM.<br /><br />The new bootstrap version is not compatible with the original version on the router.<br /><br /><br />16<br />Refer to the exhibit. A network designer has no documentation and is attempting to create a<br />logical diagram of the network using the output from show commands. What can be determined<br />from the output shown?<br /><br />The device with the ID of ISP is a router on the Internet.<br /><br />The attached switch is a VTP server in the Toronto domain.<br /><br /><span style="color: rgb(0, 0, 255);">The designer cannot telnet to the attached switch.</span><br /><br />The Cisco router IOS supports enterprise-level voice and video technologies.<br /><br /><br />17<br />A production router is reloaded and finishes with a Router> prompt. What three facts can be<br />determined? (Choose three.)<br /><br /><span style="color: rgb(0, 0, 255);">POST occurred normally.</span><br /><br />The boot process was interrupted.<br /><br />There is not enough RAM or flash on this router.<br /><br /><span style="color: rgb(0, 0, 255);">A full version of the Cisco IOS was located and loaded.<br /><br />A configuration file was not located in NVRAM or from a TFTP server.</span><br /><br />The router did not locate the Cisco IOS in flash, so it defaulted to ROM.<br /><br /><br />18<br />During a site survey, the network designer noticed that people were accessing the company<br />wireless network from the parking lot. What should be done to stop the wireless signal from<br />radiating out into the parking lot?<br /><br />change the channel on the wireless AP<br /><br />connect the wireless AP to a firewall<br /><br /><span style="color: rgb(0, 0, 255);">change the type of antenna attached to the AP</span><br /><br />move the wireless AP to a secure VLAN<br /><br />move the wireless AP to a port on a Layer 3 switch<br /><br /><br />19<br />A network design project includes a review of the existing network. What is the purpose of this<br />phase of the project?<br /><br />eliminate the need for a site survey<br /><br />shorten the timeframe of the project<br /><br />lower the cost of the project by removing redundant links and devices<br /><br />determine if the number of applications used within the company can be reduced<br /><br /><span style="color: rgb(0, 0, 255);">To determine what existing network devices require upgrades to meet the new</span><br /><br /><br />20<br />Refer to the exhibit. Based upon the Cisco IOS file naming convention, what is represented by<br />the value ipvoicek9 listed in the IOS filename?<br /><br />version<br /><br />file format<br /><br /><span style="color: rgb(0, 0, 255);">feature set</span><br /><br />hardware platform<br /><br /><br />21<br />Refer to the exhibit. What two items can be determined from the output? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">R2 is a Cisco 2600 device.</span><br /><br />R2 has 22 MB of RAM installed.<br /><br /><span style="color: rgb(0, 0, 255);">The version of the IOS is 12.3.</span><br /><br />Over 8 MB of NVRAM is installed.<br /><br />A new 36 MB IOS file can be installed on the device.<br /><br /><br />22<br />During a wireless site survey, a consultant is determining the hours of peak<br />usage and the estimated number of users in each location. The consultant is currently in what<br />step of the site survey process?<br /><br />the defining of customer requirements<br /><br /><span style="color: rgb(0, 0, 255);">the identification of coverage areas</span><br /><br />the determining of preliminary AP locations<br /><br />the measurement of signal strength<br /><br /><br />23<br />Refer to the exhibit. The network administrator is attempting to install a new version of the IOS on<br />R2. Based on the exhibited output, what are two possible reasons that the transfer failed?(Choose two.)<br /><br />The administrator did not enable TFTP on R2.<br /><br />There is not enough flash available to store the new IOS.<br /><br /><span style="color: rgb(0, 0, 255);">Connectivity between R2 and the TFTP server was not verified.</span><br /><br />The copy command was incorrectly entered.<br /><span style="color: rgb(0, 0, 255);"><br />The administrator did not verify that the TFTP server is running.</span><br /><br /><br />24<br />In which section of the Network Design Requirements document would a network<br />consulting team detail names and IP addresses of important networking components and servers,<br />provide network diagrams and topologies, and define strengths and weaknesses of the network?<br /><br />network requirements<br /><br />project scope<br /><br />overall project goal<br /><br /><span style="color: rgb(0, 0, 255);">state of the network</span></span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4362355789213485390.post-24389240060448223812009-04-28T11:50:00.001-07:002009-09-24T23:30:51.743-07:00CCNA 4 Chapter 2 V4.01<br />During an evaluation of the currently installed network, the IT staff<br />performs a gap analysis to determine whether the existing network infrastructure can<br />support the desired new features. At which stage of the Cisco Lifecycle Services<br />approach does this activity occur?<br /><br />Prepare Phase<br /><br /><span style="color: rgb(0, 0, 255);">Plan Phase</span><br /><br />Design Phase<br /><br />Implement Phase<br /><br />Operate Phase<br /><br />Optimize Phase<br /><br /><br />2<br />Which stage of the Cisco Lifecycle Services strategy is usually<br />completed before an organization issues a Request For Proposal (RFP) or Request For<br />Quotation (RFQ)?<br /><br /><span style="color: rgb(0, 0, 255);">Prepare Phase<br /></span><br />Plan Phase<br /><br />Design Phase<br /><br />Implement Phase<br /><br />Operate Phase<br /><br />Optimize Phase<br /><br /><br /><span id="fullpost">3<br />What is the purpose of SNMP?<br /><br /><span style="color: rgb(0, 0, 255);">to facilitate the exchange of information between devices and the NMS</span><br /><br />to monitor and control managed network devices<br /><br />to report user logins to a monitoring station<br /><br />to verify traffic throughout the network and keep a log of all activity<br /><br /><br />4<br />During an analysis of a customer network, several possible<br />opportunities for network improvement are identified. At which stage of the Cisco<br />Lifecycle Services does this process occur?<br /><br />Prepare Phase<br /><br />Plan Phase<br /><br /><span style="color: rgb(0, 0, 255);">Design Phase</span><br /><br />Implement Phase<br /><br />Optimize Phase<br /><br />Operate Phase<br /><br /><br />5<br />What provides the initial data for the Optimize Phase?<br /><br /><span style="color: rgb(0, 0, 255);">performance monitoring</span><br /><br />business goals<br /><br />technical goals<br /><br />RFP<br /><br /><br />6<br />Which two statements are true regarding the response to an RFQ?(Choose two.)<br /><br />The response should be brief.<br /><br /><span style="color: rgb(0, 0, 255);">it should strictly conform to the formatting requirements specified by the RFQ.</span><br /><br />Only the items that the contracting company will be addressing should be<br />answered.<br /><br /><span style="color: rgb(0, 0, 255);">The response helps the customer compare pricing with other potential contractors.</span><br /><br />The response is more complicated than a response to a RFP.<br /><br /><br />7<br />What are two disadvantages of using a bottom-up approach instead<br />of a top-down approach to network design? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">It can result in an inappropriate network design.</span><br /><br />A new design cannot be implemented right away.<br /><br /><span style="color: rgb(0, 0, 255);">It does not take into account the business goals of the company.</span><br /><br />This approach is not commonly practiced and is therefore not as well known.<br /><br />It requires tedious and time-consuming meetings with the customer to develop an<br />understanding of the organization.<br /><br /><br />8<br />What is a business constraint that may impact the WAN design of a company?<br /><br />company policy regarding specific operating systems on LAN devices<br /><br />current monitoring protocols implemented on end-user devices<br /><br />non-availability of end users during implementation<br /><br /><span style="color: rgb(0, 0, 255);">company policy requiring the use of specific vendor networking equipment due to<br />partnerships</span><br /><br /><br />9<br />What is the purpose of preparing a business case?<br /><br /><span style="color: rgb(0, 0, 255);">to justify the financial investment in implementing the technology change</span><br /><br />to provide an example of a previous job done in the RFP<br /><br />to define the technical requirements of the network<br /><br />to define timelines and critical milestones<br /><br /><br />10<br />What is the purpose of creating a prioritized list of technical<br />requirements?<br /><br /><span style="color: rgb(0, 0, 255);">defines the project scope</span><br /><br />determines the business profitability<br /><br />creates a feasibility report for analysis<br /><br />identifies existing and new user groups<br /><br /><br />11<br />A network engineer is analyzing the network of a potential client<br />company to identify problems and determine whether a network upgrade or addition is<br />needed. Which role in the sales team is this engineer assuming?<br /><br />post-sales field engineer<br /><br /><span style="color: rgb(0, 0, 255);">pre-sales engineer</span><br /><br />account manager<br /><br />network designer<br /><br /><br />12<br />Which two statements best describe the responsibilities of an<br />account manager? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">acts as the primary point of contact between the company and the client<br /><br />directs the sales teams and support personnel<br /></span><br />provides technical support to critical clients<br /><br />selects the equipment and technologies to be used for the client solution<br /><br />acts as the network design lead<br /><br /><br />13<br />What is the purpose of system-level acceptance testing?<br /><br />To develop an installation plan for the newly designed network<br /><br />to train end users and support personnel on the newly installed network<br /><br /><span style="color: rgb(0, 0, 255);">to check that the newly installed network meets the business goals and design<br />requirements</span><br /><br />to justify the financial investment required to implement the technology change<br /><br /><br />14<br />What is a purpose of establishing a network baseline?<br /><br />It provides a statistical average for network performance.<br /><br />It manages the performance of network devices.<br /><br /><span style="color: rgb(0, 0, 255);">It creates a point of reference for future network evaluations.</span><br /><br />It checks the security configuration of network devices.<br /><br /><br />15<br />When should a network baseline be performed within the stages of the Cisco Lifecycle Services?<br /><br />Prepare Phase<br /><br />Plan Phase<br /><br />Design Phase<br /><br />Implement Phase<br /><br /><span style="color: rgb(0, 0, 255);">Operate Phase</span><br /><br /><br />16<br />What are two benefits of using a top-down approach instead of a bottom-up approach to<br />network design? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">incorporates organizational requirements</span><br /><br />allows for a quick response to a design request<br /><br />requires less time up front to create a network design<br /><br /><span style="color: rgb(0, 0, 255);">clarifies design goals from the perspective of applications and network solutions</span><br /><br />facilitates a design by using devices and technologies that are based on previous<br />experience<br /><br /><br />17<br />Which software component is installed on network devices that are managed through SNMP?<br /><br /><span style="color: rgb(0, 0, 255);">management agents<br /></span><br />management stations<br /><br />network management protocol<br /><br />Management Information Base (MIB)<br /><br /><br />18<br />A network engineer working for a contracting company is<br />informed of a pre-bid meeting with a potential client. What purpose does the network<br />engineer have for attending the pre-bid meeting?<br /><br />to submit request for proposal responses<br /><br />to discuss proposed installation and monitoring plans<br /><br />to perform system-level acceptance tests on the current network<br /><br /><span style="color: rgb(0, 0, 255);">to clarify project scope and timelines not included in the original request for proposal</span><br /><br />to create a business case outlining reasons for financial investment in a network<br />upgrade<br /><br /><br />19<br />A major corporation has decided to hire someone to upgrade their<br />network infrastructure. A network consulting company wants the job. What document<br />must the network consulting company obtain to learn about the business goals, the project<br />scope, the requirements for the new network and the expected deliverables?<br /><br />Business Case<br /><br />Project Plan<br /><br /><span style="color: rgb(0, 0, 255);">Request for Proposal</span><br /><br />Request for Comments<br /><br /><br />20<br />A corporation (client) wants a network upgrade and is putting out a<br />request for services to various network consulting companies (contractors). A RFQ is<br />required. Which statement is true concerning the RFQ?<br /><br />sent from the contractors to the client in response to a RFP<br /><br />sent from the client to the contractors along with the RFP to provide more specific<br />technical details<br /><br /><span style="color: rgb(0, 0, 255);">sent from the client to the contractors in place of a RFP when the technical<br />specifications of a project are known</span><br /><br />sent from the contractors to the client outlining reasons for financial investments<br />for the network upgrade<br /><br /><br />21<br />Which stage of the Cisco Lifecycle Services involves proactive<br />management to identify and resolve issues before the organization is affected?<br /><br />Prepare Phase<br /><br />Plan Phase<br /><br />Design Phase<br /><br />Implement Phase<br /><br />Operate Phase<br /><br /><span style="color: rgb(0, 0, 255);">Optimize Phase</span><br /><br /><br />22<br />Why is it important to prioritize business goals when developing<br />network design?<br /><br />to ensure that the least expensive technologies are implemented first<br /><br />to simplify the configuration, administration, and monitoring of the newly<br />installed network<br /><br />to anticipate the effects of changes and growth of the business<br /><br /><span style="color: rgb(0, 0, 255);">to adhere to the best opportunities to contribute to the success of the business</span><br /><br /><br />23<br />Which two items help identify business goals and priorities before<br />a new network project starts? (Choose two.)<br /><br />installation<br /><br /><span style="color: rgb(0, 0, 255);">motivation<br /><br />profitability<br /></span><br />trustworthiness<br /><br />customer satisfaction<br /><br /><br />24<br />A network engineer working for ABC company is writing a<br />response to an RFP for a network upgrade and must create an executive summary. Which<br />statement describes the basic components of an executive summary?<br /><br /><span style="color: rgb(0, 0, 255);">quick overview of the problem, the recommended solution, and the justification<br />for ABC company doing the job</span><br /><br />detailed description of the solution, including but not limited to, timelines, turnover<br />schedule, warranty information, and emergency recovery information<br /><br />detailed description of costs including, the cost of software and hardware<br />components, licensing requirements, labor cost, and other applicable fees<br /><br />multiple page document containing additional information such as detailed lists of<br />equipment required, diagrams, company background information, and insurance coverage<br /><br /><br />25<br />In a network management architecture, which statement best<br />describes a management agent?<br /><br />communication protocol used between a management station and managed device<br /><br />standardized database that a device keeps about itself concerning network<br />performance parameters<br /><br />host with the management application loaded that is used by the administrator to<br />monitor and configure network devices<br /><br /><span style="color: rgb(0, 0, 255);">software running on a managed device to collect network information and allow<br />that device to be managed by a management station</span></span>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-4362355789213485390.post-64355841938365745082009-04-28T11:49:00.002-07:002009-09-24T23:30:51.744-07:00CCNA 4 Chapter 1 V4.01<br />What are two mechanisms that provide redundancy for server farm<br />implementations? (Choose two.)<br /><br />host intrusion prevention systems<br /><br />virtual private networks<br /><br />network intrusion prevention systems<br /><br /><span style="color: rgb(0, 0, 255);">Rapid Spanning Tree Protocol<br /><br />Hot Standby Routing Protocol</span><br /><br /><br />2<br />The ability to connect securely to a private network over a public network is<br />provided by which WAN technology?<br /><br />DSL<br /><br />Frame Relay<br /><br />ISDN<br /><br />PSTN<br /><br /><span style="color: rgb(0, 0, 255);">VPN</span><br /><br /><br /><span id="fullpost">3<br />Which three statements describe the functions of the Cisco hierarchical network<br />design model? (Choose three.)<br /><br />Route summarization is not necessary at the core and distribution layers.<br /><br /><span style="color: rgb(0, 0, 255);">The distribution layer is responsible for traffic filtering and isolating failures from<br />the core.<br /><br />Two goals of the core layer are 100 percent uptime and maximizing throughput.<br /><br />The access layer provides a means of connecting end devices to the network.</span><br /><br />The distribution layer distributes network traffic directly to end users.<br /><br />The core layer usually employs a star topology.<br /><br /><br />4<br />A network designer is creating a new network. The design must offer enough<br />redundancy to provide protection against a single link or device failure, yet must not be too<br />complex or expensive to implement. What topology would fill these needs?<br /><br />star<br /><br />full mesh<br /><br /><span style="color: rgb(0, 0, 255);">partial mesh</span><br /><br />extended star<br /><br />hub and spoke<br /><br /><br />5<br />Refer to the exhibit. If the firewall module has been correctly configured using best practices for<br />network security, which statement is true about the security design for the network?<br /><br />Servers in the network are not protected from internal attacks.<br /><br /><span style="color: rgb(0, 0, 255);">Servers in the DMZ are protected from internal and external attacks.</span><br /><br />Servers in the server farm are protected from internal and external attacks.<br /><br />Traffic from the external networks is not able to access the servers in the DMZ.<br /><br /><br />6<br />Which statement is true about a DMZ in a traditional network firewall design?<br /><br />A DMZ is designed to provide service for external access but not for internal access.<br /><br /><span style="color: rgb(0, 0, 255);">Servers in the DMZ provide limited information that can be accessed from external<br />networks.</span><br /><br />User access to the DMZ from the Internet and the internal network usually is<br />treated the same way.<br /><br />All servers in the enterprise network should be located in a DMZ because of enhanced<br />security measures.<br /><br /><br />7<br />download and upload documents on the network file server. What network connection would be<br />most cost efficient while still meeting the security and connectivity needs of this teleworker?<br /><br />dedicated leased line connection with a dialup backup link<br /><br />Frame Relay connection with a DSL backup link<br /><br /><span style="color: rgb(0, 0, 255);">DSL VPN connection with a dialup backup link</span><br /><br />ATM connection with a DSL VPN backup link<br /><br />DSL connection with no backup link<br /><br /><br />8<br />Refer to the exhibit. The network administrator creates a standard access control list to prohibit<br />traffic from the 192.168.1.0/24 network from reaching the 192.168.2.0/24 network while still<br />permitting Internet access for all networks. On which router interface and in which direction<br />should it be applied?<br /><br />interface fa0/0, inbound<br /><br />interface fa0/0, outbound<br /><br />interface fa0/1, inbound<br /><br /><span style="color: rgb(0, 0, 255);">interface fa0/1, outbound</span><br /><br /><br />9<br />Refer to the exhibit. The server broadcasts an ARP request for the MAC address of its default<br />gateway. If STP is not enabled, what is the result of this ARP request?<br /><br />Router_1 contains the broadcast and replies with the MAC address of the next-hop<br />router.<br /><br />Switch_A replies with the MAC address of the Router_1 E0 interface.<br /><br /><span style="color: rgb(0, 0, 255);">Switch_A and Switch_B continuously flood the message onto the network.</span><br /><br />Switch_B forwards the broadcast request and replies with the Router_1 address.<br /><br /><br />10<br />What are two best practices in wireless LAN design to ensure secure wireless<br />access to the corporate network? (Choose two.)<br /><br />Configure APs for broadcast SSID.<br /><br />Place APs as far apart as possible.<br /><br /><span style="color: rgb(0, 0, 255);">Use a separate WLAN for employees.<br /><br />Configure WPA.</span><br /><br />Use wireless routers in all IDFs.<br /><br /><br />11<br />In a well-designed, high-availability network, which device significantly affects the<br />most users if a failure occurs?<br /><br />desktop PC of the user<br /><br />large switch in the network core layer<br /><br />large switch in the network distribution layer<br /><br /><span style="color: rgb(0, 0, 255);">small workgroup switch in the network access layer</span><br /><br /><br />12<br />Which two statements are true regarding network convergence? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">In a large network, using the EIGRP or OSPF routing protocols rather than RIPv2 may<br />improve convergence time.</span><br /><br />Using STP at the core layer improves convergence time by allowing the use of<br />redundant links between devices.<br /><br /><span style="color: rgb(0, 0, 255);">Route summarization improves convergence time by minimizing the size of the routing<br />table.</span><br /><br />A full mesh topology improves convergence time by allowing load balancing.<br /><br />ACLs can be configured to improve convergence time.<br /><br /><br />13<br />Centralizing servers in a data center server farm can provide which benefit over a<br />distributed server environment?<br /><br />It keeps client-to-server traffic local to a single subnet.<br /><br />Servers located in a data center require less bandwidth.<br /><br /><span style="color: rgb(0, 0, 255);">It is easier to filter and prioritize traffic to and from the data center.</span><br /><br />Server farms are not subject to denial of service attacks.<br /><br /><br />14<br />Refer to the exhibit. What effect does the ACL shown have on network traffic, assuming that it is<br />correctly applied to the interface?<br /><br />All traffic to network 172.16.0.0 is denied.<br /><br />All TCP traffic is denied to and from network 172.16.0.0.<br /><br /><span style="color: rgb(0, 0, 255);">All Telnet traffic from the 172.16.0.0 network to any destination is denied.</span><br /><br />All port 23 traffic to the 172.16.0.0 network is denied.<br /><br />All traffic from the 172.16.0.0 network is denied to any other network.<br /><br /><br />15<br />Which Cisco IOS function can be configured at the distribution layer to filter<br />unwanted traffic and provide traffic management?<br /><br />virus protection<br /><br />spyware protection<br /><br />VPNs<br /><br /><span style="color: rgb(0, 0, 255);">access control lists</span><br /><br /><br />16<br />What kind of ACL inspects outbound UDP, TCP, and ICMP traffic and allows<br />inbound access only to traffic that belongs to these established sessions?<br /><br />dynamic ACL<br /><br />time-based ACL<br /><br /><span style="color: rgb(0, 0, 255);">reflexive ACL</span><br /><br />lock and key ACL<br /><br /><br />17<br />Which three functions are performed at the distribution layer of the hierarchical<br />network model? (Choose three.)<br /><br /><span style="color: rgb(0, 0, 255);">summarizing routes from the access layer</span><br /><br />allowing end users to access the local network<br /><br />providing the gateway of last resort for core layer devices<br /><br />preserving bandwidth at the access layer by filtering network functions<br /><br /><span style="color: rgb(0, 0, 255);">isolating network problems to prevent them from affecting the core layer<br /><br />utilizing redundant links for load balancing to increase available bandwidth</span><br /><br /><br />18<br />Refer to the exhibit. Which two devices are part of the access design layer? (Choose two.)<br /><br />Edge2<br /><br />ISP4<br /><br />BR4<br /><br /><span style="color: rgb(0, 0, 255);">FC-AP</span><br /><br />FC-CPE-1<br /><br /><span style="color: rgb(0, 0, 255);">FC-ASW-2</span><br /><br /><br />19<br />What is true about implementing a centralized server farm topology?<br /><br />requires direct cabling from the MPOE to enhance the performance of servers<br /><br />requires the addition of high-capacity switches to each workgroup<br /><br /><span style="color: rgb(0, 0, 255);">provides defined entry and exit points so that filtering and securing traffic is easier</span><br /><br />allows for placement of workgroup servers at the access layer<br /><br /><br />20<br />Refer to the exhibit. What happens when Host 1 attempts to send data?<br /><br />Frames from Host 1 are dropped, but no other action is taken.<br /><br /><span style="color: rgb(0, 0, 255);">Frames from Host 1 cause the interface to shut down, and a log message is sent.</span><br /><br />Frames from Host 1 are forwarded, but a log message is sent.<br /><br />Frames from Host 1 are forwarded, and the mac-address table is updated.<br /><br /><br />21<br />Which two considerations are valid when designing access layer security?(Choose two.)<br /><br />In a large wireless network, the most efficient method to secure the WLAN is MAC<br />address filtering.<br /><br />DoS attacks are normally launched against end-user PCs and can be mitigated by<br />installing personal firewalls on all company PCs.<br /><br /><span style="color: rgb(0, 0, 255);">SSH is more secure than Telnet to administer network devices.<br /><br />Disabling unused ports on the switches helps prevent unauthorized access to the<br />network.</span><br /><br />All Telnet passwords are at least 6 characters long.<br /><br /><br />22<br />What address can be used to summarize only networks 172.16.0.0/24,<br />172.16.1.0/24, 172.16.2.0/24, and 172.16.3.0/24?<br /><br />172.16.0.0/21<br /><br /><span style="color: rgb(0, 0, 255);">172.16.0.0/22</span><br /><br />172.16.0.0 255.255.255.248<br /><br />172.16.0.0 255.255.254.0<br /><br /><br />23<br />Which two items in a physical WLAN design can be identified through a site<br />survey? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">the types of antennas that are required</span><br /><br />the encryption techniques that are required<br /><br /><span style="color: rgb(0, 0, 255);">the access point hardware that is required</span><br /><br />the different levels of access that are required<br /><br />the connection reliability that is required<br /><br /><br />24<br />Refer to the exhibit. Which two statements correctly describe the benefits of the network access<br />layer design that is shown? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">If host A sends a broadcast message, only hosts in VLAN10 receive the broadcast frame.</span><br /><br />If host A attempts to transmit data at the same time as another host, only hosts in<br />VLAN10 are affected by the collision.<br /><br /><span style="color: rgb(0, 0, 255);">Segmenting all voice traffic on a separate VLAN facilitates the implementation of QoS.</span><br /><br />VLANs improve network performance by facilitating the use of route<br />summarization.<br /><br />VLANs at the access layer help guarantee network availability by facilitating load<br />balancing.<br /><br /><br />25<br />What are three ways to ensure that an unwanted user does not connect to a<br />wireless network and view the data? (Choose three.)<br /><br /><span style="color: rgb(0, 0, 255);">Disable SSID broadcasting.</span><br /><br />Configure filters to restrict IP addresses.<br /><br /><span style="color: rgb(0, 0, 255);">Use authentication between clients and the wireless device.</span><br /><br />Use NetBIOS name filtering between clients and the wireless device.<br /><br /><span style="color: rgb(0, 0, 255);">Configure strong encryption such as WPA.</span><br /><br />Use a WEP compression method.</span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4362355789213485390.post-16414698265599770002009-04-28T11:49:00.001-07:002009-09-24T23:30:42.514-07:00CCNA 3 Final Exam V4.0Note: These answers will give you an 88.2%. numbers 7,16,18,24,26,31,46,51,52,53 are incorrect. Please correct wrong answers. Would like to thank cujoc1111 for this exam<br /><br /><br />1<br /><br />Refer to the exhibit. A network administrator noticed that the VLAN configuration changes at SW2 did not propagate to SW3. On the basis of the partial output of the show vtp status command, what is the possible cause of the problem?<br /><br />VTP V2 mode is disabled.<br /><br /><span style="color: rgb(0, 0, 255);">SW3 is configured as transparent mode.</span><br /><br />The number of existing VLANs does not match.<br /><br />The configuration revision number does not match.<br /><br /><br /><br /><span id="fullpost">2<br /><br />Refer to the exhibit. Which route will appear in the routing table?<br /><br />R 10.10.4.0/24 [120/1] via 10.10.10.1, 00:00:12, FastEthernet0/1<br /><br />R 10.10.4.0/24 [120/1] via 10.10.20.1, 00:00:12, FastEthernet0/0<br /><br />R 10.10.4.0/24 [120/2] via 10.10.20.1, 00:00:12, FastEthernet0/0<br /><br /><span style="color: rgb(0, 0, 255);">R 10.10.4.0/24 [120/3] via 10.10.30.1, 00:00:12, FastEthernet1/0</span><br /><br />R 10.10.4.0/24 [120/1] via 10.10.30.1, 00:00:12, FastEthernet1/0<br /><br /><br /><br />3<br />What will be the two wildcard masks required in an extended access list statement that blocks traffic to host 192.168.5.45 from the 172.16.240.0/27 network? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">0.0.0.0</span><br /><br />255.255.240.0<br /><br />255.255.255.255<br /><br />0.0.31.255<br /><br />255.255.255.240<br /><br /><span style="color: rgb(0, 0, 255);">0.0.0.31</span><br /><br /><br /><br />4<br />Which bandwidth allocation technique minimizes bandwidth waste by reallocating unused time slices to communicating users?<br /><br />VPN<br /><br />NCP<br /><br />TDM<br /><br />STP<br /><br /><span style="color: rgb(0, 0, 255);">STDM</span><br /><br /><br /><br />5<br />Which two statements are true about RIPv1 and RIPv2? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">Both versions broadcast updates on port 520.</span><br /><br />Both versions send the subnet mask as part of the update.<br /><br />By default, both versions will receive RIPv1 and RIPv2 updates.<br /><br /><span style="color: rgb(0, 0, 255);">Both versions support the features of split horizon and poison reverse.</span><br /><br />By default, both versions automatically summarize routes.<br /><br />RIPv1 has a higher AD than RIPv2 has.<br /><br /><br /><br />6<br /><br />Refer to the exhibit. A network administrator must manually summarize all IP addresses on the POP router for the ISP. Which one is the correct summary address?<br /><br /><span style="color: rgb(0, 0, 255);">192.168.0.0/22</span><br /><br />192.168.0.0/23<br /><br />192.168.0.0/24<br /><br />192.168.0.0/25<br /><br /><br /><br /><span style="color: rgb(255, 0, 0);"> 7</span><br />After comparing a previous baseline to current network statistics, the network engineer has discovered a significant increase in unwarranted traffic to the extranet. Which two steps simplify administration and control the unwanted traffic? (Choose two.)<br /><br />define an ACL at the distribution layer to isolate packets<br /><br /><span style="color: rgb(0, 0, 255);">add an ACL at the router in the enterprise edge to block the traffic</span><br /><br />deploy a Layer 3 switch to contain broadcasts<br /><br />connect remote locations directly to the intranet<br /><br /><span style="color: rgb(0, 0, 255);">configure all hosts with the same default gateway to eliminate unnecessary broadcasts</span><br /><br />deploy one core ISP router to reduce the delay in path determination<br /><br /><br /><br />8<br />What do companies gain from the services performed at the enterprise edge?<br /><br />faster communication with server farms<br /><br /><span style="color: rgb(0, 0, 255);">stronger security against malicious attacks</span><br /><br />faster communication with Internet destinations<br /><br />enhanced performance and reliability through VLANs and redundant trunk links<br /><br /><br /><br />9<br /><br />Refer to the exhibit. What two pieces of information can be gathered from the output of this command? (Choose two.)<br /><br />172.16.16.0/20 is a manually summarized route.<br /><br /><span style="color: rgb(0, 0, 255);">All subnets are being advertised because default summarization was disabled.</span><br /><br />The output verifies that EIGRP is advertising only the networks in the same AS.<br /><br />The 172.16.1.0/24 network is directly attached to the router that produced this output.<br /><br /><span style="color: rgb(0, 0, 255);">The Null0 interface indicates that this is not an actual path, but a summary for advertising purposes.</span><br /><br /><br /><br />10<br /><br />Refer to the exhibit. Assuming that the RIPv1 routing protocol is enabled and that all networks are being advertised, which statement is true?<br /><br />All packets from H1 that are destined to H2 will arrive at H2.<br /><br /><span style="color: rgb(0, 0, 255);">None of the packets from H1 that are destined to H2 will arrive at H2.</span><br /><br />Approximately half the traffic from H1 that is destined to H2 will reach R3.<br /><br />Some of the packets from H1 that are destined to H2 will be sent to the switch that is connected to network 192.168.3.64/26.<br /><br /><br /><br />11<br />Which statement is accurate about the CIR in Frame Relay?<br /><br />It is important to purchase a CIR that matches the highest bandwidth requirements of the enterprise.<br /><br />The CIR can be no lower than the port speed of the local loop.<br /><br />The CIR defines the contracted maximum rate available from the service provider on the Frame Relay circuit.<br /><br /><span style="color: rgb(0, 0, 255);">It is possible to burst over the CIR if bandwidth is available.</span><br /><br /><br /><br />12<br />What are two characteristics of an extended ACL? (Choose two.)<br /><br />IP is used to specify TCP traffic only.<br /><br />IP is used to specify TCP and UDP traffic only.<br /><br /><span style="color: rgb(0, 0, 255);">IP is used to specify all TCP/IP protocols including TCP, UDP, ICMP and routing protocols.</span><br /><br />Traffic can be filtered on source address only.<br /><br />Traffic can be filtered on source and destination address only.<br /><br /><span style="color: rgb(0, 0, 255);">Traffic can be filtered on source and destination address, protocol, and specific port number.</span><br /><br /><br /><br />13<br /><br />Refer to the exhibit. In what sequence (from first to last) does an OSPF router check the parameters listed when selecting the DR?<br /><br />C, B, A, D<br /><br />D, C, B, A<br /><br />A, B, C, D<br /><br />A, C, B, D<br /><br /><span style="color: rgb(0, 0, 255);">B, C, A, D</span><br /><br /><br /><br />14<br /><br /><br />Refer to the exhibit. What three facts represent the result of DR and BDR elections in this OSPF network? (Choose three.)<br /><br /><span style="color: rgb(0, 0, 255);">RTC will be the DR of 10.5.0.0/30.</span><br /><br />RTD will be the BDR of 10.5.0.0/30.<br /><br /><span style="color: rgb(0, 0, 255);">RTD will be the DR of 10.4.0.0/28.</span><br /><br />RTB will be the BDR of 10.7.0.0/28.<br /><br /><span style="color: rgb(0, 0, 255);">RTB will be the DR of 10.7.0.0/28.</span><br /><br />RTA will be the BDR of 10.4.0.0/28.<br /><br /><br /><br />15<br />Which two statements describe how the information contained in a BPDU is used by a switch? (Choose two.)<br /><br />to set the duplex mode of a redundant link<br /><br />to activate looped paths throughout the network<br /><br /><span style="color: rgb(0, 0, 255);">to determine the root bridge</span><br /><br />to prevent loops by sharing routing tables between connected switches<br /><br /><span style="color: rgb(0, 0, 255);">to determine which ports are placed in forwarding mode</span><br /><br /><br /><span style="color: rgb(255, 0, 0);">16</span><br />If a modem is being used to connect to an ISP, which WAN connection type is being used?<br /><br />leased line<br /><br />cell switched<br /><br /><span style="color: rgb(0, 0, 255);">circuit switched</span><br /><br />packet switched<br /><br /><br /><br />17<br /><br />Refer to the exhibit. A network administrator enters the command ip route 10.10.4.16 255.255.255.248 s0/0/1 into the router. What will be the result of this configuration?<br /><br /><span style="color: rgb(0, 0, 255);">A static route pointing to 10.10.4.16/29 is placed into the routing table.</span><br /><br />A static route to 10.10.4.16/29 is placed into the routing table if interface FastEthernet0/1 goes down.<br /><br />A static route pointing to 10.10.4.16/29 is only placed into the routing table if the route to 10.10.4.0 is removed.<br /><br />A static route is not placed into the routing table because a RIP route that includes the destination network already exists.<br /><br /><br /><br /><span style="color: rgb(255, 0, 0);">18</span><br /><br />Refer to the exhibit. What is represented by the Null0 route for the 128.107.0.0 network?<br /><br />a child route that is defined<br /><br />a parent route that is defined and sourced from a physical interface<br /><br /><span style="color: rgb(0, 0, 255);">a summary route for advertising purposes, not an actual path</span><br /><br />the result of the no auto-summary command on a router<br /><br /><br /><br />19<br />What are two ways VLAN memberships can be created in an enterprise network? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">manually configuring the switch ports to be part of a VLAN</span><br /><br />allowing the user to choose a specific VLAN through a GUI menu<br /><br />configuring the switch to allow VLAN membership based on NetBIOS association<br /><br />implementing an access list that specifies which devices are placed into specific VLANs.<br /><br /><span style="color: rgb(0, 0, 255);">associating MAC addresses to specific VLANs in a VLAN management policy server database</span><br /><br />manually configuring the host devices to be part of a VLAN<br /><br /><br /><br />20<br />If an authentication protocol is configured for PPP operation, when is the client or user workstation authenticated?<br /><br />prior to link establishment<br /><br />during the link establishment phase<br /><br /><span style="color: rgb(0, 0, 255);">before the network layer protocol configuration begins</span><br /><br />after the network layer protocol configuration has ended<br /><br /><br /><br />21<br /><br />Refer to the exhibit. R1 is connected to the Internet through its serial 0/0/0 interface. Hosts on the 192.168.100.0/24 LAN on R1 cannot communicate with hosts on the Internet. What two NAT configuration issues might explain this failure? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">The ip nat pool command has not been applied correctly.</span><br /><br />The inside interface has not been defined on R1.<br /><br />The access list does not include the group of IP addresses that are supported by the inside network.<br /><br /><span style="color: rgb(0, 0, 255);">The ip address that is assigned to the serial 0/0/0 interface is incorrect.</span><br /><br />The outside interface has not been defined on R1.<br /><br /><br /><br />22<br />A network administrator wants to deny responses to ping requests. Which ACL statement denies ping responses while not affecting other traffic?<br /><br />access-list 123 deny tcp any any eq 80<br /><br />access-list 123 deny tcp any any eq 20<br /><br />access-list 123 deny tcp any any eq 21<br /><br /><span style="color: rgb(0, 0, 255);">access-list 123 deny icmp any any echo-reply</span><br /><br />access-list 101 deny tcp any any established<br /><br /><br /><br />23<br /><br />Refer to the exhibit. Which IP addressing scheme would be correct for the network?<br /><br />H1-172.18.0.10/16<br />H2-172.18.0.11/16<br />H3-172.18.0.12/16<br /><br /><span style="color: rgb(0, 0, 255);">H1-172.18.0.10/16<br />H2-172.19.0.10/16<br />H3-172.18.0.11/16</span><br /><br />H1-172.18.0.10/16<br />H2-172.18.0.11/16<br />H3-172.19.0.11/16<br /><br />H1-172.18.0.10/16<br />H2-172.19.0.11/16<br />H3-172.19.0.11/16<br /><br /><br /><span style="color: rgb(255, 0, 0);">24</span><br /><br />Refer to the exhibit. Internet access is crucial for the company network shown. Internet access is provided by two ISPs. ISP1 is the primary provider and ISP2 is the backup provider. The network administrator configures BorderR as the border router so that in normal operations, all Internet traffic goes through ISP1. However, if the link to ISP1 fails, then BorderR will automatically forward Internet traffic to ISP2. The administrator configures two default routes:<br /><br />BorderR(config)# ip route 0.0.0.0 0.0.0.0 192.168.100.1 200<br />BorderR(config)# ip route 0.0.0.0 0.0.0.0 172.16.1.1<br /><br />However, when the administrator issued the show ip route command to verify the configuration, only the second default route is in the routing table. Why is the first default route not showing?<br /><br />The first configuration command overwrites the second command.<br /><br />The first default route will be installed into the routing table if there is traffic with an IP address that is destined for the 192.168.100.0 network.<br /><br /><span style="color: rgb(0, 0, 255);">This is expected because the link to ISP1 is active. If the link to ISP1 goes down, then the first default route will be installed into the routing table.</span><br /><br />The first default route cannot be installed into the routing table unless the administrator manually disables the second default route with the no ip route 0.0.0.0 0.0.0.0 172.16.1.1 command.<br /><br /><br /><br />25<br />Which command should a network administrator issue to disable default summarization in an EIGRP network?<br /><br />Router(config-router)# null 0 route<br /><br />Router(config-if)# no ip summary-address<br /><br />Router(config-router)# no ip summary-address<br /><br />Router(config-if)# no auto-summary<br /><br /><span style="color: rgb(0, 0, 255);">Router(config-router)# no auto-summary</span><br /><br /><br /><br /><span style="color: rgb(255, 0, 0);">26</span><br />The headquarters of a corporation uses static routes to connect to three branch offices. What are two advantages of using static routes for the WAN connections? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">Static routes are more secure.</span><br /><br />Static routes converge faster.<br /><br />Static routes have higher administrative distances than dynamic routing protocols.<br /><br />The metrics of a static route need adjusting only if the bandwidth of the WAN connection changes.<br /><br /><span style="color: rgb(0, 0, 255);">They are more stable and less susceptible to network changes in the interior gateway protocol.</span><br /><br /><br /><br />27<br />What two statements are true regarding EIGRP tables? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">A feasible successor route can be found in the topology table.<br /></span><br />A successor route can only be found in the routing table.<br /><br /><span style="color: rgb(0, 0, 255);">The topology table shows whether a route is in the passive or active state.</span><br /><br />The routing table shows the amount of time elapsed since a router adjacency was formed.<br /><br />The neighbor table shows all adjacent Cisco devices.<br /><br />Administrative distance is shown as a column in the neighbor table.<br /><br /><br /><br />28<br /><br />Refer to the exhibit. A company has recently installed a new switch (S2) into their network. After several minutes, the network administrator notices that the new VLAN information is not being propagated to the new switch. Given the show vtp status command output, what is the possible problem that prevents the information from being received by the new switch?<br /><br /><span style="color: rgb(0, 0, 255);">VTP version mismatch</span><br /><br />VTP domain name mismatch<br /><br />VTP revision number mismatch<br /><br />time synchronization problems<br /><br /><br />29<br /><br />Refer to the exhibit. An administrator is adding a new router to the network. The IP address 192.168.13.6/30 has been assigned to the connecting serial interface on R2. What IP address must the administrator assign to the serial interface of the new router?<br /><br />192.168.13.4/30<br /><br /><span style="color: rgb(0, 0, 255);">192.168.13.5/30</span><br /><br />192.168.13.7/30<br /><br />192.168.13.58/30<br /><br />192.168.13.61/27<br /><br />192.168.13.63/27<br /><br /><br /><br />30<br /><br />Refer to the exhibit. A network support technician has been asked to set an IP address on one of the FastEthernet interfaces on a new router. What is causing the interface to reject the address?<br /><br />The IP address is already in use.<br /><br /><span style="color: rgb(0, 0, 255);">The technician is using a network address.</span><br /><br />The technician is using the wrong subnet mask for /26.<br /><br />The technician must enable VLSM on the interface.<br /><br /><br /><span style="color: rgb(255, 0, 0);">31</span><br />Why would a network administrator want to limit the size of failure domains when designing a network?<br /><br />to eliminate the effects of Ethernet collisions<br /><br /><span style="color: rgb(0, 0, 255);">to reduce the impact of a key device or service failure</span><br /><br />to reduce the impact of Internet congestion on critical traffic<br /><br />to eliminate the need to block broadcast packets at the edge of the local network<br /><br /><br /><br />32<br /><br />Refer to the exhibit. RIPv2 is configured in the network shown. Hosts in the network have access to all internal networks but do not have Internet access. On which router should the commands, shown in the exhibit, be added to provide Internet access for all hosts in the network?<br /><br />R1<br /><br /><span style="color: rgb(0, 0, 255);">R2</span><br /><br />R3<br /><br />ISP<br /><br /><br /><br />33<br /><br />Refer to the exhibit. If R4 is announcing all shown internal networks as a summary address to the ISP, which summary address will be most specific?<br /><br />192.168.1.0/22<br /><br />192.168.4.0/21<br /><br />192.168.6.0/23<br /><br /><span style="color: rgb(0, 0, 255);">192.168.8.0/21</span><br /><br />192.168.4.0/22<br /><br /><br /><br />34<br />When MD5 authentication is used for OSPF routing protocol authentication, what two facts are known about the key? (Choose two.)<br /><br />The key passes between routers in plain text.<br /><br />The key is used to help generate an encrypted number for authentication.<br /><br />The key passes between routers in encrypted form.<br /><br /><span style="color: rgb(0, 0, 255);">The key is never transmitted.</span><br /><br />The key can be captured by using a packet sniffer.<br /><br /><br /><br />35<br />What are two benefits of implementing VLANs in an enterprise network? (Choose two.)<br /><br />eliminates the need for a Layer 3 device<br /><br /><span style="color: rgb(0, 0, 255);">provides segmentation of broadcast domains</span><br /><br />allows for the propagation of broadcasts from one local network to another<br /><br /><span style="color: rgb(0, 0, 255);">allows for the logical grouping of devices despite physical location</span><br /><br />prevents issues such as broadcast storms by ensuring a loop free environment<br /><br /><br /><br />36<br /><br /><br />Refer to the exhibit. Because of continuing instability of one of the serial links in the OSPF network, a network administrator configures router ASBR as shown. Which two statements will be a result of this configuration? (Choose two.)<br /><br />Traffic intended for destinations across unstable serial links will be forwarded by ASBR even when the links are down.<br /><br /><span style="color: rgb(0, 0, 255);">A summary route of 192.168.0.0/22 will be advertised to the ISP router.</span><br /><br />Serial links in range 192.168.0.0 255.255.252.0 will be forced into a passive state.<br /><br />Networks connected to the unstable serial links will be placed in an unreachable state.<br /><br /><span style="color: rgb(0, 0, 255);">Negative effects of route flapping will be reduced.<br /></span><br /><br /><br />37<br /><br />Refer to the exhibit. OSPF is enabled and the network has completely converged. Which two routers will be designated as DROTHER routers? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">R1<br /><br />R2</span><br /><br />R3<br /><br />R4<br /><br /><br /><br />38<br /><br />Refer to the exhibit. Users on the 172.30.20.0/24 network are unable to access any of the servers located on the 192.168.0.0/23 network. Given the network topology and OSPF configuration, what two problems exist in this network? (Choose two.)<br /><br />There is a routing loop occurring between all three routers.<br /><br /><span style="color: rgb(0, 0, 255);">There is a network statement missing.<br /><br />Network 172.30.20.0 has an incorrect wildcard mask.</span><br /><br />The OSPF Area configuration is incorrect.<br /><br />/23 is an invalid subnet mask for the 192.168.0.0 network.<br /><br /><br /><br />39<br />Which two statements are true about the native VLAN on a switch? (Choose two.)<br /><br />It requires a special VLAN ID tag.<br /><br />It is unable to be changed to a different VLAN.<br /><br />Untagged traffic slows the switching process down.<br /><br /><span style="color: rgb(0, 0, 255);">The native VLAN defaults to VLAN 1 on Cisco Catalyst switches.<br /><br />Untagged frames that are received on a trunk become members of this VLAN.</span><br /><br /><br /><br />40<br />In which VTP mode can a switch create VLANs, ignore VTP messages, and not pass local VLAN information to other VTP domain members?<br /><br />client<br /><br /><span style="color: rgb(0, 0, 255);">server</span><br /><br />pruning<br /><br />transparent<br /><br /><br /><br />41<br />Assuming VLSM is not being used, what impact will adding the command ip route 172.16.64.0 255.255.240.0 serial0/0 have on a router that is already operational in a network?<br /><br />All packets with a destination address between 172.16.64.1 and 172.16.80.254 will be forwarded out serial0/0.<br /><br />All packets with a destination address between 172.16.64.1 and 172.16.255.254 will be forwarded out serial0/0.<br /><br /><span style="color: rgb(0, 0, 255);">All packets with a destination address between 172.16.64.1 and 172.16.79.254 will be forwarded out serial0/0.</span><br /><br />All packets with a destination address between 172.16.0.1 and 172.16.64.254 will be forwarded out serial0/0.<br /><br /><br /><br />42<br /><br />What is the term for the value 2172416 that is highlighted in the output of the show ip eigrp topology command?<br /><br />feasible distance of the successor<br /><br />reported distance of the successor<br /><br />feasible distance of the feasible successor<br /><br /><span style="color: rgb(0, 0, 255);">reported distance of the feasible successor</span><br /><br /><br /><br />43<br /><br />Refer to the exhibit. R1 and R2 are connected via serial interfaces. Both interfaces show that there is Layer 2 connectivity between them. The administrator verifies that CDP is operational; however, pings between the two interfaces are unsuccessful. What is the cause of this connectivity problem?<br /><br />no set loopback<br /><br /><span style="color: rgb(0, 0, 255);">incorrect subnet mask on R2</span><br /><br />incompatible bandwidth<br /><br />incorrect IP address on R1<br /><br />incompatible encapsulation<br /><br /><br /><br />44<br />Which two statements are true regarding a PPP connection between two Cisco routers? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">LCP tests the quality of the link.<br /><br />LCP manages compression on the link.</span><br /><br />Only a single NCP is allowed between the two routers.<br /><br />NCP terminates the link when data exchange is complete.<br /><br />With CHAP authentication, the routers exchange plain text passwords.<br /><br /><br /><br />45<br /><br />Refer to the exhibit. All routes in the exhibit are available to a router. Which two routes will be placed into the routing table? (Choose two.)<br /><br />A<br /><br /><span style="color: rgb(0, 0, 255);">B<br /><br />C</span><br /><br />D<br /><br />E<br /><br />F<br /><br /><br /><span style="color: rgb(255, 0, 0);">46</span><br />Which two criteria are used by STP to select a root bridge? (Choose two.)<br /><br />memory size<br /><br /><span style="color: rgb(0, 0, 255);">bridge priority</span><br /><br />number of ports<br /><br />switch location<br /><br />switching speed<br /><br /><span style="color: rgb(0, 0, 255);">base MAC address</span><br /><br /><br /><br />47<br /><br />Refer to the exhibit. What two conclusions can be drawn from the displayed output? (Choose two.)<br /><br />A packet with a destination IP address of 172.20.1.14 will exit the router via the Serial 0/1/0 interface.<br /><br />The default administrative distance for EIGRP has been changed.<br /><br /><span style="color: rgb(0, 0, 255);">Network 172.20.1.4 can be reached through two possible routes of equal cost.<br /><br />The addresses on this network were created using VLSM.</span><br /><br />The router connected to Serial 0/1/1 is advertising four separate routes through EIGRP to this router.<br /><br /><br /><br />48<br /><br />Refer to the exhibit. The network is using OSPF as the routing protocol. A network administrator issues the show ip ospf neighbor command to check the status of operation. Which statement is true?<br /><br />RB has the lowest priority value.<br /><br />RC and RD have the lowest router IDs on the network.<br /><br /><span style="color: rgb(0, 0, 255);">RA has established adjacencies with all neighbor routers. </span><br /><br />RA and RB can not form an adjacency because they are stuck in the 2-way state.<br /><br /><br /><br />49<br /><br />Refer to the exhibit. If router RTA fails, which statement is true?<br /><br /><span style="color: rgb(0, 0, 255);">Hosts A and B can reach each other, but cannot reach hosts C and D or the server.</span><br /><br />No host can reach any other host.<br /><br />Hosts A, B, C, and D can reach each other, but cannot reach the server.<br /><br />All hosts can reach each other.<br /><br /><br /><br />50<br /><br />Refer to the exhibit. Assuming that all three routers are configured with the EIGRP routing protocol and sharing information, what information can be gathered from the show command output?<br /><br />Router B has EIGRP adjacencies with both router A and C.<br /><br />Router B has a fully converged topology table.<br /><br />Router B has not formed an adjacency with router A.<br /><br /><span style="color: rgb(0, 0, 255);">Router B has not formed an adjacency with router C</span>.<br /><br /><br /><br /><span style="color: rgb(255, 0, 0);">51</span><br />A sales representative is preparing to send sensitive information to corporate headquarters from a hotel room using the Internet. Prior to the trip, the IT staff made the necessary provisions to allow secure Internet access. What solution was implemented for the sales representative?<br /><br /><span style="color: rgb(0, 0, 255);">VPN</span><br /><br />Frame Relay<br /><br />PPP with CHAP authentication<br /><br />PPP with PAP authentication<br /><br /><br /><br /><span style="color: rgb(255, 0, 0);">52</span><br /><br />Refer to the exhibit. A network administrator wishes to deny Internet access to all R2 LAN hosts, while allowing these hosts to reach all other devices on the company networks. Where should the ACL shown in the exhibit be placed to meet these requirements?<br /><br />R2: Fa0/0 inbound<br /><br /><span style="color: rgb(0, 0, 255);">R1: S0/1/0 outbound</span><br /><br />R1: S0/0/1 inbound<br /><br />R2: S0/0/1 outbound<br /><br />R2: Fa0/0 outbound<br /><br /><br /><br /><span style="color: rgb(255, 0, 0);">53</span><br />Which three statements are true about RSTP? (Choose three.)<br /><br />RSTP can fall back to STP to provide support for legacy equipment.<br /><br /><span style="color: rgb(0, 0, 255);">RSTP and STP have the same number of port states.<br /></span><br />Like PortFast and UplinkFast, RSTP is a proprietary protocol.<br /><br />RSTP takes up to 50 seconds to converge.<br /><br /><span style="color: rgb(0, 0, 255);">RSTP requires a point-to-point, full-duplex connection.<br /><br />RSTP views all ports that are not discarding as part of an active topology.</span><br /><br /><br /><br />54<br />A company is using a Class B IP addressing scheme and expects to need as many as 150 networks. What is the correct subnet mask to use with the network configuration?<br /><br />255.255.0.0<br /><br />255.255.240.0<br /><br />255.255.254.0<br /><br /><span style="color: rgb(0, 0, 255);">255.255.255.0</span><br /><br />255.255.255.128<br /><br />255.255.255.192<br /><br /><br /><br />55<br />A sales representative is using a wireless connection to make a VoIP call. Which protocol will be used to transport the voice packets?<br /><br />TCP<br /><br /><span style="color: rgb(0, 0, 255);">UDP</span><br /><br />PPP<br /><br />HDLC<br /><br /><br /><br />56<br /><br />Refer to the exhibit. What is the purpose of the command: RouterA(config)# access-list 1 permit 192.168.16.0 0.0.0.255?<br /><br />It identifies traffic on all inside interfaces to be translated and given access to the ISP router.<br /><br />It identifies traffic from the fa0/1 interface to be translated and given access to the ISP router.<br /><br />It allows traffic from the ISP to reach all of the inside interfaces.<br /><br /><span style="color: rgb(0, 0, 255);">It identifies traffic from the fa0/0 interface to be translated and given access to the ISP router.</span><br /><br />It allows traffic from the ISP router to the fa0/1 interface.<br /><br /><br /><br />57<br /><br />Refer to the exhibit. Server7 has been added to the server farm network. The hosts can ping Servers 2 and 3 and Server2 and Server3 can ping each other. Server7 cannot ping the other servers connected to the switch. What is the cause of this problem?<br /><br />The Fa0/1 port on the switch should be in access mode.<br /><br />The switch IP address is not on the same subnet as Server7.<br /><br /><span style="color: rgb(0, 0, 255);">The switch port used for Server7 is not in the same VLAN as Server2 and Server3.<br /></span><br />The Fa0/0 interface of the router has not been configured for subinterfaces to support inter-VLAN routing.<br /><br /><br /><br />58<br />Which three IP addresses are valid host addresses in the 10.200.0.0/20 network? (Choose three.)<br /><br /><span style="color: rgb(0, 0, 255);">10.200.11.69</span><br /><br />10.200.16.1<br /><br /><span style="color: rgb(0, 0, 255);">10.200.0.255</span><br /><br />10.201.0.55<br /><br /><span style="color: rgb(0, 0, 255);">10.200.15.240</span><br /><br />10.200.30.29</span>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-4362355789213485390.post-21481011721189750532009-04-28T11:48:00.003-07:002009-09-24T23:30:42.515-07:00CCNA 3 Chapter 9 V4.01<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivL8i9F1QqbHxc1mhDWzJuiiW96i_RPvgT6jaWySI7vt03uQIRXt4x66Zq_TliONZU5wMJbMejoCj_GzgHqSqd_Cilyzrw-vGg0mOqbS2IgbQ_y1eBuuBG_3PmyFlx-byMmcilxd1VLEB_/s1600-h/1.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 369px; height: 400px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivL8i9F1QqbHxc1mhDWzJuiiW96i_RPvgT6jaWySI7vt03uQIRXt4x66Zq_TliONZU5wMJbMejoCj_GzgHqSqd_Cilyzrw-vGg0mOqbS2IgbQ_y1eBuuBG_3PmyFlx-byMmcilxd1VLEB_/s400/1.jpg" alt="" id="BLOGGER_PHOTO_ID_5322522954250081554" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. Based on the output shown, to which IP network should the workstations in the Support department belong?<br /><br />192.168.1.0<br /><br />172.16.1.0<br /><br /><span style="color: rgb(0, 0, 255);">172.16.3.0</span><br /><br />172.16.5.0<br /><br /><br /><br /><span id="fullpost">2<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDS0Tu36mvd91KZNqP4Bfq1_fOR8trCq8ZvzsZIKFNPYA-MFXFBhlPnMdPPWyquS2RlXlPc-9xKakujyGSg7OUM_CnYEzKRY7W9ONdzSFa216cnXFwZHQCdBnqzurN8QWJTNCKk-WrpHf9/s1600-h/2.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 368px; height: 400px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDS0Tu36mvd91KZNqP4Bfq1_fOR8trCq8ZvzsZIKFNPYA-MFXFBhlPnMdPPWyquS2RlXlPc-9xKakujyGSg7OUM_CnYEzKRY7W9ONdzSFa216cnXFwZHQCdBnqzurN8QWJTNCKk-WrpHf9/s400/2.jpg" alt="" id="BLOGGER_PHOTO_ID_5322523086834342306" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. A network administrator is doing proactive network maintenance. The administrator pings 192.168.1.100 and compares the results to the baseline data. Based on the comparison of the two pings, what is one possibility?<br /><br />There is an ACL applied, making the destination host unreachable.<br /><br />There is a malfunctioning NIC on the destination host.<br /><br />The sending host is unable to access the network.<br /><br /><span style="color: rgb(0, 0, 255);">There are congestion problems on the network.</span><br /><br /><br /><br />3<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmM_eYmvNoKm3svaqwC_4Vi24riYYNd1gtnkl-bDlnopwDVVXMqqisEnm5OzuUIywi-11IMR9Xl8AvmVA7uDTfAi8iEKk5uPYypry6iEveCSmtZtj9uuVJ3BG06Ed7retxlXVuI8MAyv1_/s1600-h/3.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 160px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmM_eYmvNoKm3svaqwC_4Vi24riYYNd1gtnkl-bDlnopwDVVXMqqisEnm5OzuUIywi-11IMR9Xl8AvmVA7uDTfAi8iEKk5uPYypry6iEveCSmtZtj9uuVJ3BG06Ed7retxlXVuI8MAyv1_/s400/3.jpg" alt="" id="BLOGGER_PHOTO_ID_5322523208747623794" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. Given the output generated by the debug ppp negotiation command, which statement is true?<br /><br /><span style="color: rgb(0, 0, 255);">The line protocol of the local router is now up.</span><br /><br />The username ’Goleta’ is configured locally.<br /><br />The command ppp authentication pap is configured on both routers.<br /><br />The local router requested to terminate the session.<br /><br /><br /><br />4<br />What is important to consider while configuring the subinterfaces of a router when implementing inter-VLAN routing?<br /><br />The subinterface numbers must match the VLAN ID number.<br /><br />The physical interface must have an IP address configured.<br /><br /><span style="color: rgb(0, 0, 255);">The IP address of each subinterface must be the default gateway address for each VLAN subnet.</span><br /><br />The no shutdown command must be given on each subinterface.<br /><br /><br /><br />5<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxjM-UhnNwsbWfTltsckVPro9H_5a-iJwN-RuCC4rC3mnj460jTEp6bpas7La738NNSrcYqmNvTMN_WwwIdlJKv79oUl85DoK_YL1aRT3t0mykUzO5EgSfk5odk-qKNGD1F9z2nOZ0xv5G/s1600-h/6.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 96px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxjM-UhnNwsbWfTltsckVPro9H_5a-iJwN-RuCC4rC3mnj460jTEp6bpas7La738NNSrcYqmNvTMN_WwwIdlJKv79oUl85DoK_YL1aRT3t0mykUzO5EgSfk5odk-qKNGD1F9z2nOZ0xv5G/s400/6.jpg" alt="" id="BLOGGER_PHOTO_ID_5322523334853661826" border="0" /></a><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. A lab technician connects two routers together via a serial cable using the default interface configuration values. The interfaces are up; however, the technician is unable to ping between the two devices. What is the most likely problem?<br /><br />The lab technician used the wrong cable to connect the serial ports.<br /><br />There is an IP mismatch between the serial ports.<br /><br />There is an encapsulation mismatch between the serial ports.<br /><br /><span style="color: rgb(0, 0, 255);">No clock rate has been set on the DCE interface.</span><br /><br /><br /><br />6<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgH8AAsyA6Q71TjCdWUycyZQhgRPYd35CLGHMG6GcoEWkvmSo3SxUITHbKxMSoXZhFXH_ej7nClVaHge1rvEmDP4UAFTQDTCJGPdorABXipJnrCGZMe6fnBnr7GRT62r0-6bcO_FMPlpWoR/s1600-h/5.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 234px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgH8AAsyA6Q71TjCdWUycyZQhgRPYd35CLGHMG6GcoEWkvmSo3SxUITHbKxMSoXZhFXH_ej7nClVaHge1rvEmDP4UAFTQDTCJGPdorABXipJnrCGZMe6fnBnr7GRT62r0-6bcO_FMPlpWoR/s400/5.jpg" alt="" id="BLOGGER_PHOTO_ID_5322523449973158578" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. Based on the output shown, why is VTP information unable to propagate the network?<br /><br />One of the two client mode switches must be reconfigured to Transparent mode.<br /><br />Each switch must be synchronized to the network time server.<br /><br /><span style="color: rgb(0, 0, 255);">The VTP domain names are different.</span><br /><br />VTP passwords must be set.<br /><br />The configuration revision numbers are all the same.<br /><br /><br /><br />7<br />The enterprise mail server software recently went through a minor update. A network administrator notices an excessive amount of traffic between a database server and the newly updated mail server, compared to the baseline data. What is the first action the administrator should do to investigate the problem?<br /><br />Wait to see if the recent update will stabilize after a while.<br /><br />Redo the baseline data to include the minor upgrade.<br /><br /><span style="color: rgb(0, 0, 255);">Check the log to see what software components are producing the excess traffic.</span><br /><br />Check for viruses and spyware on the database server.<br /><br /><br /><br />8<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdPzcksWDzsFcTJZP3mkAuKrK2UR2GAf46fBjtWcNdWj8qMMu4wFALgbYsCj2K8wnmIiGoNvODaBUq_SF1F-9cHEB42YW5UrGuAJORVGkA8z2qVO-Kb0ulkwWZNB_c5yjU2-AIPSU5XAhp/s1600-h/8.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 176px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdPzcksWDzsFcTJZP3mkAuKrK2UR2GAf46fBjtWcNdWj8qMMu4wFALgbYsCj2K8wnmIiGoNvODaBUq_SF1F-9cHEB42YW5UrGuAJORVGkA8z2qVO-Kb0ulkwWZNB_c5yjU2-AIPSU5XAhp/s400/8.jpg" alt="" id="BLOGGER_PHOTO_ID_5322523577041365458" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. Users are reporting that they cannot access the Internet. Routers R1 and R2 are configured with RIP version 2 as shown. If R2 receives a packet with a destination address on the Internet, how is the packet routed?<br /><br />The packet is routed to the ISP router and then to network 10.1.1.0/24.<br /><br />The packet is routed to the ISP router and then to the Internet.<br /><br /><span style="color: rgb(0, 0, 255);">The packet is routed to R1 and then forwarded out Fa0/0 on R1.</span><br /><br />The packet will not be routed because R2 does not have a valid default route.<br /><br /><br /><br />9<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjalHgtW2YXpBY5_akjLHRW9shyxcncyxgsUFCzqiWlkGfEXVJVOT7PglRXIQ7YqLPnm64JVKV_Fulbjnhf5tOKFTZUhyhNwpmH0Sy66AD2my1pgDJW2GAkbOII06-P1IUq0aoPmGr9Kjup/s1600-h/9.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 253px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjalHgtW2YXpBY5_akjLHRW9shyxcncyxgsUFCzqiWlkGfEXVJVOT7PglRXIQ7YqLPnm64JVKV_Fulbjnhf5tOKFTZUhyhNwpmH0Sy66AD2my1pgDJW2GAkbOII06-P1IUq0aoPmGr9Kjup/s400/9.jpg" alt="" id="BLOGGER_PHOTO_ID_5322523703083459714" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. Both routers are configured using RIPv1. Both routers are sending updates about the directly connected routes. R1 can successfully ping the serial interface of R2. The routing table on R1 does not contain any dynamically learned routes from R2, and the routing table on R2 shows no dynamically learned routes from R1. What is the problem?<br /><br />Subnetting is not supported by RIPv1.<br /><br />One of the routers needs a clock rate on the serial interface.<br /><br />The serial link between the two routers is unstable.<br /><br /><span style="color: rgb(0, 0, 255);">VLSM is not supported by RIPv1.</span><br /><br /><br /><br />10<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCptKMgISWuka2hEfkuKyo2NKiwD3vfdn7bqJ7wqP9n-A5wG1hqZcnXZIb8r7yK_NqdDZVfTHT7FI-HJzxkRE3AYFTNpC8EXqpo7wKiFd3pNUXLXfUIK9ShFdkG4BuOt0PeLgibfXOdUB_/s1600-h/10.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 291px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCptKMgISWuka2hEfkuKyo2NKiwD3vfdn7bqJ7wqP9n-A5wG1hqZcnXZIb8r7yK_NqdDZVfTHT7FI-HJzxkRE3AYFTNpC8EXqpo7wKiFd3pNUXLXfUIK9ShFdkG4BuOt0PeLgibfXOdUB_/s400/10.jpg" alt="" id="BLOGGER_PHOTO_ID_5322523825765489874" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. Host 192.168.1.14 is unable to download email from 192.168.2.200. After reviewing the output of the show running-config command, what problem is discovered?<br /><br />Access to the SMTP server is denied.<br /><br /><span style="color: rgb(0, 0, 255);">The destination host address in an ACL statement is incorrect.</span><br /><br />The ACL is applied to the interface in the wrong direction.<br /><br />The implicit deny any any is blocking all access to email.<br /><br /><br /><br />11<br />An employee called the help desk to report a laptop that could not access a web-based application on the Internet. The help desk technician asked the employee to open a Windows command prompt and type the ipconfig /all command. Which problem-solving technique did the technician choose?<br /><br />top-down<br /><br />bottom-up<br /><br />substitution<br /><br /><span style="color: rgb(0, 0, 255);">divide-and-conquer</span><br /><br /><br /><br />12<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQJp6hmKw4ZX9d8uUW4tb1AgM7o9QEEDs8W7GeZULz9hcD-lzuUE-WUpnS_Kw4wqJFhygK-Nbr4fkQAnrQgl040_tuLQZxEtB2XTrg6TJIIPfpt_QLJm2D1BVDD5RUFcZ1GYEOKJu95kta/s1600-h/12.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 393px; height: 400px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQJp6hmKw4ZX9d8uUW4tb1AgM7o9QEEDs8W7GeZULz9hcD-lzuUE-WUpnS_Kw4wqJFhygK-Nbr4fkQAnrQgl040_tuLQZxEtB2XTrg6TJIIPfpt_QLJm2D1BVDD5RUFcZ1GYEOKJu95kta/s400/12.jpg" alt="" id="BLOGGER_PHOTO_ID_5322523953727931138" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. Based on the network diagram and the output shown, which statement is true?<br /><br /><span style="color: rgb(0, 0, 255);">The command was entered on router R1.</span><br /><br />The command was entered on router R2.<br /><br />The command was entered on router R3.<br /><br />The command could have been entered on either R1 or R2.<br /><br /><br /><br />13<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrgAA6PRJQ4WBY_ICa6iLCoocLCZdvPpdj-M2IdetsmKjZfzUTJw5b-fXzNBHhJcxffER6hDnJQE2RkATrN9eL-klOhiokCQ9XwOkcKTa_EC8-G9ORnhE6rM-l9Ekz8u8qYlNdsNxSNzQX/s1600-h/13.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 365px; height: 356px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrgAA6PRJQ4WBY_ICa6iLCoocLCZdvPpdj-M2IdetsmKjZfzUTJw5b-fXzNBHhJcxffER6hDnJQE2RkATrN9eL-klOhiokCQ9XwOkcKTa_EC8-G9ORnhE6rM-l9Ekz8u8qYlNdsNxSNzQX/s400/13.jpg" alt="" id="BLOGGER_PHOTO_ID_5322524074008508690" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. An ACL is configured to prevent access by network 192.168.1.0 to network 192.168.2.0, but it is not working properly. What problem is discovered after observing the output of the show running-config command?<br /><br />The protocol type specified in the ACL should be TCP, not IP.<br /><br />The source and destination addresses are reversed in the statement.<br /><br /><span style="color: rgb(0, 0, 255);">The ACL is applied to the wrong interface, but the right direction.</span><br /><br />The ACL is applied to the wrong interface and the wrong direction.<br /><br />The permit ip any any statement allows network 192.168.1.0 access.<br /><br /><br /><br />14<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiox6XCOVEkkXIuoGjmn59sPdEqZWek1mRTXd02hGd8PlxyxCODRcbm_CQBMYeOZkO4bnVePsKIB00C6T7OPjIoP9b_j9sI8TFApm-Sy9k83YrBoZsI4V_IcbH5-yj3oNwnScIPkzDg77g8/s1600-h/14.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 224px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiox6XCOVEkkXIuoGjmn59sPdEqZWek1mRTXd02hGd8PlxyxCODRcbm_CQBMYeOZkO4bnVePsKIB00C6T7OPjIoP9b_j9sI8TFApm-Sy9k83YrBoZsI4V_IcbH5-yj3oNwnScIPkzDg77g8/s400/14.jpg" alt="" id="BLOGGER_PHOTO_ID_5322524196172715570" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Although all networks are reachable, the network administrator notices abnormal routing behavior after configuring OSPF on each router. According to the partial output from the debug ip ospf events command, which statement is true about the contents of the routing table in RA?<br /><br /><span style="color: rgb(0, 0, 255);">It will show network 172.16.3.0 learned from RB.</span><br /><br />It will show network 172.16.3.0 learned from RC.<br /><br />It will show two equal routes to network 192.168.1.4/30.<br /><br />It will show two equal routes to network 192.168.1.8/30.<br /><br /><br /><br />15<br />A network at a large building failed, causing a severe disruption in business activities. The problem was eventually detected and resolved by replacing a piece of failed network equipment. Investigation led to the conclusion that a network design problem was the main cause of the disruption. Loss of a single piece of equipment should not have been able to cause such a large problem. What two terms best describe this type of design weakness? (Choose two.)<br /><br />bottleneck<br /><br />limited availability<br /><br />limited scalability<br /><br /><span style="color: rgb(0, 0, 255);">large failure domain<br /><br />single point of failure</span><br /><br />limited staff capabilities<br /><br /><br /><br />16<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwstSs32PxH0Q-GnpGPvJVwlXO5sDQFsb26_J6ARCi_9aACtT3AZZQTGr_Qnd57FLRi5tGtISIMnq7uPZrm0JXkAVN7E6jSzZ-NAdEU74Kf5I9wB_dwe8VJ2AgcInWAkbTgykeVL5Q3QhZ/s1600-h/16.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 213px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwstSs32PxH0Q-GnpGPvJVwlXO5sDQFsb26_J6ARCi_9aACtT3AZZQTGr_Qnd57FLRi5tGtISIMnq7uPZrm0JXkAVN7E6jSzZ-NAdEU74Kf5I9wB_dwe8VJ2AgcInWAkbTgykeVL5Q3QhZ/s400/16.jpg" alt="" id="BLOGGER_PHOTO_ID_5322524324841372018" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. The network administrator is troubleshooting the connectivity issue between RA and RB. According to the partial configuration, what is the cause of the problem?<br /><br /><span style="color: rgb(0, 0, 255);">password mismatch for PPP authentication</span><br /><br />username mismatch for PPP authentication<br /><br />encapsulation method mismatch for PPP authentication<br /><br />authentication method mismatch for PPP authentication<br /><br /><br /><br />17<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8xzBx1ZkbacPfCsRJ76roTlMqvZOEW7XH5mi5uIWX8P84-gKJrZCg_8Vj8Ah_c_vC3JaPrFnPimil0ytfk88DvHB7wRmvTyjx1FSwiZqpkU5TIbU4mxOK25JjJ7083PDvP4oN4EBMbb2B/s1600-h/17.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 119px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8xzBx1ZkbacPfCsRJ76roTlMqvZOEW7XH5mi5uIWX8P84-gKJrZCg_8Vj8Ah_c_vC3JaPrFnPimil0ytfk88DvHB7wRmvTyjx1FSwiZqpkU5TIbU4mxOK25JjJ7083PDvP4oN4EBMbb2B/s400/17.jpg" alt="" id="BLOGGER_PHOTO_ID_5322524436778969234" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. ABC Company is using the 172.16.0.0/18 network. It is standard company practice to use the first 50 addresses for switches and servers and assign the last usable address to the router. The remaining addresses are assigned to the hosts. After assigning the addresses, the network technician tests connectivity from the host above and is not able to ping the router. What could be the problem?<br /><br />The router was assigned the broadcast address.<br /><br />The host is not in the same subnet as the switch and router.<br /><br /><span style="color: rgb(0, 0, 255);">The router interface is in the wrong subnet.</span><br /><br />The host was assigned a network address.<br /><br /><br /><br />18<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7Fq54jXvi94KgXONk09usGiuUnMEsaeWp7ggYTn7oZGGgOM7flrkB4d3KQnzR_lKpNbU6s5Xpkrm_QAoGQRXEtjRY76sjqw2x0EpvrMQztArhPfzduUKiqJ9JFgojHpmPIdVp60zOcLHW/s1600-h/18.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 299px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7Fq54jXvi94KgXONk09usGiuUnMEsaeWp7ggYTn7oZGGgOM7flrkB4d3KQnzR_lKpNbU6s5Xpkrm_QAoGQRXEtjRY76sjqw2x0EpvrMQztArhPfzduUKiqJ9JFgojHpmPIdVp60zOcLHW/s400/18.jpg" alt="" id="BLOGGER_PHOTO_ID_5322524552657400994" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. A network administrator is troubleshooting a problem. No users are able to access the 10.10.2.0/24 network, but are able to access all other networks. Assuming R3 is configured correctly and based on the output shown, what is most likely the problem?<br /><br />There is congestion on the 10.10.2.0 network.<br /><br /><span style="color: rgb(0, 0, 255);">The EIGRP process number on R2 is incorrect.</span><br /><br />The Fa0/0 interface on R2 is shut down.<br /><br />The Fa0/0 interface on R2 has an incorrect IP address or subnet mask.<br /><br /><br /><br />19<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjf7ygXRWjKCJhmJulQNj785oqzDvdqrSkwdjmZWgyYTqBbO66745ZakNcmuUYpyrZobb47pJVW59Dp-5i0dVEBQ5RCTYjRn_L5tIpVGAXST3wjoRVWLbtq2avQKzUHlnkVjbCfIQc3Xy6T/s1600-h/19.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 254px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjf7ygXRWjKCJhmJulQNj785oqzDvdqrSkwdjmZWgyYTqBbO66745ZakNcmuUYpyrZobb47pJVW59Dp-5i0dVEBQ5RCTYjRn_L5tIpVGAXST3wjoRVWLbtq2avQKzUHlnkVjbCfIQc3Xy6T/s400/19.jpg" alt="" id="BLOGGER_PHOTO_ID_5322524667988245634" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. The network administrator correctly configures RTA to perform inter-VLAN routing. Using the show vlan command, the administrator verifies that port Fast Ethernet 0/4 is the first available port in the default VLAN on SW2. The administrator connects RTA to port 0/4 on SW2, but inter-VLAN routing does not work. What could be the possible cause of the problem with the SW2 configuration?<br /><br />Port 0/4 is not active.<br /><br />Port 0/4 must be a member of VLAN1.<br /><br /><span style="color: rgb(0, 0, 255);">Port 0/4 is configured in access mode.</span><br /><br />Port 0/4 is configured as a trunk port.<br /><br /><br /><br />20<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidb19Ty9W8D4tlu_PuzxcmVzzwOJkdnLQLtwAcGY24BOz7tgUgc8HvoWLhnLLWNlE2BQGpOxod8E5MgK2-c9yCiugMI7J2WBZP_tNJTuBdzOMPvROQsjLW87A_k87swEbM1LiL4jecSAVy/s1600-h/20.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 228px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidb19Ty9W8D4tlu_PuzxcmVzzwOJkdnLQLtwAcGY24BOz7tgUgc8HvoWLhnLLWNlE2BQGpOxod8E5MgK2-c9yCiugMI7J2WBZP_tNJTuBdzOMPvROQsjLW87A_k87swEbM1LiL4jecSAVy/s400/20.jpg" alt="" id="BLOGGER_PHOTO_ID_5322524786887048946" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. The network administrator is unable to ping from the console of router R3 to host 10.10.4.63. What is the problem?<br /><br />RIPv1 does not support VLSM.<br /><br />Router R2 does not have RIP correctly configured.<br /><br />Router R3 is missing a network statement for network 10.0.0.0.<br /><br /><span style="color: rgb(0, 0, 255);">There is an addressing problem on the link between routers R2 and R3.</span><br /><br /><br /><br />21<br /><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjj_CHqxWeLySED680fcY5R81EEBcILk1CRn2niidMmA-8wrRm3bpE-v5LSlFMmoT0vDmalGHjy0ips_Aqzv4quhb8Kky3TJYkBcajfKYZiPpLfVO4ZYtOPJIVD4Fxu0ODf89QUkcB6RZsA/s1600-h/21.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 222px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjj_CHqxWeLySED680fcY5R81EEBcILk1CRn2niidMmA-8wrRm3bpE-v5LSlFMmoT0vDmalGHjy0ips_Aqzv4quhb8Kky3TJYkBcajfKYZiPpLfVO4ZYtOPJIVD4Fxu0ODf89QUkcB6RZsA/s400/21.jpg" alt="" id="BLOGGER_PHOTO_ID_5322524936990464002" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. A network administrator has implemented subnetting using the network 192.168.25.0 and a /28 mask. Workstation 1 is not able to ping with Workstation 2. What is a possible cause for this lack of communication?<br /><br />Workstation 1 and Workstation 2 are on the same subnet.<br /><br />The serial connections are using addresses from the LAN subnets.<br /><br />All hosts in the network must be in the same subnet to communicate.<br /><br /><span style="color: rgb(0, 0, 255);">Workstation 1 is not on the same network that the RTA router LAN interface is on.</span><br /><br /><br /><br />22<br />Which two statements describe when a network administrator should perform a network baseline? (Choose two.)<br /><br />It should be done monthly as a minimum standard.<br /><br /><span style="color: rgb(0, 0, 255);">It should be performed when all switch Cisco IOS versions are upgraded.</span><br /><br />It should be done when all network printers are upgraded to a new model.<br /><br /><span style="color: rgb(0, 0, 255);">It should be done when the network is performing at normal activity levels.</span><br /><br />It should be done whenever an SLA has been signed with a new service provider.</span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4362355789213485390.post-17603537108279207562009-04-28T11:48:00.001-07:002009-09-24T23:30:42.516-07:00CCNA 3 Chapter 8 V4.01.<br /><br />Refer to the exhibit. A network administrator needs to add the command deny ip 10.0.0.0 0.255.255.255 any log to R3. After adding the command, the administrator verifies the change using the show access-list command. What sequence number does the new entry have?<br />0<br />10, and all other items are shifted down to the next sequence number<br />50<br />60 *****<br /><br /><br />2<br /><br />Refer to the exhibit. What happens if the network administrator issues the commands shown when an ACL called Managers already exists on the router?<br />The new commands overwrite the current Managers ACL.<br />The new commands are added to the end of the current Managers ACL. *****<br />The new commands are added to the beginning of the current Managers ACL.<br />An error appears stating that the ACL already exists.<br /><br /><span id="fullpost">3<br />Why are inbound ACLs more efficient for the router than outbound ACLs?<br />Inbound ACLs deny packets before routing lookups are required. *****<br />Inbound ACL operation requires less network bandwidth than outbound.<br />Inbound ACLs permit or deny packets to LANs, which are typically more efficient than WANs.<br />Inbound ACLs are applied to Ethernet interfaces, while outbound ACLs are applied to slower serial interfaces.<br /><br /><br />4<br /><br />Refer to the exhibit. The network administrator of a company needs to configure the router RTA to allow its business partner (Partner A) to access the web server located in the internal network. The web server is assigned a private IP address, and a static NAT is configured on the router for its public IP address. Finally, the administrator adds the ACL. However, Partner A is denied access to the web server. What is the cause of the problem?<br />Port 80 should be specified in the ACL. *****<br />The public IP address of the server, 209.165.201.5, should be specified as the destination.<br />The ACL should be applied on the s0/0 outbound interface.<br />The source address should be specified as 198.133.219.0 255.255.255.0 in the ACL.<br /><br /><br /><br />5<br />ACL logging generates what type of syslog message?<br />unstable network<br />warning<br />informational *****<br />critical situation<br /><br /><br />6<br />Which two host addresses are included in the range specified by 172.16.31.64 0.0.0.31? (Choose two.)<br />172.16.31.64<br />172.16.31.77 ****<br />172.16.31.78 ****<br />172.16.31.95<br />172.16.31.96<br /><br /><br /><br />7<br />Traffic from the 64.104.48.0 to 64.104.63.255 range must be denied access to the network. What wildcard mask would the network administrator configure in the access list to cover this range?<br />0.0.15.255 *****<br />0.0.47.255<br />0.0.63.255<br />255.255.240.0<br /><br /><br /><br />8<br />ACLs are used primarily to filter traffic. What are two additional uses of ACLs? (Choose two.)<br />specifying source addresses for authentication<br />specifying internal hosts for NAT ****<br />identifying traffic for QoS ****<br />reorganizing traffic into VLANs<br />filtering VTP packets<br /><br /><br /><br />9<br />What can an administrator do to ensure that ICMP DoS attacks from the outside are mitigated as much as possible, without hampering connectivity tests initiated from the inside out?<br />Create an access list permitting only echo reply and destination unreachable packets from the outside. ****<br />Create an access list denying all ICMP traffic coming from the outside.<br />Permit ICMP traffic from only known external sources.<br />Create an access list with the established keyword at the end of the line.<br /><br /><br /><br />10<br />What effect does the command reload in 30 have when entered into a router?<br />If a router process freezes, the router reloads automatically.<br />If a packet from a denied source attempts to enter an interface where an ACL is applied, the router reloads in 30 minutes.<br />If a remote connection lasts for longer than 30 minutes, the router forces the remote user off.<br />A router automatically reloads in 30 minutes. *****<br /><br /><br />11<br /><br />Refer to the exhibit. The following commands were entered on RTB.<br /><br />RTB(config)# access-list 4 deny 192.168.20.16 0.0.0.15<br />RTB(config)# access-list 4 permit any<br />RTB(config)# interface serial 0/0/0<br />RTB(config-if)# ip access-group 4 in<br /><br />Which addresses do these commands block access to RTB?<br />192.168.20.17 to 192.168.20.31<br />192.168.20.16 to 192.168.20.31 ******<br />192.168.20.16 to 192.168.20.32<br />192.168.20.16 to 192.168.20.33<br /><br /><br /><br />12<br /><br />Refer to the exhibit. The new security policy for the company allows all IP traffic from the Engineering LAN to the Internet while only web traffic from the Marketing LAN is allowed to the Internet. Which ACL can be applied in the outbound direction of Serial 0/1 on the Marketing router to implement the new security policy?<br />access-list 197 permit ip 192.0.2.0 0.0.0.255 any<br />access-list 197 permit ip 198.18.112.0 0.0.0.255 any eq www<br /><br />access-list 165 permit ip 192.0.2.0 0.0.0.255 any<br />access-list 165 permit tcp 198.18.112.0 0.0.0.255 any eq www<br />access-list 165 permit ip any any<br /><br />access-list 137 permit ip 192.0.2.0 0.0.0.255 any<br />access-list 137 permit tcp 198.18.112.0 0.0.0.255 any eq www ******<br /><br />access-list 89 permit 192.0.2.0 0.0.0.255 any<br />access-list 89 permit tcp 198.18.112.0 0.0.0.255 any eq www<br /><br /><br /><br />13<br />Which three statements are true concerning standard and extended ACLs? (Choose three.)<br />Extended ACLs are usually placed so that all packets go through the network and are filtered at the destination.<br />Standard ACLs are usually placed so that all packets go through the network and are filtered at the destination. ****<br />Extended ACLs filter based on source address only, and must be placed near the destination if other traffic is to flow.<br />Standard ACLs filter based on source address only, and must be placed near the destination if other traffic is to flow. ****<br />Extended ACLs filter with many possible factors, and they allow only desired packets to pass through the network if placed near the source. ****<br />Standard ACLs filter with many possible factors, and they allow only desired packets to pass through the network if placed near the source.<br /><br /><br /><br />14<br /><br />Refer to the exhibit. Company policy for the network that is shown indicates the following guidelines:<br /><br />1) All hosts on the 192.168.3.0/24 network, except host 192.168.3.77, should be able to reach the 192.168.2.0/24 network.<br />2) All hosts on the 192.168.3.0/24 network should be able to reach the 192.168.1.0/24 network.<br />3) All other traffic originating from the 192.168.3.0 network should be denied.<br /><br />Which set of ACL statements meets the stated requirements when they are applied to the Fa0/0 interface of router R2 in the inbound direction?<br />access-list 101 deny ip any any<br />access-list 101 deny ip 192.168.3.77 0.0.0.0 192.168.2.0 0.0.0.255<br />access-list 101 permit ip 192.168.3.0 0.0.0.255 192.168.2.0 0.0.0.255<br />access-list 101 permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255<br /><br />access-list 101 permit ip 192.168.3.0 0.0.0.255 192.168.2.0 0.0.0.255<br />access-list 101 deny ip 192.168.3.77 0.0.0.0 192.168.2.0 0.0.0.255<br />access-list 101 permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255<br /><br />access-list 101 deny ip 192.168.3.77 0.0.0.0 192.168.2.0 0.0.0.255 ********<br />access-list 101 permit ip 192.168.3.0 0.0.0.255 192.168.2.0 0.0.0.255<br />access-list 101 permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255<br /><br />access-list 101 permit ip 192.168.3.0 0.0.0.255 192.168.2.0 0.0.0.255<br />access-list 101 deny ip 192.168.3.77 0.0.0.0 192.168.2.0 0.0.0.255<br />access-list 101 permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255<br />access-list 101 permit ip any any<br /><br />access-list 101 deny ip 192.168.3.77 0.0.0.0 192.168.2.0 0.0.0.255<br />access-list 101 permit ip 192.168.3.0 0.0.0.255 192.168.0.0 0.0.255.255<br /><br /><br /><br /><br />15<br /><br />Hosts from the Limerick LAN are not allowed access to the Shannon LAN but should be able to access the Internet. Which set of commands will create a standard ACL that will apply to traffic on the Shannon router interface Fa0/0 implementing this security?<br />access-list 42 deny 172.19.123.0 0.0.0.255 192.0.2.0 0.0.0.255<br />access-list 42 permit any<br /><br />access-list 56 deny 172.19.123.0 0.0.0.255****<br />access-list 56 permit any<br /><br />access-list 61 deny 172.19.123.0 0.0.0.0<br />access-list 61 permit any<br /><br />access-list 87 deny ip any 192.0.2.0 0.0.0.255<br />access-list 87 permit ip any<br /><br /><br /><br />16<br /><br />Refer to the exhibit. A network administrator needs to configure an access list that will allow the management host with an IP address of 192.168.10.25/24 to be the only host to remotely access and configure router RTA. All vty and enable passwords are configured on the router. Which group of commands will accomplish this task?<br />Router(config)# access-list 101 permit tcp any 192.168.10.25 0.0.0.0 eq telnet<br />Router(config)# access-list 101 deny ip any any ******<br />Router(config)# int s0/0<br />Router(config-if)# ip access-group 101 in<br />Router(config-if)# int fa0/0<br />Router(config-if)#ip access-group 101 in<br /><br />Router(config)# access-list 10 permit 192.168.10.25 eq telnet<br />Router(config)# access-list 10 deny any<br />Router(config)# line vty 0 4<br />Router(config-line)#access-group 10 in<br /><br />Router(config)# access-list 86 permit host 192.168.10.25<br />Router(config)# line vty 0 4<br />Router(config-line)# access-class 86 in<br /><br />Router(config)# access-list 125 permit tcp 192.168.10.25 any eq telnet<br />Router(config)# access-list 125 deny ip any any<br />Router(config)# int s0/0<br />Router(config-if)# ip access-group 125 in<br /><br /><br /><br />17<br />Which ACL permits host 10.220.158.10 access to the web server 192.168.3.244?<br />access-list 101 permit tcp host 10.220.158.10 eq 80 host 192.168.3.224<br />access-list 101 permit tcp 10.220.158.10 0.0.0.0 host 192.168.3.224 0.0.0.0 eq 80<br />access-list 101 permit host 10.220.158.10 0.0.0.0 host 192.168.3.224 0.0.0.0 eq 80<br />access-list 101 permit tcp 10.220.158.10 0.0.0.0 host 192.168.3.224 eq 80 *****<br /><br /><br /><br />18<br />Which wildcard mask would match the host range for the subnet 192.16.5.32 /27?<br />0.0.0.32<br />0.0.0.63<br />0.0.63.255<br />0.0.0.31 *****<br /><br /><br /><br />19<br />A security administrator wants to secure password exchanges on the vty lines on all routers in the enterprise. What option should be implemented to ensure that passwords are not sent in clear text across the public network?<br />Use Telnet with an authentication server to ensure effective authentication.<br />Apply an access list on the router interfaces to allow only authorized computers.<br />Apply an access list on the vty line to allow only authorized computers.<br />Use only Secure Shell (SSH) on the vty lines. *****<br /><br /><br /><br />20<br /><br />Refer to the exhibit. An administrator notes a significant increase in the amount of traffic entering the network from the ISP. The administrator clears the access-list counters. After a few minutes, the administrator again checks the access-list table. What can be concluded from the most recent output shown?<br />A small amount of HTTP trafic is an indication that the web server was not configured correctly.<br />A larger amount of POP3 traffic (compared with SMTP traffic) indicates that there are more POP3 email clients than SMTP clients in the enterprise.<br />A large amount of ICMP traffic is being denied at the interface, which can be an indication of a DoS attack. *****<br />A larger amount of email traffic (compared with web traffic) is an indication that attackers mainly targeted the email server.</span>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-4362355789213485390.post-30403256014105498372009-04-28T11:47:00.002-07:002009-09-24T23:30:42.517-07:00CCNA 3 Chapter 7 V4.0Note: These answers will give you a 76.2%. Please correct any answers you think are wrong<br /><br />1.<br />Which two statements describe the function of time-division multiplexing? (Choose two.)<br />Multiple data streams share one common channel.<br />Conversations that require extra bandwidth receive any unused time slices. ******<br />Time slots are utilized on a first-come, first-served basis. *****<br />Packets that are sent during transmission are reconstructed at the receiving end.<br />Priority can be dedicated to one data source.<br /><br />2<br />At which two layers of the OSI model does a WAN operate? (Choose two.)<br />Layer 1 ****<br />Layer 2 ****<br />Layer 3<br />Layer 4<br />Layer 6<br />Layer 7<br /><br /><span id="fullpost">3<br />Which three statements describe functions of the Point-to-Point Protocol with regards to the OSI model? (Choose three.)<br />operates at all layers of the OSI model<br />provides a mechanism to multiplex several network layer protocols ****<br />can be configured on both synchronous and asynchronous serial interfaces *****<br />uses Layer 3 of the OSI model to establish and maintain a session between devices<br />uses the data link layer to configure such options as error detection and compression *****<br />uses network control protocols to test and maintain connectivity between devices<br /><br />4<br />When customers use credit cards to make purchases at a small business, a modem is heard dialing a telephone number to transfer the transaction data to the central office. What type of WAN serial connection is in use?<br />leased line<br />point-to-point<br />circuit switched *****<br />packet switched<br /><br />5<br />Permanent virtual circuits and switched virtual circuits are both part of which option for WAN connectivity?<br />leased line<br />cell switching<br />packet switching<br />circuit switching ****<br /><br />6<br />Which two options can LCP negotiate? (Choose two.)<br />link quality ****<br />authentication *****<br />dynamic flow control<br />compression and network layer address for IP<br />connection-oriented or connectionless communication methods<br /><br />7<br />Why are Network Control Protocols used in PPP?<br />to establish and terminate data links<br />to provide authentication capabilities to PPP<br />to manage network congestion and to allow quality testing of the link<br />to allow multiple Layer 3 protocols to operate over the same physical link *****<br /><br /><br />8<br /><br />Refer to the exhibit. What statement is true about the debug output?<br />R2 is using PAP instead of CHAP.<br />The routers have different CHAP passwords configured. *****<br />The administrator performed a shutdown on the R2 PPP interface during negotiation.<br />The Layer 3 protocol negotiation caused the connection failure.<br /><br />9<br />Which best describes data communications equipment (DCE)?<br />serves as data source and/or destination<br />responsible for negotiating windowing and acknowledgements<br />physical devices such as protocol translators and multiplexers<br />equipment that forwards data and is responsible for the clocking signal ****<br /><br />10<br />What statement best describes cell switching?<br />dedicated path created between endpoints<br />permanent physical link between two points<br />virtual circuits established in network of ISPs<br />fixed-length packets that traverse virtual circuits ****<br /><br />11<br />What is the data transmission rate for the DS0 standard?<br />56 kbps<br />64 kbps ****<br />1.544 Mbps<br />44.736 Mbps<br /><br />12<br />What best describes the use of a data-link connection identifier (DLCI)?<br />an address identifying a virtual circuit *****<br />a logical address identifying the DCE device<br />an address identifying a Layer 3 service across a Frame Relay network<br />a logical address identifying the physical interface between a router and a Frame Relay switch<br /><br />13<br />At what physical location does the responsibilty for a WAN connection change from the user to the service provider?<br />demilitarized zone (DMZ)<br />demarcation point *****<br />local loop<br />cloud<br /><br />14<br />Which three statements are true regarding LCP? (Choose three.)<br />It is responsible for negotiating link establishment.<br />It negotiates options for Layer 3 protocols running over PPP. ****<br />It uses MD5 encryption while negotiating link-establishment parameters. ****<br />It terminates the link upon user request or the expiration of an inactivity timer.<br />It can test the link to determine if link quality is sufficient to bring up the link. ****<br />It monitors the link for congestion and dynamically adjusts the acceptable window size.<br /><br /><br /><br />15<br /><br />Refer to the exhibit. What statement is true regarding the output shown?<br />LCP is in the process of negotiating a link.<br />LCP and NCP are waiting for CHAP authentication to complete.<br />LCP negotiation has completed successfully, but NCP negotiation is in progress. *****<br />LCP and NCP negotiation is complete, and the data link service is available to carry packets.<br /><br /><br />16<br />Refer to the exhibit. The command output is from two routers that are connected by a point-to-point T1 link. Based on the information shown, what is the likely problem if the routers are unable to communicate using TCP/IP?<br />A loopback has not been set on either router.<br />The routers have mismatched serial line encapsulation. *****<br />Carrier delay has not been configured on router Cisco_2801.<br />The IP addresses are not in the same subnet.<br /><br />17<br />Why are Frame Relay paths referred to as virtual?<br />Frame Relay PVCs are created and discarded on demand.<br />The connections between PVC endpoints act like dialup circuits.<br />There are no dedicated circuits to and from the Frame Relay carrier.<br />The physical circuits inside the Frame Relay cloud do not contain exclusive links for a specific Frame Relay connection. ****<br /><br />18<br />What does a Frame Relay switch use to inform the sender that there is congestion?<br />FECN ****<br />BECN<br />DE<br />FCS<br /><br />19<br />Which statement is true concerning the Cisco implementation of the HDLC protocol?<br />supports authentication<br />universally compatible frame format<br />default encapsulation for serial interfaces on Cisco routers *****<br />does not support multiple protocols across a single link<br /><br />20<br />What two services allow the router to dynamically map data link layer addresses to network layer addresses in a Frame Relay network? (Choose two.)<br />ARP<br />ICMP<br />Proxy ARP<br />Inverse ARP ****<br />LMI status messages****</span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4362355789213485390.post-7648666240979935882009-04-28T11:47:00.001-07:002009-09-24T23:30:42.518-07:00CCNA 3 Chapter 6 V4.01<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXtaq25LERPhQaVf2v24WWflH4di9e2Sk0-k0tcl50Yz-uFo6Ul-hqXPht1xbKpJzUwC-aSu3J3W_rsQpDyjaSiPLDXZ02SYjbPNTblIasoacXeMzrLwPiqErkv_J9ZujHi2N5GvCC-khk/s1600-h/1.JPG"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 102px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXtaq25LERPhQaVf2v24WWflH4di9e2Sk0-k0tcl50Yz-uFo6Ul-hqXPht1xbKpJzUwC-aSu3J3W_rsQpDyjaSiPLDXZ02SYjbPNTblIasoacXeMzrLwPiqErkv_J9ZujHi2N5GvCC-khk/s400/1.JPG" alt="" id="BLOGGER_PHOTO_ID_5322379816783721858" border="0" /></a><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. What statement describes the DR/BDR relationship of the HQ router?<br /><br />HQ is the DR.<br /><br />HQ is the BDR.<br /><br /><span style="color: rgb(0, 0, 255);">HQ is a DROTHER.</span><br /><br />HQ is a member of an NBMA network.<br /><br /><br /><br />2<br />Which two features are associated with Frame Relay OSPF point-to-multipoint environments? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">A DR is not elected.</span><br /><br />The OSPF priority value determines the active DR on the Frame Relay link.<br /><br /><span style="color: rgb(0, 0, 255);">OSPF neighbor routers are statically defined.</span><br /><br />The link types are identified as broadcast multiaccess.<br /><br />The BDR will have a router ID whose value is greater than the DR router ID.<br /><br /><br /><br /><span id="fullpost">3<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCTVxwZB4gjw-HubAZGNSDHqx6M6GtZWFNAJ-nAu7t9if6Jn13XjxNA241SqkRNjT0COwzywbmhwJQP2tlyASByrlnQErxZmnb5j7LGiiK9x1iLTtda1ok273PGqAlsdS4cuDIZEUco7aw/s1600-h/3.JPG"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 250px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCTVxwZB4gjw-HubAZGNSDHqx6M6GtZWFNAJ-nAu7t9if6Jn13XjxNA241SqkRNjT0COwzywbmhwJQP2tlyASByrlnQErxZmnb5j7LGiiK9x1iLTtda1ok273PGqAlsdS4cuDIZEUco7aw/s400/3.JPG" alt="" id="BLOGGER_PHOTO_ID_5322379925379843810" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. How was the OSPF default gateway entry for R2 determined?<br /><br />Default routes are automatically injected by OSPF into all advertisements.<br /><br />A static default gateway route is defined in the configuration of R2.<br /><br /><span style="color: rgb(0, 0, 255);">The default-information originate command is applied on R1.</span><br /><br />The ISP defines the gateway of last resort and automatically passes it to R1 and R2.<br /><br />The ip default-gateway command is applied on R2.<br /><br /><br /><br />4<br />What is always required for OSPF routers to share routing information?<br /><br />designated routers<br /><br />a backup designated router<br /><br /><span style="color: rgb(0, 0, 255);">neighbor adjacencies</span><br /><br />an NBMA network topology<br /><br />links that are configured on the 224.0.0.0 network<br /><br /><br /><br />5<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEib1IKCe8E64wR7HCHtYGD4Ft-be1fTt9qr-PdjJJH_d-TaJnjkoMwKVuRY9gcZQuHc4QhL1xgX3g4_VQwDXva_DYB3emOWb_Lp8y4I48vhe-Fe_a7hyphenhyphenDU16g97_XcYgd0Q78Rki71_qfj4/s1600-h/5.JPG"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEib1IKCe8E64wR7HCHtYGD4Ft-be1fTt9qr-PdjJJH_d-TaJnjkoMwKVuRY9gcZQuHc4QhL1xgX3g4_VQwDXva_DYB3emOWb_Lp8y4I48vhe-Fe_a7hyphenhyphenDU16g97_XcYgd0Q78Rki71_qfj4/s400/5.JPG" alt="" id="BLOGGER_PHOTO_ID_5322380069772478386" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. A network administrator has implemented OSPF and the network has converged. If all router interfaces are enabled and functional, what route will OSPF view as lowest cost when moving frames from Host3 to Host1?<br /><br />R3 to R4 to R1<br /><br />R3 to R1<br /><br /><span style="color: rgb(0, 0, 255);">R3 to R2 to R1</span><br /><br />R3 to R5 to R2 to R1<br /><br /><br /><br />6<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEig0tdDf46zJf58kAdxF3WpaRutF62Fi4nQts4Cu8WBpC8ponOjAflGZDPcMzKTja4XnEV5uX0qwsPl4qlZk5xys5c502zmFaBFPkOLqhboR2EPn6fGuggghag7f1pW-A4MYxRG31E19su4/s1600-h/6.JPG"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 264px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEig0tdDf46zJf58kAdxF3WpaRutF62Fi4nQts4Cu8WBpC8ponOjAflGZDPcMzKTja4XnEV5uX0qwsPl4qlZk5xys5c502zmFaBFPkOLqhboR2EPn6fGuggghag7f1pW-A4MYxRG31E19su4/s400/6.JPG" alt="" id="BLOGGER_PHOTO_ID_5322380180836640578" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. Which commands configure router A for OSPF?<br /><br />router ospf 1<br />network 192.168.10.0<br /><br /><span style="color: rgb(0, 0, 255);">router ospf 1<br />network 192.168.10.64 0.0.0.63 area 0<br />network 192.168.10.192 0.0.0.3 area 0</span><br /><br />router ospf 1<br />network 192.168.10.64 255.255.255.192<br />network 192.168.10.192 255.255.255.252<br /><br />router ospf 1<br />network 192.168.10.0 area 0<br /><br /><br /><br />7<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEZ4ZLp49AMj0-BJGG3ta6TENAh6XgwWE48BCrckfL1ZROWcNWUO3eUB7z9lWcSvbJ9Jsl8yXqrzjto9TUBgKadczZqYI8qaAUa8ISBadFjasU5daYVPuJK-tPKLHppM0iL5EB0raWOwzJ/s1600-h/7.JPG"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 265px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEZ4ZLp49AMj0-BJGG3ta6TENAh6XgwWE48BCrckfL1ZROWcNWUO3eUB7z9lWcSvbJ9Jsl8yXqrzjto9TUBgKadczZqYI8qaAUa8ISBadFjasU5daYVPuJK-tPKLHppM0iL5EB0raWOwzJ/s400/7.JPG" alt="" id="BLOGGER_PHOTO_ID_5322380283741687458" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. Which network statement configures the home router to allow all the interfaces to participate in OSPF?<br /><br />network 10.0.0.0 0.3.255.255 area 0<br /><br />network 10.8.0.0 0.0.0.3 area 0<br /><br /><span style="color: rgb(0, 0, 255);">network 10.8.0.0 0.3.255.255 area 0</span><br /><br />network 10.10.0.0 0.0.0.3 area 0<br /><br />network 10.12.0.0 0.3.255.255 area 0<br /><br /><br /><br />8<br />Which statement is true regarding OSPF DR and BDR elections?<br /><br />A new DR/BDR election occurs each time a new OSPF neighbor is added.<br /><br /><span style="color: rgb(0, 0, 255);">The router with the highest OSPF priority setting wins the election for DR.</span><br /><br />The default priority value for a router connected to a multi-access network is 0.<br /><br />The router with the highest MAC address is elected as the DR when the default priority values are used.<br /><br /><br /><br />9<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhY7waBK_GcavsphrRbpLyufKextNQ-In2v-KJcVuGbMC5CAZt1eMBxZ-IP9N2UHELgsN-bOS9AI2y9-FK2-hPtqWRJ6qF-4i3cQdhRr97kZuLGZ1F6VuOcHPsGC-7z277ihHcXEZUSrXA3/s1600-h/9.JPG"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 142px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhY7waBK_GcavsphrRbpLyufKextNQ-In2v-KJcVuGbMC5CAZt1eMBxZ-IP9N2UHELgsN-bOS9AI2y9-FK2-hPtqWRJ6qF-4i3cQdhRr97kZuLGZ1F6VuOcHPsGC-7z277ihHcXEZUSrXA3/s400/9.JPG" alt="" id="BLOGGER_PHOTO_ID_5322380388297139650" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. The network administrator would like only the 172.16.32.0 network advertised to Router1. Which OSPF network command accomplishes this?<br /><br />Router2(config-router)# network 172.16.0.0 0.0.0.15 area 0<br /><br />Router2(config-router)# network 172.16.0.0 0.0.15.255 area 0<br /><br /><span style="color: rgb(0, 0, 255);">Router2(config-router)# network 172.16.32.0 0.0.15.255 area 0</span><br /><br />Router2(config-router)# network 172.16.32.0 0.0.255.255 area 0<br /><br /><br /><br />10<br />Which two statements describe the operation of link-state routing protocols? (Choose two.)<br /><br /><span style="color: rgb(0, 0, 255);">All routers in the same area have identical link-state databases when converged.</span><br /><br />Routing loops are prevented by running the Diffusing Update Algorithm (DUAL).<br /><br />Link-state routers send frequent periodic updates of the entire routing table.<br /><br />Reliable Transport Protocol (RTP) is used to deliver and receive LSAs.<br /><br /><span style="color: rgb(0, 0, 255);">Calculating the shortest path for each destination is accomplished with the SPF algorithm.</span><br /><br /><br />11<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqeQV1_mWj2JzSCttiPnd-JFU4l-cRF4NILn9I6qvYnX0XL2vjPWIyob1JiqzNxKnsf9jysleH9YVPwQDMIQ7XacmU85GIYeppFKbyVQtycX3RIew1sKpfaxuliuGdtUPSNdCBbqPOM5Lw/s1600-h/11.JPG"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 253px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqeQV1_mWj2JzSCttiPnd-JFU4l-cRF4NILn9I6qvYnX0XL2vjPWIyob1JiqzNxKnsf9jysleH9YVPwQDMIQ7XacmU85GIYeppFKbyVQtycX3RIew1sKpfaxuliuGdtUPSNdCBbqPOM5Lw/s400/11.JPG" alt="" id="BLOGGER_PHOTO_ID_5322380495783530530" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. Routers A, B, and C are part of the existing OSPF network. Router D has been added to the network. All routers are running OSPF and have the indicated priorities applied to the interface. What is the DR/BDR status immediately after router D is added to the existing network?<br /><br />An election is forced and router D wins the DR election.<br /><br /><span style="color: rgb(0, 0, 255);">The DR and BDR do not change until the next election.</span><br /><br />An election is forced and the existing BDR becomes the DR.<br /><br />The router with the highest router ID becomes the new BDR.<br /><br /><br /><br />12<br />Which two statements describe the use of OSPF DR/BDR elections? (Choose two.)<br /><br />Elections are always optional.<br /><br />Elections are required in all WAN networks.<br /><br />Elections are required in point-to-point networks.<br /><br /><span style="color: rgb(0, 0, 255);">Elections are required in broadcast multiaccess networks.<br /><br />Elections are sometimes required in NBMA networks.</span><br /><br /><br /><br />13<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKdv9TTRs1OeC6IXX-yiMTDrU-KggdWrtABErSeLS_b_iMdauia4GxEl5Ic8emoOLpH2RqCvpebjufoR0_EtIJ6kECdS4q-Fs3ek5HNtnZOS1EpLUkYAgwzusOJ2_3CbDmLph5omtdpo5Y/s1600-h/13.JPG"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 229px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKdv9TTRs1OeC6IXX-yiMTDrU-KggdWrtABErSeLS_b_iMdauia4GxEl5Ic8emoOLpH2RqCvpebjufoR0_EtIJ6kECdS4q-Fs3ek5HNtnZOS1EpLUkYAgwzusOJ2_3CbDmLph5omtdpo5Y/s400/13.JPG" alt="" id="BLOGGER_PHOTO_ID_5322380647021556226" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. As part of an OSPF network, R1 and R2 are trying to become adjacent neighbors. Although it appears that the two systems are communicating, neither of the routing tables include OSPF routes received from its neighbor. What could be responsible for this situation?<br /><br />R1 and R2 are not on the same subnet.<br /><br />The Process IDs on each router do not match.<br /><br /><span style="color: rgb(0, 0, 255);">The timer intervals on the routers do not match.</span><br /><br />The value set for the Transmit Delay time on both routers is too low.<br /><br /><br /><br />14<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhc5J7HauqZxugsg_fpJFQjfv-HCF6ykWARkR0cKqhS7qY3zIVlWNkOwvh1lT9SsMFAlGizgiYIOiSPdE-tR7D0vkkkshbJiQF5EZR-ajXVLips4qx1B5Q8bDsJcMlPM_cx5XwTkO9razjO/s1600-h/14.JPG"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 170px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhc5J7HauqZxugsg_fpJFQjfv-HCF6ykWARkR0cKqhS7qY3zIVlWNkOwvh1lT9SsMFAlGizgiYIOiSPdE-tR7D0vkkkshbJiQF5EZR-ajXVLips4qx1B5Q8bDsJcMlPM_cx5XwTkO9razjO/s400/14.JPG" alt="" id="BLOGGER_PHOTO_ID_5322380750761046626" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. What is the purpose of the value 128 shown in bold?<br /><br /><span style="color: rgb(0, 0, 255);">It is the OSPF cost metric.</span><br /><br />It is the OSPF administrative distance.<br /><br />It is the value assigned by the Dijkstra algorithm that designates the distance in hops to the network.<br /><br />It is the value assigned to an interface that is used by the DUAL algorithm to determine the metric.<br /><br /><br /><br />15<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnTJXECY27rQpNxebiB2ejxIzZ5mgSuijX3RS1HphYkvZPZU2ROngJVtSQPqivqUywTf3kYiwoTRx2RyF2fmk0_LHnS1AhToj9b2CSpmQdOZ3oHWV5IiDL5xwmLq83eBVgjuRPs4xh_ZuZ/s1600-h/15.JPG"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 237px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnTJXECY27rQpNxebiB2ejxIzZ5mgSuijX3RS1HphYkvZPZU2ROngJVtSQPqivqUywTf3kYiwoTRx2RyF2fmk0_LHnS1AhToj9b2CSpmQdOZ3oHWV5IiDL5xwmLq83eBVgjuRPs4xh_ZuZ/s400/15.JPG" alt="" id="BLOGGER_PHOTO_ID_5322380860791351682" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. What is the purpose of the configuration commands added on router B?<br /><br />allows router A to form an adjacency with router B<br /><br /><span style="color: rgb(0, 0, 255);">provides a stable OSPF router ID on router B</span><br /><br />provides a method of testing router traffic<br /><br />creates the OSPF adjacency table on router B<br /><br /><br /><br />16<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLXZQ-hVeGvRctr5j0gJTdKXCIy3WYQ6_pvcyListvTvxPlpznLGAobTHL79pmkS-HRQfIn9-YasGgtTOtnGsBmW7-53_npDM7-2FuVaMT3WcW1edIvEkM5hGuRccj3TWVAsRJGj_OdEA9/s1600-h/16.JPG"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 131px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLXZQ-hVeGvRctr5j0gJTdKXCIy3WYQ6_pvcyListvTvxPlpznLGAobTHL79pmkS-HRQfIn9-YasGgtTOtnGsBmW7-53_npDM7-2FuVaMT3WcW1edIvEkM5hGuRccj3TWVAsRJGj_OdEA9/s400/16.JPG" alt="" id="BLOGGER_PHOTO_ID_5322380990822036146" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. The command ip route 10.16.1.64 255.255.255.252 s0/0/0 is entered into the router. Why does network 10.16.1.64/30 appear in the routing table in addition to network 10.16.1.64/27?<br /><br /><span style="color: rgb(0, 0, 255);">The router views 10.16.1.64/30 and 10.16.1.64/27 as two different networks. </span><br /><br />The static route is used as a backup route for packets destined for 10.16.1.64/27.<br /><br />The AD for static routes is lower than the AD for OSPF routes.<br /><br />The static route metric is lower than the OSPF metric for the 10.16.1.64/27 network.<br /><br /><br /><br />17<br />What is the primary difference between link-state protocols and distance vector protocols with regard to route calculation?<br /><br /><span style="color: rgb(0, 0, 255);">Distance vector protocols take existing routes from their neighbors and add to them. Link-state protocols independently calculate full routes.</span><br /><br />Link-state protocols calculate and pass full routing tables to all routers in their associated areas, and distance vector protocols do not.<br /><br />When determining invalid routes, link-state protocols use split horizon for all route computations. Distance vector protocols use reverse poisoning.<br /><br />Distance vector protocols require more CPU and RAM for route calculations than link-state protocols require.<br /><br /><br /><br />18<br />What range of networks are advertised in the OSPF updates by the command Router1(config-router)# network 192.168.0.0 0.0.15.255 area 0?<br /><br />192.168.0.0/24 through 192.168.0.15/24<br /><br /><span style="color: rgb(0, 0, 255);">192.168.0.0/24 through 192.168.15.0/24</span><br /><br />192.168.15.0/24 through 192.168.31.0/24<br /><br />192.168.15.0/24 through 192.168.255.0/24<br /><br />192.168.16.0/24 through 192.168.255.0/24<br /><br /><br /><br />19<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXIoxdHHDxJZ6fkPEG_FAPiQqrQziG06OeKLgDmSIYk45mv2MFRXmkfPHmP8wT8jVumzuo2ChId3dkPH9e9L053x0Hn6VeagT5jZ0_LXKTk6V_iqXbY-la1NfTcl0Hwry895INQGrJQ2kZ/s1600-h/19.JPG"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 175px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXIoxdHHDxJZ6fkPEG_FAPiQqrQziG06OeKLgDmSIYk45mv2MFRXmkfPHmP8wT8jVumzuo2ChId3dkPH9e9L053x0Hn6VeagT5jZ0_LXKTk6V_iqXbY-la1NfTcl0Hwry895INQGrJQ2kZ/s400/19.JPG" alt="" id="BLOGGER_PHOTO_ID_5322381123020190466" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. When establishing adjacency relationships, which IP address would router A use to send hello packets to router B?<br /><br />10.11.0.1<br /><br />10.11.0.2<br /><br />10.11.0.255<br /><br /><span style="color: rgb(0, 0, 255);">224.0.0.5</span><br /><br />255.255.255.255<br /><br /><br /><br />20<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHeBp3KnejE-WPq-wDwPW1jVuA9-GoGnqp6rz-0mmX0ySdKJd2Lu0QRI8yLNF-lfFImIZKbVxzvTpl0NsO8sCIYj4IUncGDo1XKO9gTi7aFOcaEhyJBEO0tUFFbmU2JgR6-K-_OsSAcNMi/s1600-h/20.JPG"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 380px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHeBp3KnejE-WPq-wDwPW1jVuA9-GoGnqp6rz-0mmX0ySdKJd2Lu0QRI8yLNF-lfFImIZKbVxzvTpl0NsO8sCIYj4IUncGDo1XKO9gTi7aFOcaEhyJBEO0tUFFbmU2JgR6-K-_OsSAcNMi/s400/20.JPG" alt="" id="BLOGGER_PHOTO_ID_5322381231882485074" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. Which router will be elected the DR and which will become the BDR?<br /><br />R1 will be DR and R2 will be BDR.<br /><br /><span style="color: rgb(0, 0, 255);">R1 will be DR and R3 will be BDR.</span><br /><br />R2 will be DR and R1 will be BDR.<br /><br />R2 will be DR and R3 will be BDR.<br /><br />R3 will be DR and R2 will be BDR.<br /><br />R3 will be DR and R1 will be BDR.<br /><br /><br />21<br />When compared to a distance vector routing protocol, what is a benefit of the hierarchical design approach that is used in large OSPF networks?<br /><br />simpler configuration<br /><br />reduction of router processing requirements<br /><br /><span style="color: rgb(0, 0, 255);">isolation of network instability </span><br /><br />less complex network planning<br /><br /><br /><br />22<br />What are two advantages of using a link-state routing protocol instead of a distance vector routing protocol? (Choose two.)<br /><br />The topology database eliminates the need for a routing table.<br /><br />Frequent periodic updates are sent to minimize the number of incorrect routes in the topological database.<br /><br /><span style="color: rgb(0, 0, 255);">Routers have direct knowledge of all links in the network and how they are connected.<br /><br />After the initial LSA flooding, routers generally require less bandwidth to communicate changes in a topology.</span><br /><br />A link-state routing protocol requires less router processor power.<br /><br /><br /><br />23<br />If a network has converged, what is true about the link-state database held by each router in the same OSPF area?<br /><br /><span style="color: rgb(0, 0, 255);">Each router has a link-state database containing the same status information.</span><br /><br />Each router has a different link-state database depending on its position within the network.<br /><br />The link-state database is stored in a designated router and is accessed by each router in the area as needed.<br /><br />The link-state database in each router only contains information about adjacent routers and the status of their links.<br /><br /><br /><br />24<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPHWbazo4i0rTYv-L-cxR40T5qAHW6_-Gj0TWTm_7SvN-wetKH9bJf3sQaBZ2ErX-Ak3pbo9RkCfFCAPtG4XYasqNKt8TRPL3SS9xx0geYdKJSBT3fzakzUrHtx_8s4Wrg5i0lbtRu-S3m/s1600-h/24.JPG"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 400px; height: 216px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPHWbazo4i0rTYv-L-cxR40T5qAHW6_-Gj0TWTm_7SvN-wetKH9bJf3sQaBZ2ErX-Ak3pbo9RkCfFCAPtG4XYasqNKt8TRPL3SS9xx0geYdKJSBT3fzakzUrHtx_8s4Wrg5i0lbtRu-S3m/s400/24.JPG" alt="" id="BLOGGER_PHOTO_ID_5322381363082159698" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. RTRC was recently configured and is not sending the proper OSPF routes to RTRB, as shown in the RTRB routing table. Based on the RTRC configuration, what is most likely the problem?<br /><br />RTRC interfaces are administratively shut down.<br /><br />The OSPF process ID for RTRC does not match the process ID used on RTRB.<br /><br />The interface addresses on RTRC overlap with other addresses in the network.<br /><br /><span style="color: rgb(0, 0, 255);">The OSPF routing configuration on RTRC has a missing or incorrect network statement.</span></span>Unknownnoreply@blogger.com0