+ All Categories

1

Date post: 03-Dec-2014
Category:
Upload: asdren-hasani
View: 14 times
Download: 0 times
Share this document with a friend
Popular Tags:
20
1 Top of Form What is the default encapsulation for serial interfaces on Cisco routers? PPP SLIP HDLC Frame Relay 2 Top of Form What routing protocol would be appropriate to use for exchanging routes between ISPs? RIPv2 BGP OSPF EIGRP 3 Top of Form A network engineer is planning a new horizontal cable installation in an office building. What advantage would UTP cable have over fiber optic cable for this installation? lower installation costs better protection from EMI higher transmission speeds longer unrepeated distance between endpoints 4 Top of Form A hacker attempts to reach confidential information that is stored on a server inside the corpora network. A network security solution inspects the entire packet, determines that it is a threat, blocks the packet from entering the inside network. Which security measure protected the network? an IDS an IPS a host-based firewall Anti-X software 5 Top of Form
Transcript
Page 1: 1

1 Top of FormWhat is the default encapsulation for serial interfaces on Cisco routers?

PPP

SLIP

HDLC

Frame Relay

2 Top of FormWhat routing protocol would be appropriate to use for exchanging routes between ISPs?

RIPv2

BGP

OSPF

EIGRP

3 Top of FormA network engineer is planning a new horizontal cable installation in an office building. What advantage would UTP cable have over fiber optic cable for this installation?

lower installation costs

better protection from EMI

higher transmission speeds

longer unrepeated distance between endpoints

4 Top of FormA hacker attempts to reach confidential information that is stored on a server inside the corporate network. A network security solution inspects the entire packet, determines that it is a threat, and blocks the packet from entering the inside network. Which security measure protected the network?

an IDS

an IPS

a host-based firewall

Anti-X software

5 Top of Form

Page 2: 1

Refer to the exhibit. The interfaces on R1 and R2 have been properly configured with the IP addresses as shown. No dynamic routing protocols have been configured. The network administrator has entered the commands that are shown in the exhibit.

Which two additional commands need to be entered on the routers to enable host A to access the Internet? (Choose two.)

R2(config)# ip route 0.0.0.0 0.0.0.0 S0/0/0

R1(config)# ip route 0.0.0.0 0.0.0.0 S0/0/0

R1(config)# ip route 0.0.0.0 0.0.0.0 198.213.219.1

R2(config)# ip route 192.168.1.0 255.255.255.0 10.1.1.1

R1(config)# ip route 198.133.219.1 255.255.255.0 10.1.1.2

6 Top of FormWhich protocol allows secure in-band management so that a network administrator can monitor and configure network devices without fear of any passwords being compromised?

SSH

HTTP

SNMP

Telnet

7 Top of FormWhich two services are required to enable a computer to receive dynamic IP addresses and access the Internet using domain names? (Choose two.)

DNS

WINS

HTTP

DHCP

SMTP

8 Top of Form

Page 3: 1

Refer to the exhibit. A network administrator is unable to ping H1 from the router and is checking the cabling along the network. Which segment is incorrectly cabled?

Segment A

Segment B

Segment C

Segment D

9 Top of Form

Refer to the exhibit. A technician tries to telnet to a router with the IP address of 172.16.1.2. What does the message indicate about the Telnet session?

The console password has not been set on the remote router.

The VTY password has not been set on the remote router.

The enable password has not been set on the remote router.

The enable secret password has not been set on the remote router.

The session has been opened and closed successfully by the remote router.

10 Top of FormThe IT department of a company implements a backup plan which includes a daily backup on Monday through Saturday. Only files that were modified during each day are backed up. Which backup method is being used?

full backup

normal backup

differential backup

Page 4: 1

incremental backup

11 Top of FormHow many host addresses may be assigned on each subnetwork when using the 130.68.0.0 network address with a subnet mask of 255.255.248.0?

30

256

2046

2048

4094

4096

12 Top of FormFor an HTTP server, what purpose does a URL serve?

ensures that routing tables are up to date

translates domain names into IP addresses

determines which services are available on a server

identifies the protocol and path to resources on a server

13 Top of Form

Refer to the exhibit. Which three IP addresses could be assigned to the hosts? (Choose three.)

192.168.88.1

192.168.88.8

Page 5: 1

192.168.88.9

192.168.88.12

192.168.88.14

192.168.88.15

192.168.88.16

192.168.88.18

14 Top of FormFor the assignment of permissions to files and folders, what does the "principle of least privilege" imply?

No user has more privileges than any other user.

Permissions to files are given based on seniority.

Users only have access to resources that are necessary for their jobs.

Users should be given no access to computer resources until they ask.

15 Top of FormA user calls the help desk to report that the new web server of the company, www.theccnas.com, cannot be accessed. The user mentions that the web browser seems to be working fine because web pages from other web servers display normally. The help desk technician asks the user to ping www.theccnas.com and the user reports that the error message is “Ping request could not find the host”. What network service should be further investigated to determine the issue?

DNS

HTTP

SMTP

DHCP

16 Top of FormWhich connection, dependent on regional availability, will provide a small business with a symmetrical dedicated leased line of approximately 1.5 Mb/s or 2.0 Mb/s connection to an ISP?

ATM

Dialup

Metro Ethernet

T1 or E1

T3 or E3

17 Top of FormWhat is the purpose of the routing process?

to encapsulate data that is used to communicate across a network

to select the paths that are used to direct traffic to destination networks

to convert a URL name into an IP address

to provide secure Internet file transfer

to forward traffic on the basis of MAC addresses

Page 6: 1

18 Top of FormWhat is used by a routing protocol to determine the best path to include in the routing table?

Convergence time

Default distance

Metric

Type of router

19 Top of Form

Refer to the exhibit.  Users have been experiencing very poor performance rates to the Internet. The technician notices a higher than normal CRC count on the FastEthernet 0/0 interface that connects to the LAN.  What is the most likely cause of the high value?

The FastEthernet 0/0 interface is misconfigured in half-duplex mode.

Too many collisions are occurring on the LAN.

Too many packets smaller than 64 bytes are on the network.

Excessive noise is on the line.

The FastEthernet0/0 interface is configured with the wrong encapsulation type.

20 Top of Form

Page 7: 1

Refer to the exhibit. What is the device named "Distribution"?

a firewall

a router

a switch

an IP phone

21 Top of FormWhen a user issues the command ping –a 64.102.240.242 in a command prompt window, which database will a DNS server search for the matching record?

reverse lookup zones

forward lookup zones

domain name search zones

domain address search zones

22 Top of FormDifferent hosts connect to the same switch port at different times. If the switch port is configured with dynamic port security, how does it process the MAC addresses?

The addresses are manually assigned with the use of the switchport command.

The addresses are dynamically learned and stored in the address table.

The addresses are dynamically configured and saved in the running configuration.

The addresses are stored in the address table and added to the running configuration.

23 Top of FormWhy are port numbers included in the TCP header of a segment?

to indicate the correct router interface that should be used to forward a segment

to identify which switch ports should receive or forward the segment

to determine which Layer 3 protocol should be used to encapsulate the data

to enable a receiving host to forward the data to the appropriate application

to allow the receiving host to assemble the packet in the proper order

24 Top of Form

Page 8: 1

Refer to the exhibit. Which type of physical cable connection is used for the connection between the Cisco 1841 routers R1 and R2?

USB

console DB-9

serial cable

LAN crossover UTP

LAN straight-through UTP

25 Top of Form

Refer to the exhibit. Which type of link is supported by this interface module?

LAN

WAN

WLAN

VLAN

Page 9: 1

26 Top of FormWhich routing protocol excludes the subnet information from routing updates?

EIGRP

OSPF

RIPv1

BGP

27 Top of Form

Refer to the exhibit. A NOC technician at an ISP enters the command c:\ping 209.165.201.7. What are two reasons to use this command? (Choose two.)

map the path to 209.165.201.7

test reachability to 209.165.201.7

locate connectivity problems along the route to 209.165.201.7

identify ISPs that interconnect the NOC and remote host with IP 209.165.201.7

measure the time that packets take to reach 209.165.201.7 and return to the technician's workstation

28 Top of Form

Page 10: 1

Refer to the exhibit. The Transfer > Capture Text feature available through HyperTerminal has been used to capture the running configuration on a router. The startup-configuration has been erased from the router followed by the issuing of the reload command. The startup-config is restored by using the captured file, but all interfaces on the router are shown as administratively down. What could cause this problem?

The enable password was incorrectly entered.

The configuration register was not set to 0x2142.

The enable secret password was incorrectly entered.

The no shutdown command must be entered under each interface section in the file being sent.

The captured file should have restored the running configuration not the startup configuration.

29 Top of Form

Page 11: 1

Refer to the exhibit. A network administrator has an extra router and wishes to use it as shown to passively monitor network traffic. Which IOS feature should be implemented on router EXTRA?

ACLs

CDP

IDS

IPS

30 Top of Form

Page 12: 1

Refer to the exhibit. Which statement is true based on the exhibited information?

The router is using a link-state routing protocol.

The router will get routing updates on the FastEthernet0/0 interface.

The router will not forward routing updates from the Serial0/0/0 interface.

The network for Fa0/1 will be included in the routing updates that are sent from this router.

31 Top of FormA technician visits every computer in a workgroup and edits the HOSTS file. The technician makes an entry in each file for each host in the network. What will this action accomplish if completed accurately?

Each computer in the workgroup will be able to determine its own computer name.

Each computer in the workgroup will be able to resolve the name of each host to an IP address.

Each computer in the workgroup will automatically receive an IP address without requiring a DHCP server.

Each computer in the workgroup will only accept traffic from computers that have been added to the HOSTS file.

32 Top of FormWhat should be the first step in a structured cable project?

Locate all sources of EMI.

Obtain an accurate floor plan.

Identify the network backbone.

Design efficient cable management systems.

33 Top of Form

Page 13: 1

Refer to the exhibit. RIPv2 has been configured on all routers in the network. Based on the output of the show ip route command, which statement is true?

Network 172.16.0.0/16 can be reached via interface Fa0/0 and is one hop away.

Network 10.10.33.0/24 can be reached via interface S0/0/1 and is one hop away.

Network 192.168.23.0/24 can be reached only via interface S0/0/0 and is one hop away.

Network 192.168.23.0/24 can be reached via interfaces S0/0/0 and S0/0/1 and is two hops away.

34 Top of FormWhat will a router do with a packet that is destined for a host with the IP address 192.168.1.5/24 if no entry for the 192.168.1.0/24 network exists in the routing table?

It will drop the packet.

It will send the packet back to the source address.

It will broadcast the packet out all of its active interfaces.

It will broadcast the packet out all of its active interfaces except the interface that received the packet.

35 Top of FormWhen a field technician visits a customer site and resolves the issue that was opened in a trouble ticket, what should the technician do?

assess the network design of the customer site

survey users at the customer site for further needs

document the solution and obtain acceptance of the customer

discuss further problems that are identified during the visit and offer cost estimates

Page 14: 1

36 Top of Form

Refer to the exhibit. Router Left is unable to ping router Right. The show interfaces serial 0/0/0 command indicates that the interface is up but the line protocol is down on both routers. Which action could be taken to establish connectivity between the two routers?

Configure S0/0/1 instead of S0/0/0 on router Right.

Enter the encapsulation hdlc command on router Right.

Contact the service provider to report that the circuit is down.

Contact the service provider to enable PPP on the WAN circuit.

Enter the no encapsulation ppp command on router Left S0/0/0.

37 Top of Form

Refer to the exhibit. What does the ^ symbol indicate?

It marks the end of an error message and an insert point for a new command.

It marks the beginning of an error message and an insert point for a new command.

It marks a point in the command string where there is an incorrect or unrecognized character.

It marks a point in the command string where a parameter has to be entered to complete the command configuration.

38 Top of FormA company is developing an Internet store for its website. Which protocol should be used to transfer credit card information from customers to the company web server?

FTPS

HTTP

HTTPS

WEP2

Page 15: 1

TFTP

39 Top of Form

Refer to the exhibit. Hosts that belong to the IT department use 10.10.55.33/27 as a default gateway. Where can this IP address be located in the network?

A

B

C

D

E

F

40 Top of FormWhat does the command RA(dhcp-config)# dns-server 10.10.64.221 10.10.64.222 accomplish?

allows RA to act as a DNS relay agent

allows RA to be configured as a DNS server

identifies the default gateway address that is used to reach the DNS servers

enables DHCP clients to use the specified IP addresses as DNS servers

41 Top of FormHow do port filtering and access lists help provide network security?

They prevent specified types of traffic from reaching specified network destinations.

They alert network administrators to various type of denial of service attacks as they occur.

They prevent viruses, worms, and Trojans from infecting host computers and servers.

They enable encryption and authentication of confidential data communications.

42 Top of Form

Page 16: 1

In the URL http://dev.cisco.com/wwwdocs/procedures.htm, what is identified by wwwdocs?

the server name where the resource is located

the protocol that is used for the resource request

the domain name of the server that is being accessed

the folder where the requested resource is stored

43 Top of FormAfter an unsuccessful ping to the local router, the technician decides to investigate the router. The technician observes that the lights and fan on the router are not operational. In which layer of the OSI model is the problem most likely occurring?

transport

network

data link

physical

44 Top of Form

Refer to the exhibit. A network administrator is planning the wiring for a new installation and wants to connect three separate buildings that are 250 meters apart. Which type of cable should be used to connect the buildings?

STP

UTP

serial

coaxial

fiber optic

45 Top of FormWhat is the primary function of the NOC at a large ISP?

installing equipment at a customer site

setting up customer accounts and passwords

monitoring and testing customer network connections

entering customer requirements in an order-tracking database

46 Top of FormA user reports being able to access the Internet but not being able to download e-mail from the mail server at the ISP. What should the user check on the user workstation?

Page 17: 1

the POP3 and SMTP server settings in the e-mail application

the patch cable connections at the back of the workstation and at the wall plate

the DHCP settings in the operating system

the IP address, mask, and default gateway values

the NIC drivers

47 Top of Form

Refer to the exhibit. The network administrator needs to configure the Fa0/0 interface of RTB so that hosts from RTA can connect to the server that is attached to RTB. Which two commands will the administrator use to accomplish this task? (Choose two.)

RTB# ip address 192.168.102.98 255.255.255.248

RTB(config-if)# ip address 192.168.102.99 255.255.255.252

RTB(config)# ip address 192.168.102.97 255.255.255.252

RTB(config)# no shutdown

RTB(config-if)# no shutdown

RTB(config-if)# ip address 192.168.102.97 255.255.255.252

48 Top of FormWhat can be gained by using a caching-only DNS server?

The DNS server will use more WAN bandwidth.

The DNS server will only answer recursive queries.

The DNS server will be authoritative for only one zone.

The DNS server will resolve most queries more quickly.

49 Top of FormIn order to load an initial configuration on a new switch, a network administrator has connected a laptop to the switch via the use of a console cable. About a minute after the network administrator powers on the switch, the SYST LED on the front of the switch changes from blinking green to amber. What does this indicate?

Page 18: 1

The network administrator has made an improper physical connection to the switch.

The switch is ready to have a configuration file loaded.

A port on the switch is bad.

The switch failed POST.

50 Top of FormWhich statement correctly describes the function of AAA?

It prevents unauthorized access to a network.

It filters traffic based on destination IP and port number.

It enables users to send information to a daemon that is running on a management station.

It encrypts data to provide network security.

51 Top of Form

Refer to the exhibit. What effect will the commands have when entered on R2?

They will prevent all simultaneous in-band connections.

They will permit an unlimited number of in-band connections.

They will permit a maximum of five simultaneous in-band connections.

They will permit a minimum of four simultaneous in-band connections with a different password on each connection.

52 Top of Form

Refer to the exhibit. The network administrator must set up a network with two subnets. In network A, the network administrator selects the network address 192.168.1.128/26. Which address combination should the administrator select in network B to accommodate the same number of hosts as in network A?

192.168.1.32 255.255.255.128

192.168.1.0 255.255.255.224

192.168.1.64 255.255.255.192

192.168.1.192 255.255.255.128


Recommended