Close Window
Assessment System
1 Assessment Selection
2 Assessment Settings
3 Take Assessment
Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting
Computer Networks (Version 40)
Time Remaining
1 What is the function of a network modular block diagram
It provides a high level view of all sites in an enterprise network
It shows a simplified version of a network and diagrams major functions
It lists the networking equipment and addressing schemes for each network segment
It shows all the major pieces of networking equipment in a network and how they interconnect
2 If traditional phones are used when introducing VoIP to a network what component would be required to
convert the analog voice from traditional telephone signals into IP packets
Multipoint control unit
Power over Ethernet switches
a router that acts as a voice gateway
Cisco Unified Communications Manager
3 A company has just transitioned from traditional telephony to an IP Telephony solution for their voice
requirements What statement describes a characteristic of the new system
connects through a PBX to the PSTN
replaces a digital system with an analog one
combines data and voice into a converged network
requires manual configuration for adding moving or changing phones
enables web applications and phone directories to be available to every PC on the network
4
Refer to the exhibit The routers are configured with RIPv2 with default configurations When attempting to
communicate with other networks hosts from 10011024 are experiencing connectivity issues What could be
done to resolve this issue
Change to a public IP addressing scheme
Use EIGRP with its default configuration as the routing protocol
Change the subnet mask on the link between R2 and R3 to 2552552550
Disable automatic route summarization on all routers in the network
5 Which two descriptions relate to a Frame Relay DLCI (Choose two)
guaranteed rate at which data travels on the packet-switched network
signalling standard between DTE and DCE
indicator of congestion on the network
locally significant circuit endpoint
one DLCI allowed per local loop
Layer 2 address
6 Why is it difficult for network designers to predict the patterns and behavior of file transfer traffic
The traffic is user initiated
File size is typically very small
Dedicated bandwidth is essential
All file transfer traffic is queued as high priority
7 A school district decides to use the 172300016 network for its LAN networks The network administrator
must create an addressing scheme to support 500 users in the admin office 200 at the high school 60 at the
elementary school and 28 at the district office Which VLSM addressing scheme will correctly address the
network with minimal waste
172300020 admin
172301021 high school
172301822 elementary
1723011226 district
172300022 admin
172304023 high school
172305024 elementary
172306026 district
172300023 admin
172302024 high school
172303026 elementary
1723036427 district
172300023 admin
172302024 high school
172303025 elementary
17230312726 district
8 Which task would typically only require services that are located at the access layer of the hierarchical design
model
placing a VoIP call to a business associate in another country
connecting to the corporate web server to update sales figures
using a VPN from home to send data to the main office server farm
responding to an e-mail from a co-worker in another department
printing a meeting agenda on a local departmental network printer
9 Which three enhancements does IPv6 offer over IPv4 (Choose three)
easier implementation and configuration
more effective IP security
integrated IP mobility support
simplified header information
fewer reserved IP addresses
eliminates the need to implement DHCP
10 A network administrator is integrating IPv6 into an IPv4 network by encapsulating one protocol packet within
another protocol Which transition method is being used
dual stack
tunneling
proxying and translation
NAT with Protocol Translator
11
Refer to the exhibit During a test of an EIGRP prototype network a network administrator issues a show ip
protocols command What two facts can be determined from the output (Choose two)
The administrative distance is 100
This router has one adjacent neighbor
There are 10 Cisco devices in this prototype network
The auto-summary command was applied on this router
EIGRP is using two values for the calculation of the composite metric
EIGRP on this router will display up to four unequal cost routes to the same destination
12 Which two pieces of information are needed before an IOS image may be loaded on a router from a TFTP
server (Choose two)
the IP address of the TFTP server
the current name of the IOS image on the router
the operating system of the TFTP server
the name of the configuration file in NVRAM
the name of the IOS image on the TFTP server
encapsulation of the router interface that is connected to the TFTP server
13 Which two values represent valid IPv6 addresses (Choose two)
1
FF011
00000001
2001DB8472A4
2031000004AC3400FFE30
14 A network administrator has configured Frame Relay on a serial interface and issued the show interfaces serial
command The output shows that the interface is up and the line protocol is up However pings to the remote
router across the link fail What should the next step be to ensure that the IP address of the remote router appears
in the Frame Relay map table of the local router
Configure the router using the no inverse-arp command
Ensure that the LMI type is correct for the circuit
Configure the router using the frame-relay map ip command
Verify that the remote router has Frame Relay encapsulation enabled
15
Refer to the exhibit A networking company technician conducts testing on a prototype to verify that the
proposed network design meets connectivity requirements Which command and its associated output will
provide evidence that inter-VLAN routing is implemented correctly and that all users have full connectivity to
each other
Showing 1 of 4 ltPrev
Page 1
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
Close Window
Assessment System
1 Assessment Selection
2 Assessment Settings
3 Take Assessment
Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting
Computer Networks (Version 40)
Time Remaining
16 During prototype testing the network designer performs a test to determine the ability of the network to store
device configurations and statistics on local databases Which design goal is validated if the test is a success
security
scalability
availability
manageability
17 Which IOS component can be used for classification and protocol discovery of network traffic and applications
in use
CDP
NBAR
ACL logging
Network Assistant
18 Which WLAN operational feature can be configured as non-broadcast in order to increase the security of an
enterprise WLAN for employees
SSID
WEP keys
VLAN parameters
WPA encryption keys
VPN authentication information
19
Refer to the exhibit A network administrator is validating the routing for the new network design Which
command should be used to configure the s000 interface of the SALES router to advertise the Sales
Department networks as one route
SALES(config-if) ip summary-address eigrp 100 1721600 25525500
SALES(config-if) ip summary-address eigrp 100 1721680 2552552400
SALES(config-if) ip summary-address eigrp 100 17216160 2552552400
SALES(config-if) ip summary-address eigrp 100 17216310 2552552480
20
Refer to the exhibit A pre-sales systems engineer receives a diagram of the exhibited WAN implementation
from a customer EIGRP is the routing protocol that is used on the WAN None of the parameters for EIGRP
metric calculation have been modified in any router configurations Which statement is true about the routing
table on router RM
There is a single route to the 19216824024 LAN using the T1 connection
There is a single route to the 19216824024 LAN using the DSL connection
There is a single route to the 19216824024 LAN using the Metro Ethernet connection
EIGRP installs all three routes to the 19216824024 LAN and load balances the traffic
21
Refer to the exhibit Which set of commands will meet the security requirements that are shown
22 What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a
partial mesh topology
It adds scalability to the corporate network
It provides fully redundant links to connecting modules
It lowers the impact and risk of DoS attacks from the Internet
It increases the manageability of the network devices in the core layer
23 What are two disadvantages to using simulation software such as Packet Tracer to validate a network design
(Choose two)
unrealistic performance
little control over network operation
inability to create large or complex networks
inability to simulate all required network conditions
lack of flexibility to support different devices and connectivity options
24 During a review of the proposed bill of materials an account manager of the network solution company realizes
that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than
was originally specified by the network designer When questioned the systems engineer responds that the
switches specified by the designer cannot be purchased within the budget limitations of the customer Which
action should the account manager take
Inform the customer that the project budget must be increased
Inform the customer that the project cannot be completed given the unreasonable budget constraints
Communicate any risks that are associated with the equipment substitution and obtain customer approval to
proceed
Because the customer is probably aware that the budget limitations will require lower cost less capable
equipment the account manager should do nothing
25
Refer to the exhibit What can the field engineer conclude about the EIGRP authentication between Router1 and
Router2
Authentication will fail because only one key is configured
Authentication will succeed and EIGRP updates can be exchanged
Authentication will fail because the key chain names do not match
Authentication will fail because the key chain names must match the router names
26 A network designer must select a routing protocol for the network of a customer The currently installed network
contains both Cisco and non-Cisco routers and there is no budget to replace them The designer plans on
implementing both VLSM and route summarization in the new network design Which two protocols can
provide the necessary functionality for this LAN (Choose two)
RTP
RSTP
RIPv1
RIPv2
EIGRP
OSPF
27 A company offers online ordering of its products The web service is provided by a primary web server that
synchronizes with a backup server A network designer recommends adding a load balancing unit and installing
additional web servers so that the online ordering traffic can be equally distributed among four web servers
What network design risk is addressed with this recommendation
limited bandwidth
possible bottleneck
single point of failure
large failure domains
28
Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial
connection requires PPP encapsulation and authentication with CHAP However the connection cannot be
established According to the partial output of the show running-config command what is the cause of the
problem
The password should be all lowercase
The password should contain fewer than 8 characters
The usernames must be the same as the sending router hostnames
The usernames must be the same as the destination router hostnames
29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or
technologies must the network designer identify as training needs (Choose two)
IPv6 tunneling
QoS operation
tunneling protocols
VLAN configuration
encryption algorithms
30 What is a function of software queuing
filters traffic on the basis of administrator defined rules
stores received traffic and sends packets based on the order that the packets are received
sends packets on the basis of priorities that are manually set
transmits packets in a priority sequence that is based on source port
Showing 2 of 4 ltPrev
Page 2
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
Close Window
Assessment System
1 Assessment Selection
2 Assessment Settings
3 Take Assessment
Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting
Computer Networks (Version 40)
Time Remaining
46 What makes the Cisco EasyVPN application a useful tool for VPN implementation
It provides encryption algorithms unavailable in other systems
It ensures that remote workers actually use the VPN for connectivity
It simplifies the configuration tasks for the device that is used as the VPN server
It allows a greater variety of network devices to be used for VPN connections
47
Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing
scheme what is causing the problem
The WAN link that connects R1 to R3 has an incorrect mask
The WAN links need IP addresses from a different major network
The WAN link that connects R1 to R2 overlaps with the R3 LAN
The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM
48 Which technical requirement is satisfied when providing QoS for delay sensitive applications
availability
manageability
scalability
security
49 Which statement best describes the VPN feature called split tunneling
It creates separate pathways for different VLANs
It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP
It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic
destined for the Internet travels through the local LAN of the VPN client
It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth
tunnel while all other user traffic travels on the lower bandwidth tunnel
50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router
reaches 90 several times a day Which protocol is in use to monitor the network performance
DNS
SNMP
SMTP
DHCP
TFTP
51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate
point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and
the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A
single local loop connection can be installed at the main office with three separate PVCs to connect the branch
offices How can the main office edge router be configured to enable the customer to continue to use RIP as the
WAN routing protocol
Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote
routers
To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial
interface
Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP
address to each one
Configure the serial interface with a single interface DLCI number and create frame-relay map statements
for each remote site address
52 Which command can be used to load a new Cisco IOS image on a router
copy startup-config tftp
copy tftp startup-config
copy running-config tftp
copy tftp flash
copy flash tftp
copy flash startup-config
Showing 4 of 4 ltPrev
Page 4
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
s
Refer to the exhibit The routers are configured with RIPv2 with default configurations When attempting to
communicate with other networks hosts from 10011024 are experiencing connectivity issues What could be
done to resolve this issue
Change to a public IP addressing scheme
Use EIGRP with its default configuration as the routing protocol
Change the subnet mask on the link between R2 and R3 to 2552552550
Disable automatic route summarization on all routers in the network
5 Which two descriptions relate to a Frame Relay DLCI (Choose two)
guaranteed rate at which data travels on the packet-switched network
signalling standard between DTE and DCE
indicator of congestion on the network
locally significant circuit endpoint
one DLCI allowed per local loop
Layer 2 address
6 Why is it difficult for network designers to predict the patterns and behavior of file transfer traffic
The traffic is user initiated
File size is typically very small
Dedicated bandwidth is essential
All file transfer traffic is queued as high priority
7 A school district decides to use the 172300016 network for its LAN networks The network administrator
must create an addressing scheme to support 500 users in the admin office 200 at the high school 60 at the
elementary school and 28 at the district office Which VLSM addressing scheme will correctly address the
network with minimal waste
172300020 admin
172301021 high school
172301822 elementary
1723011226 district
172300022 admin
172304023 high school
172305024 elementary
172306026 district
172300023 admin
172302024 high school
172303026 elementary
1723036427 district
172300023 admin
172302024 high school
172303025 elementary
17230312726 district
8 Which task would typically only require services that are located at the access layer of the hierarchical design
model
placing a VoIP call to a business associate in another country
connecting to the corporate web server to update sales figures
using a VPN from home to send data to the main office server farm
responding to an e-mail from a co-worker in another department
printing a meeting agenda on a local departmental network printer
9 Which three enhancements does IPv6 offer over IPv4 (Choose three)
easier implementation and configuration
more effective IP security
integrated IP mobility support
simplified header information
fewer reserved IP addresses
eliminates the need to implement DHCP
10 A network administrator is integrating IPv6 into an IPv4 network by encapsulating one protocol packet within
another protocol Which transition method is being used
dual stack
tunneling
proxying and translation
NAT with Protocol Translator
11
Refer to the exhibit During a test of an EIGRP prototype network a network administrator issues a show ip
protocols command What two facts can be determined from the output (Choose two)
The administrative distance is 100
This router has one adjacent neighbor
There are 10 Cisco devices in this prototype network
The auto-summary command was applied on this router
EIGRP is using two values for the calculation of the composite metric
EIGRP on this router will display up to four unequal cost routes to the same destination
12 Which two pieces of information are needed before an IOS image may be loaded on a router from a TFTP
server (Choose two)
the IP address of the TFTP server
the current name of the IOS image on the router
the operating system of the TFTP server
the name of the configuration file in NVRAM
the name of the IOS image on the TFTP server
encapsulation of the router interface that is connected to the TFTP server
13 Which two values represent valid IPv6 addresses (Choose two)
1
FF011
00000001
2001DB8472A4
2031000004AC3400FFE30
14 A network administrator has configured Frame Relay on a serial interface and issued the show interfaces serial
command The output shows that the interface is up and the line protocol is up However pings to the remote
router across the link fail What should the next step be to ensure that the IP address of the remote router appears
in the Frame Relay map table of the local router
Configure the router using the no inverse-arp command
Ensure that the LMI type is correct for the circuit
Configure the router using the frame-relay map ip command
Verify that the remote router has Frame Relay encapsulation enabled
15
Refer to the exhibit A networking company technician conducts testing on a prototype to verify that the
proposed network design meets connectivity requirements Which command and its associated output will
provide evidence that inter-VLAN routing is implemented correctly and that all users have full connectivity to
each other
Showing 1 of 4 ltPrev
Page 1
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
Close Window
Assessment System
1 Assessment Selection
2 Assessment Settings
3 Take Assessment
Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting
Computer Networks (Version 40)
Time Remaining
16 During prototype testing the network designer performs a test to determine the ability of the network to store
device configurations and statistics on local databases Which design goal is validated if the test is a success
security
scalability
availability
manageability
17 Which IOS component can be used for classification and protocol discovery of network traffic and applications
in use
CDP
NBAR
ACL logging
Network Assistant
18 Which WLAN operational feature can be configured as non-broadcast in order to increase the security of an
enterprise WLAN for employees
SSID
WEP keys
VLAN parameters
WPA encryption keys
VPN authentication information
19
Refer to the exhibit A network administrator is validating the routing for the new network design Which
command should be used to configure the s000 interface of the SALES router to advertise the Sales
Department networks as one route
SALES(config-if) ip summary-address eigrp 100 1721600 25525500
SALES(config-if) ip summary-address eigrp 100 1721680 2552552400
SALES(config-if) ip summary-address eigrp 100 17216160 2552552400
SALES(config-if) ip summary-address eigrp 100 17216310 2552552480
20
Refer to the exhibit A pre-sales systems engineer receives a diagram of the exhibited WAN implementation
from a customer EIGRP is the routing protocol that is used on the WAN None of the parameters for EIGRP
metric calculation have been modified in any router configurations Which statement is true about the routing
table on router RM
There is a single route to the 19216824024 LAN using the T1 connection
There is a single route to the 19216824024 LAN using the DSL connection
There is a single route to the 19216824024 LAN using the Metro Ethernet connection
EIGRP installs all three routes to the 19216824024 LAN and load balances the traffic
21
Refer to the exhibit Which set of commands will meet the security requirements that are shown
22 What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a
partial mesh topology
It adds scalability to the corporate network
It provides fully redundant links to connecting modules
It lowers the impact and risk of DoS attacks from the Internet
It increases the manageability of the network devices in the core layer
23 What are two disadvantages to using simulation software such as Packet Tracer to validate a network design
(Choose two)
unrealistic performance
little control over network operation
inability to create large or complex networks
inability to simulate all required network conditions
lack of flexibility to support different devices and connectivity options
24 During a review of the proposed bill of materials an account manager of the network solution company realizes
that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than
was originally specified by the network designer When questioned the systems engineer responds that the
switches specified by the designer cannot be purchased within the budget limitations of the customer Which
action should the account manager take
Inform the customer that the project budget must be increased
Inform the customer that the project cannot be completed given the unreasonable budget constraints
Communicate any risks that are associated with the equipment substitution and obtain customer approval to
proceed
Because the customer is probably aware that the budget limitations will require lower cost less capable
equipment the account manager should do nothing
25
Refer to the exhibit What can the field engineer conclude about the EIGRP authentication between Router1 and
Router2
Authentication will fail because only one key is configured
Authentication will succeed and EIGRP updates can be exchanged
Authentication will fail because the key chain names do not match
Authentication will fail because the key chain names must match the router names
26 A network designer must select a routing protocol for the network of a customer The currently installed network
contains both Cisco and non-Cisco routers and there is no budget to replace them The designer plans on
implementing both VLSM and route summarization in the new network design Which two protocols can
provide the necessary functionality for this LAN (Choose two)
RTP
RSTP
RIPv1
RIPv2
EIGRP
OSPF
27 A company offers online ordering of its products The web service is provided by a primary web server that
synchronizes with a backup server A network designer recommends adding a load balancing unit and installing
additional web servers so that the online ordering traffic can be equally distributed among four web servers
What network design risk is addressed with this recommendation
limited bandwidth
possible bottleneck
single point of failure
large failure domains
28
Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial
connection requires PPP encapsulation and authentication with CHAP However the connection cannot be
established According to the partial output of the show running-config command what is the cause of the
problem
The password should be all lowercase
The password should contain fewer than 8 characters
The usernames must be the same as the sending router hostnames
The usernames must be the same as the destination router hostnames
29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or
technologies must the network designer identify as training needs (Choose two)
IPv6 tunneling
QoS operation
tunneling protocols
VLAN configuration
encryption algorithms
30 What is a function of software queuing
filters traffic on the basis of administrator defined rules
stores received traffic and sends packets based on the order that the packets are received
sends packets on the basis of priorities that are manually set
transmits packets in a priority sequence that is based on source port
Showing 2 of 4 ltPrev
Page 2
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
Close Window
Assessment System
1 Assessment Selection
2 Assessment Settings
3 Take Assessment
Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting
Computer Networks (Version 40)
Time Remaining
46 What makes the Cisco EasyVPN application a useful tool for VPN implementation
It provides encryption algorithms unavailable in other systems
It ensures that remote workers actually use the VPN for connectivity
It simplifies the configuration tasks for the device that is used as the VPN server
It allows a greater variety of network devices to be used for VPN connections
47
Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing
scheme what is causing the problem
The WAN link that connects R1 to R3 has an incorrect mask
The WAN links need IP addresses from a different major network
The WAN link that connects R1 to R2 overlaps with the R3 LAN
The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM
48 Which technical requirement is satisfied when providing QoS for delay sensitive applications
availability
manageability
scalability
security
49 Which statement best describes the VPN feature called split tunneling
It creates separate pathways for different VLANs
It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP
It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic
destined for the Internet travels through the local LAN of the VPN client
It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth
tunnel while all other user traffic travels on the lower bandwidth tunnel
50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router
reaches 90 several times a day Which protocol is in use to monitor the network performance
DNS
SNMP
SMTP
DHCP
TFTP
51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate
point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and
the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A
single local loop connection can be installed at the main office with three separate PVCs to connect the branch
offices How can the main office edge router be configured to enable the customer to continue to use RIP as the
WAN routing protocol
Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote
routers
To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial
interface
Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP
address to each one
Configure the serial interface with a single interface DLCI number and create frame-relay map statements
for each remote site address
52 Which command can be used to load a new Cisco IOS image on a router
copy startup-config tftp
copy tftp startup-config
copy running-config tftp
copy tftp flash
copy flash tftp
copy flash startup-config
Showing 4 of 4 ltPrev
Page 4
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
s
1723011226 district
172300022 admin
172304023 high school
172305024 elementary
172306026 district
172300023 admin
172302024 high school
172303026 elementary
1723036427 district
172300023 admin
172302024 high school
172303025 elementary
17230312726 district
8 Which task would typically only require services that are located at the access layer of the hierarchical design
model
placing a VoIP call to a business associate in another country
connecting to the corporate web server to update sales figures
using a VPN from home to send data to the main office server farm
responding to an e-mail from a co-worker in another department
printing a meeting agenda on a local departmental network printer
9 Which three enhancements does IPv6 offer over IPv4 (Choose three)
easier implementation and configuration
more effective IP security
integrated IP mobility support
simplified header information
fewer reserved IP addresses
eliminates the need to implement DHCP
10 A network administrator is integrating IPv6 into an IPv4 network by encapsulating one protocol packet within
another protocol Which transition method is being used
dual stack
tunneling
proxying and translation
NAT with Protocol Translator
11
Refer to the exhibit During a test of an EIGRP prototype network a network administrator issues a show ip
protocols command What two facts can be determined from the output (Choose two)
The administrative distance is 100
This router has one adjacent neighbor
There are 10 Cisco devices in this prototype network
The auto-summary command was applied on this router
EIGRP is using two values for the calculation of the composite metric
EIGRP on this router will display up to four unequal cost routes to the same destination
12 Which two pieces of information are needed before an IOS image may be loaded on a router from a TFTP
server (Choose two)
the IP address of the TFTP server
the current name of the IOS image on the router
the operating system of the TFTP server
the name of the configuration file in NVRAM
the name of the IOS image on the TFTP server
encapsulation of the router interface that is connected to the TFTP server
13 Which two values represent valid IPv6 addresses (Choose two)
1
FF011
00000001
2001DB8472A4
2031000004AC3400FFE30
14 A network administrator has configured Frame Relay on a serial interface and issued the show interfaces serial
command The output shows that the interface is up and the line protocol is up However pings to the remote
router across the link fail What should the next step be to ensure that the IP address of the remote router appears
in the Frame Relay map table of the local router
Configure the router using the no inverse-arp command
Ensure that the LMI type is correct for the circuit
Configure the router using the frame-relay map ip command
Verify that the remote router has Frame Relay encapsulation enabled
15
Refer to the exhibit A networking company technician conducts testing on a prototype to verify that the
proposed network design meets connectivity requirements Which command and its associated output will
provide evidence that inter-VLAN routing is implemented correctly and that all users have full connectivity to
each other
Showing 1 of 4 ltPrev
Page 1
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
Close Window
Assessment System
1 Assessment Selection
2 Assessment Settings
3 Take Assessment
Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting
Computer Networks (Version 40)
Time Remaining
16 During prototype testing the network designer performs a test to determine the ability of the network to store
device configurations and statistics on local databases Which design goal is validated if the test is a success
security
scalability
availability
manageability
17 Which IOS component can be used for classification and protocol discovery of network traffic and applications
in use
CDP
NBAR
ACL logging
Network Assistant
18 Which WLAN operational feature can be configured as non-broadcast in order to increase the security of an
enterprise WLAN for employees
SSID
WEP keys
VLAN parameters
WPA encryption keys
VPN authentication information
19
Refer to the exhibit A network administrator is validating the routing for the new network design Which
command should be used to configure the s000 interface of the SALES router to advertise the Sales
Department networks as one route
SALES(config-if) ip summary-address eigrp 100 1721600 25525500
SALES(config-if) ip summary-address eigrp 100 1721680 2552552400
SALES(config-if) ip summary-address eigrp 100 17216160 2552552400
SALES(config-if) ip summary-address eigrp 100 17216310 2552552480
20
Refer to the exhibit A pre-sales systems engineer receives a diagram of the exhibited WAN implementation
from a customer EIGRP is the routing protocol that is used on the WAN None of the parameters for EIGRP
metric calculation have been modified in any router configurations Which statement is true about the routing
table on router RM
There is a single route to the 19216824024 LAN using the T1 connection
There is a single route to the 19216824024 LAN using the DSL connection
There is a single route to the 19216824024 LAN using the Metro Ethernet connection
EIGRP installs all three routes to the 19216824024 LAN and load balances the traffic
21
Refer to the exhibit Which set of commands will meet the security requirements that are shown
22 What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a
partial mesh topology
It adds scalability to the corporate network
It provides fully redundant links to connecting modules
It lowers the impact and risk of DoS attacks from the Internet
It increases the manageability of the network devices in the core layer
23 What are two disadvantages to using simulation software such as Packet Tracer to validate a network design
(Choose two)
unrealistic performance
little control over network operation
inability to create large or complex networks
inability to simulate all required network conditions
lack of flexibility to support different devices and connectivity options
24 During a review of the proposed bill of materials an account manager of the network solution company realizes
that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than
was originally specified by the network designer When questioned the systems engineer responds that the
switches specified by the designer cannot be purchased within the budget limitations of the customer Which
action should the account manager take
Inform the customer that the project budget must be increased
Inform the customer that the project cannot be completed given the unreasonable budget constraints
Communicate any risks that are associated with the equipment substitution and obtain customer approval to
proceed
Because the customer is probably aware that the budget limitations will require lower cost less capable
equipment the account manager should do nothing
25
Refer to the exhibit What can the field engineer conclude about the EIGRP authentication between Router1 and
Router2
Authentication will fail because only one key is configured
Authentication will succeed and EIGRP updates can be exchanged
Authentication will fail because the key chain names do not match
Authentication will fail because the key chain names must match the router names
26 A network designer must select a routing protocol for the network of a customer The currently installed network
contains both Cisco and non-Cisco routers and there is no budget to replace them The designer plans on
implementing both VLSM and route summarization in the new network design Which two protocols can
provide the necessary functionality for this LAN (Choose two)
RTP
RSTP
RIPv1
RIPv2
EIGRP
OSPF
27 A company offers online ordering of its products The web service is provided by a primary web server that
synchronizes with a backup server A network designer recommends adding a load balancing unit and installing
additional web servers so that the online ordering traffic can be equally distributed among four web servers
What network design risk is addressed with this recommendation
limited bandwidth
possible bottleneck
single point of failure
large failure domains
28
Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial
connection requires PPP encapsulation and authentication with CHAP However the connection cannot be
established According to the partial output of the show running-config command what is the cause of the
problem
The password should be all lowercase
The password should contain fewer than 8 characters
The usernames must be the same as the sending router hostnames
The usernames must be the same as the destination router hostnames
29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or
technologies must the network designer identify as training needs (Choose two)
IPv6 tunneling
QoS operation
tunneling protocols
VLAN configuration
encryption algorithms
30 What is a function of software queuing
filters traffic on the basis of administrator defined rules
stores received traffic and sends packets based on the order that the packets are received
sends packets on the basis of priorities that are manually set
transmits packets in a priority sequence that is based on source port
Showing 2 of 4 ltPrev
Page 2
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
Close Window
Assessment System
1 Assessment Selection
2 Assessment Settings
3 Take Assessment
Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting
Computer Networks (Version 40)
Time Remaining
46 What makes the Cisco EasyVPN application a useful tool for VPN implementation
It provides encryption algorithms unavailable in other systems
It ensures that remote workers actually use the VPN for connectivity
It simplifies the configuration tasks for the device that is used as the VPN server
It allows a greater variety of network devices to be used for VPN connections
47
Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing
scheme what is causing the problem
The WAN link that connects R1 to R3 has an incorrect mask
The WAN links need IP addresses from a different major network
The WAN link that connects R1 to R2 overlaps with the R3 LAN
The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM
48 Which technical requirement is satisfied when providing QoS for delay sensitive applications
availability
manageability
scalability
security
49 Which statement best describes the VPN feature called split tunneling
It creates separate pathways for different VLANs
It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP
It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic
destined for the Internet travels through the local LAN of the VPN client
It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth
tunnel while all other user traffic travels on the lower bandwidth tunnel
50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router
reaches 90 several times a day Which protocol is in use to monitor the network performance
DNS
SNMP
SMTP
DHCP
TFTP
51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate
point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and
the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A
single local loop connection can be installed at the main office with three separate PVCs to connect the branch
offices How can the main office edge router be configured to enable the customer to continue to use RIP as the
WAN routing protocol
Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote
routers
To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial
interface
Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP
address to each one
Configure the serial interface with a single interface DLCI number and create frame-relay map statements
for each remote site address
52 Which command can be used to load a new Cisco IOS image on a router
copy startup-config tftp
copy tftp startup-config
copy running-config tftp
copy tftp flash
copy flash tftp
copy flash startup-config
Showing 4 of 4 ltPrev
Page 4
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
s
Refer to the exhibit During a test of an EIGRP prototype network a network administrator issues a show ip
protocols command What two facts can be determined from the output (Choose two)
The administrative distance is 100
This router has one adjacent neighbor
There are 10 Cisco devices in this prototype network
The auto-summary command was applied on this router
EIGRP is using two values for the calculation of the composite metric
EIGRP on this router will display up to four unequal cost routes to the same destination
12 Which two pieces of information are needed before an IOS image may be loaded on a router from a TFTP
server (Choose two)
the IP address of the TFTP server
the current name of the IOS image on the router
the operating system of the TFTP server
the name of the configuration file in NVRAM
the name of the IOS image on the TFTP server
encapsulation of the router interface that is connected to the TFTP server
13 Which two values represent valid IPv6 addresses (Choose two)
1
FF011
00000001
2001DB8472A4
2031000004AC3400FFE30
14 A network administrator has configured Frame Relay on a serial interface and issued the show interfaces serial
command The output shows that the interface is up and the line protocol is up However pings to the remote
router across the link fail What should the next step be to ensure that the IP address of the remote router appears
in the Frame Relay map table of the local router
Configure the router using the no inverse-arp command
Ensure that the LMI type is correct for the circuit
Configure the router using the frame-relay map ip command
Verify that the remote router has Frame Relay encapsulation enabled
15
Refer to the exhibit A networking company technician conducts testing on a prototype to verify that the
proposed network design meets connectivity requirements Which command and its associated output will
provide evidence that inter-VLAN routing is implemented correctly and that all users have full connectivity to
each other
Showing 1 of 4 ltPrev
Page 1
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
Close Window
Assessment System
1 Assessment Selection
2 Assessment Settings
3 Take Assessment
Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting
Computer Networks (Version 40)
Time Remaining
16 During prototype testing the network designer performs a test to determine the ability of the network to store
device configurations and statistics on local databases Which design goal is validated if the test is a success
security
scalability
availability
manageability
17 Which IOS component can be used for classification and protocol discovery of network traffic and applications
in use
CDP
NBAR
ACL logging
Network Assistant
18 Which WLAN operational feature can be configured as non-broadcast in order to increase the security of an
enterprise WLAN for employees
SSID
WEP keys
VLAN parameters
WPA encryption keys
VPN authentication information
19
Refer to the exhibit A network administrator is validating the routing for the new network design Which
command should be used to configure the s000 interface of the SALES router to advertise the Sales
Department networks as one route
SALES(config-if) ip summary-address eigrp 100 1721600 25525500
SALES(config-if) ip summary-address eigrp 100 1721680 2552552400
SALES(config-if) ip summary-address eigrp 100 17216160 2552552400
SALES(config-if) ip summary-address eigrp 100 17216310 2552552480
20
Refer to the exhibit A pre-sales systems engineer receives a diagram of the exhibited WAN implementation
from a customer EIGRP is the routing protocol that is used on the WAN None of the parameters for EIGRP
metric calculation have been modified in any router configurations Which statement is true about the routing
table on router RM
There is a single route to the 19216824024 LAN using the T1 connection
There is a single route to the 19216824024 LAN using the DSL connection
There is a single route to the 19216824024 LAN using the Metro Ethernet connection
EIGRP installs all three routes to the 19216824024 LAN and load balances the traffic
21
Refer to the exhibit Which set of commands will meet the security requirements that are shown
22 What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a
partial mesh topology
It adds scalability to the corporate network
It provides fully redundant links to connecting modules
It lowers the impact and risk of DoS attacks from the Internet
It increases the manageability of the network devices in the core layer
23 What are two disadvantages to using simulation software such as Packet Tracer to validate a network design
(Choose two)
unrealistic performance
little control over network operation
inability to create large or complex networks
inability to simulate all required network conditions
lack of flexibility to support different devices and connectivity options
24 During a review of the proposed bill of materials an account manager of the network solution company realizes
that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than
was originally specified by the network designer When questioned the systems engineer responds that the
switches specified by the designer cannot be purchased within the budget limitations of the customer Which
action should the account manager take
Inform the customer that the project budget must be increased
Inform the customer that the project cannot be completed given the unreasonable budget constraints
Communicate any risks that are associated with the equipment substitution and obtain customer approval to
proceed
Because the customer is probably aware that the budget limitations will require lower cost less capable
equipment the account manager should do nothing
25
Refer to the exhibit What can the field engineer conclude about the EIGRP authentication between Router1 and
Router2
Authentication will fail because only one key is configured
Authentication will succeed and EIGRP updates can be exchanged
Authentication will fail because the key chain names do not match
Authentication will fail because the key chain names must match the router names
26 A network designer must select a routing protocol for the network of a customer The currently installed network
contains both Cisco and non-Cisco routers and there is no budget to replace them The designer plans on
implementing both VLSM and route summarization in the new network design Which two protocols can
provide the necessary functionality for this LAN (Choose two)
RTP
RSTP
RIPv1
RIPv2
EIGRP
OSPF
27 A company offers online ordering of its products The web service is provided by a primary web server that
synchronizes with a backup server A network designer recommends adding a load balancing unit and installing
additional web servers so that the online ordering traffic can be equally distributed among four web servers
What network design risk is addressed with this recommendation
limited bandwidth
possible bottleneck
single point of failure
large failure domains
28
Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial
connection requires PPP encapsulation and authentication with CHAP However the connection cannot be
established According to the partial output of the show running-config command what is the cause of the
problem
The password should be all lowercase
The password should contain fewer than 8 characters
The usernames must be the same as the sending router hostnames
The usernames must be the same as the destination router hostnames
29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or
technologies must the network designer identify as training needs (Choose two)
IPv6 tunneling
QoS operation
tunneling protocols
VLAN configuration
encryption algorithms
30 What is a function of software queuing
filters traffic on the basis of administrator defined rules
stores received traffic and sends packets based on the order that the packets are received
sends packets on the basis of priorities that are manually set
transmits packets in a priority sequence that is based on source port
Showing 2 of 4 ltPrev
Page 2
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
Close Window
Assessment System
1 Assessment Selection
2 Assessment Settings
3 Take Assessment
Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting
Computer Networks (Version 40)
Time Remaining
46 What makes the Cisco EasyVPN application a useful tool for VPN implementation
It provides encryption algorithms unavailable in other systems
It ensures that remote workers actually use the VPN for connectivity
It simplifies the configuration tasks for the device that is used as the VPN server
It allows a greater variety of network devices to be used for VPN connections
47
Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing
scheme what is causing the problem
The WAN link that connects R1 to R3 has an incorrect mask
The WAN links need IP addresses from a different major network
The WAN link that connects R1 to R2 overlaps with the R3 LAN
The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM
48 Which technical requirement is satisfied when providing QoS for delay sensitive applications
availability
manageability
scalability
security
49 Which statement best describes the VPN feature called split tunneling
It creates separate pathways for different VLANs
It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP
It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic
destined for the Internet travels through the local LAN of the VPN client
It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth
tunnel while all other user traffic travels on the lower bandwidth tunnel
50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router
reaches 90 several times a day Which protocol is in use to monitor the network performance
DNS
SNMP
SMTP
DHCP
TFTP
51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate
point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and
the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A
single local loop connection can be installed at the main office with three separate PVCs to connect the branch
offices How can the main office edge router be configured to enable the customer to continue to use RIP as the
WAN routing protocol
Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote
routers
To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial
interface
Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP
address to each one
Configure the serial interface with a single interface DLCI number and create frame-relay map statements
for each remote site address
52 Which command can be used to load a new Cisco IOS image on a router
copy startup-config tftp
copy tftp startup-config
copy running-config tftp
copy tftp flash
copy flash tftp
copy flash startup-config
Showing 4 of 4 ltPrev
Page 4
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
s
2001DB8472A4
2031000004AC3400FFE30
14 A network administrator has configured Frame Relay on a serial interface and issued the show interfaces serial
command The output shows that the interface is up and the line protocol is up However pings to the remote
router across the link fail What should the next step be to ensure that the IP address of the remote router appears
in the Frame Relay map table of the local router
Configure the router using the no inverse-arp command
Ensure that the LMI type is correct for the circuit
Configure the router using the frame-relay map ip command
Verify that the remote router has Frame Relay encapsulation enabled
15
Refer to the exhibit A networking company technician conducts testing on a prototype to verify that the
proposed network design meets connectivity requirements Which command and its associated output will
provide evidence that inter-VLAN routing is implemented correctly and that all users have full connectivity to
each other
Showing 1 of 4 ltPrev
Page 1
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
Close Window
Assessment System
1 Assessment Selection
2 Assessment Settings
3 Take Assessment
Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting
Computer Networks (Version 40)
Time Remaining
16 During prototype testing the network designer performs a test to determine the ability of the network to store
device configurations and statistics on local databases Which design goal is validated if the test is a success
security
scalability
availability
manageability
17 Which IOS component can be used for classification and protocol discovery of network traffic and applications
in use
CDP
NBAR
ACL logging
Network Assistant
18 Which WLAN operational feature can be configured as non-broadcast in order to increase the security of an
enterprise WLAN for employees
SSID
WEP keys
VLAN parameters
WPA encryption keys
VPN authentication information
19
Refer to the exhibit A network administrator is validating the routing for the new network design Which
command should be used to configure the s000 interface of the SALES router to advertise the Sales
Department networks as one route
SALES(config-if) ip summary-address eigrp 100 1721600 25525500
SALES(config-if) ip summary-address eigrp 100 1721680 2552552400
SALES(config-if) ip summary-address eigrp 100 17216160 2552552400
SALES(config-if) ip summary-address eigrp 100 17216310 2552552480
20
Refer to the exhibit A pre-sales systems engineer receives a diagram of the exhibited WAN implementation
from a customer EIGRP is the routing protocol that is used on the WAN None of the parameters for EIGRP
metric calculation have been modified in any router configurations Which statement is true about the routing
table on router RM
There is a single route to the 19216824024 LAN using the T1 connection
There is a single route to the 19216824024 LAN using the DSL connection
There is a single route to the 19216824024 LAN using the Metro Ethernet connection
EIGRP installs all three routes to the 19216824024 LAN and load balances the traffic
21
Refer to the exhibit Which set of commands will meet the security requirements that are shown
22 What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a
partial mesh topology
It adds scalability to the corporate network
It provides fully redundant links to connecting modules
It lowers the impact and risk of DoS attacks from the Internet
It increases the manageability of the network devices in the core layer
23 What are two disadvantages to using simulation software such as Packet Tracer to validate a network design
(Choose two)
unrealistic performance
little control over network operation
inability to create large or complex networks
inability to simulate all required network conditions
lack of flexibility to support different devices and connectivity options
24 During a review of the proposed bill of materials an account manager of the network solution company realizes
that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than
was originally specified by the network designer When questioned the systems engineer responds that the
switches specified by the designer cannot be purchased within the budget limitations of the customer Which
action should the account manager take
Inform the customer that the project budget must be increased
Inform the customer that the project cannot be completed given the unreasonable budget constraints
Communicate any risks that are associated with the equipment substitution and obtain customer approval to
proceed
Because the customer is probably aware that the budget limitations will require lower cost less capable
equipment the account manager should do nothing
25
Refer to the exhibit What can the field engineer conclude about the EIGRP authentication between Router1 and
Router2
Authentication will fail because only one key is configured
Authentication will succeed and EIGRP updates can be exchanged
Authentication will fail because the key chain names do not match
Authentication will fail because the key chain names must match the router names
26 A network designer must select a routing protocol for the network of a customer The currently installed network
contains both Cisco and non-Cisco routers and there is no budget to replace them The designer plans on
implementing both VLSM and route summarization in the new network design Which two protocols can
provide the necessary functionality for this LAN (Choose two)
RTP
RSTP
RIPv1
RIPv2
EIGRP
OSPF
27 A company offers online ordering of its products The web service is provided by a primary web server that
synchronizes with a backup server A network designer recommends adding a load balancing unit and installing
additional web servers so that the online ordering traffic can be equally distributed among four web servers
What network design risk is addressed with this recommendation
limited bandwidth
possible bottleneck
single point of failure
large failure domains
28
Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial
connection requires PPP encapsulation and authentication with CHAP However the connection cannot be
established According to the partial output of the show running-config command what is the cause of the
problem
The password should be all lowercase
The password should contain fewer than 8 characters
The usernames must be the same as the sending router hostnames
The usernames must be the same as the destination router hostnames
29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or
technologies must the network designer identify as training needs (Choose two)
IPv6 tunneling
QoS operation
tunneling protocols
VLAN configuration
encryption algorithms
30 What is a function of software queuing
filters traffic on the basis of administrator defined rules
stores received traffic and sends packets based on the order that the packets are received
sends packets on the basis of priorities that are manually set
transmits packets in a priority sequence that is based on source port
Showing 2 of 4 ltPrev
Page 2
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
Close Window
Assessment System
1 Assessment Selection
2 Assessment Settings
3 Take Assessment
Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting
Computer Networks (Version 40)
Time Remaining
46 What makes the Cisco EasyVPN application a useful tool for VPN implementation
It provides encryption algorithms unavailable in other systems
It ensures that remote workers actually use the VPN for connectivity
It simplifies the configuration tasks for the device that is used as the VPN server
It allows a greater variety of network devices to be used for VPN connections
47
Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing
scheme what is causing the problem
The WAN link that connects R1 to R3 has an incorrect mask
The WAN links need IP addresses from a different major network
The WAN link that connects R1 to R2 overlaps with the R3 LAN
The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM
48 Which technical requirement is satisfied when providing QoS for delay sensitive applications
availability
manageability
scalability
security
49 Which statement best describes the VPN feature called split tunneling
It creates separate pathways for different VLANs
It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP
It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic
destined for the Internet travels through the local LAN of the VPN client
It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth
tunnel while all other user traffic travels on the lower bandwidth tunnel
50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router
reaches 90 several times a day Which protocol is in use to monitor the network performance
DNS
SNMP
SMTP
DHCP
TFTP
51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate
point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and
the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A
single local loop connection can be installed at the main office with three separate PVCs to connect the branch
offices How can the main office edge router be configured to enable the customer to continue to use RIP as the
WAN routing protocol
Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote
routers
To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial
interface
Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP
address to each one
Configure the serial interface with a single interface DLCI number and create frame-relay map statements
for each remote site address
52 Which command can be used to load a new Cisco IOS image on a router
copy startup-config tftp
copy tftp startup-config
copy running-config tftp
copy tftp flash
copy flash tftp
copy flash startup-config
Showing 4 of 4 ltPrev
Page 4
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
s
Showing 1 of 4 ltPrev
Page 1
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
Close Window
Assessment System
1 Assessment Selection
2 Assessment Settings
3 Take Assessment
Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting
Computer Networks (Version 40)
Time Remaining
16 During prototype testing the network designer performs a test to determine the ability of the network to store
device configurations and statistics on local databases Which design goal is validated if the test is a success
security
scalability
availability
manageability
17 Which IOS component can be used for classification and protocol discovery of network traffic and applications
in use
CDP
NBAR
ACL logging
Network Assistant
18 Which WLAN operational feature can be configured as non-broadcast in order to increase the security of an
enterprise WLAN for employees
SSID
WEP keys
VLAN parameters
WPA encryption keys
VPN authentication information
19
Refer to the exhibit A network administrator is validating the routing for the new network design Which
command should be used to configure the s000 interface of the SALES router to advertise the Sales
Department networks as one route
SALES(config-if) ip summary-address eigrp 100 1721600 25525500
SALES(config-if) ip summary-address eigrp 100 1721680 2552552400
SALES(config-if) ip summary-address eigrp 100 17216160 2552552400
SALES(config-if) ip summary-address eigrp 100 17216310 2552552480
20
Refer to the exhibit A pre-sales systems engineer receives a diagram of the exhibited WAN implementation
from a customer EIGRP is the routing protocol that is used on the WAN None of the parameters for EIGRP
metric calculation have been modified in any router configurations Which statement is true about the routing
table on router RM
There is a single route to the 19216824024 LAN using the T1 connection
There is a single route to the 19216824024 LAN using the DSL connection
There is a single route to the 19216824024 LAN using the Metro Ethernet connection
EIGRP installs all three routes to the 19216824024 LAN and load balances the traffic
21
Refer to the exhibit Which set of commands will meet the security requirements that are shown
22 What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a
partial mesh topology
It adds scalability to the corporate network
It provides fully redundant links to connecting modules
It lowers the impact and risk of DoS attacks from the Internet
It increases the manageability of the network devices in the core layer
23 What are two disadvantages to using simulation software such as Packet Tracer to validate a network design
(Choose two)
unrealistic performance
little control over network operation
inability to create large or complex networks
inability to simulate all required network conditions
lack of flexibility to support different devices and connectivity options
24 During a review of the proposed bill of materials an account manager of the network solution company realizes
that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than
was originally specified by the network designer When questioned the systems engineer responds that the
switches specified by the designer cannot be purchased within the budget limitations of the customer Which
action should the account manager take
Inform the customer that the project budget must be increased
Inform the customer that the project cannot be completed given the unreasonable budget constraints
Communicate any risks that are associated with the equipment substitution and obtain customer approval to
proceed
Because the customer is probably aware that the budget limitations will require lower cost less capable
equipment the account manager should do nothing
25
Refer to the exhibit What can the field engineer conclude about the EIGRP authentication between Router1 and
Router2
Authentication will fail because only one key is configured
Authentication will succeed and EIGRP updates can be exchanged
Authentication will fail because the key chain names do not match
Authentication will fail because the key chain names must match the router names
26 A network designer must select a routing protocol for the network of a customer The currently installed network
contains both Cisco and non-Cisco routers and there is no budget to replace them The designer plans on
implementing both VLSM and route summarization in the new network design Which two protocols can
provide the necessary functionality for this LAN (Choose two)
RTP
RSTP
RIPv1
RIPv2
EIGRP
OSPF
27 A company offers online ordering of its products The web service is provided by a primary web server that
synchronizes with a backup server A network designer recommends adding a load balancing unit and installing
additional web servers so that the online ordering traffic can be equally distributed among four web servers
What network design risk is addressed with this recommendation
limited bandwidth
possible bottleneck
single point of failure
large failure domains
28
Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial
connection requires PPP encapsulation and authentication with CHAP However the connection cannot be
established According to the partial output of the show running-config command what is the cause of the
problem
The password should be all lowercase
The password should contain fewer than 8 characters
The usernames must be the same as the sending router hostnames
The usernames must be the same as the destination router hostnames
29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or
technologies must the network designer identify as training needs (Choose two)
IPv6 tunneling
QoS operation
tunneling protocols
VLAN configuration
encryption algorithms
30 What is a function of software queuing
filters traffic on the basis of administrator defined rules
stores received traffic and sends packets based on the order that the packets are received
sends packets on the basis of priorities that are manually set
transmits packets in a priority sequence that is based on source port
Showing 2 of 4 ltPrev
Page 2
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
Close Window
Assessment System
1 Assessment Selection
2 Assessment Settings
3 Take Assessment
Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting
Computer Networks (Version 40)
Time Remaining
46 What makes the Cisco EasyVPN application a useful tool for VPN implementation
It provides encryption algorithms unavailable in other systems
It ensures that remote workers actually use the VPN for connectivity
It simplifies the configuration tasks for the device that is used as the VPN server
It allows a greater variety of network devices to be used for VPN connections
47
Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing
scheme what is causing the problem
The WAN link that connects R1 to R3 has an incorrect mask
The WAN links need IP addresses from a different major network
The WAN link that connects R1 to R2 overlaps with the R3 LAN
The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM
48 Which technical requirement is satisfied when providing QoS for delay sensitive applications
availability
manageability
scalability
security
49 Which statement best describes the VPN feature called split tunneling
It creates separate pathways for different VLANs
It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP
It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic
destined for the Internet travels through the local LAN of the VPN client
It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth
tunnel while all other user traffic travels on the lower bandwidth tunnel
50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router
reaches 90 several times a day Which protocol is in use to monitor the network performance
DNS
SNMP
SMTP
DHCP
TFTP
51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate
point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and
the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A
single local loop connection can be installed at the main office with three separate PVCs to connect the branch
offices How can the main office edge router be configured to enable the customer to continue to use RIP as the
WAN routing protocol
Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote
routers
To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial
interface
Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP
address to each one
Configure the serial interface with a single interface DLCI number and create frame-relay map statements
for each remote site address
52 Which command can be used to load a new Cisco IOS image on a router
copy startup-config tftp
copy tftp startup-config
copy running-config tftp
copy tftp flash
copy flash tftp
copy flash startup-config
Showing 4 of 4 ltPrev
Page 4
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
s
Close Window
Assessment System
1 Assessment Selection
2 Assessment Settings
3 Take Assessment
Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting
Computer Networks (Version 40)
Time Remaining
16 During prototype testing the network designer performs a test to determine the ability of the network to store
device configurations and statistics on local databases Which design goal is validated if the test is a success
security
scalability
availability
manageability
17 Which IOS component can be used for classification and protocol discovery of network traffic and applications
in use
CDP
NBAR
ACL logging
Network Assistant
18 Which WLAN operational feature can be configured as non-broadcast in order to increase the security of an
enterprise WLAN for employees
SSID
WEP keys
VLAN parameters
WPA encryption keys
VPN authentication information
19
Refer to the exhibit A network administrator is validating the routing for the new network design Which
command should be used to configure the s000 interface of the SALES router to advertise the Sales
Department networks as one route
SALES(config-if) ip summary-address eigrp 100 1721600 25525500
SALES(config-if) ip summary-address eigrp 100 1721680 2552552400
SALES(config-if) ip summary-address eigrp 100 17216160 2552552400
SALES(config-if) ip summary-address eigrp 100 17216310 2552552480
20
Refer to the exhibit A pre-sales systems engineer receives a diagram of the exhibited WAN implementation
from a customer EIGRP is the routing protocol that is used on the WAN None of the parameters for EIGRP
metric calculation have been modified in any router configurations Which statement is true about the routing
table on router RM
There is a single route to the 19216824024 LAN using the T1 connection
There is a single route to the 19216824024 LAN using the DSL connection
There is a single route to the 19216824024 LAN using the Metro Ethernet connection
EIGRP installs all three routes to the 19216824024 LAN and load balances the traffic
21
Refer to the exhibit Which set of commands will meet the security requirements that are shown
22 What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a
partial mesh topology
It adds scalability to the corporate network
It provides fully redundant links to connecting modules
It lowers the impact and risk of DoS attacks from the Internet
It increases the manageability of the network devices in the core layer
23 What are two disadvantages to using simulation software such as Packet Tracer to validate a network design
(Choose two)
unrealistic performance
little control over network operation
inability to create large or complex networks
inability to simulate all required network conditions
lack of flexibility to support different devices and connectivity options
24 During a review of the proposed bill of materials an account manager of the network solution company realizes
that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than
was originally specified by the network designer When questioned the systems engineer responds that the
switches specified by the designer cannot be purchased within the budget limitations of the customer Which
action should the account manager take
Inform the customer that the project budget must be increased
Inform the customer that the project cannot be completed given the unreasonable budget constraints
Communicate any risks that are associated with the equipment substitution and obtain customer approval to
proceed
Because the customer is probably aware that the budget limitations will require lower cost less capable
equipment the account manager should do nothing
25
Refer to the exhibit What can the field engineer conclude about the EIGRP authentication between Router1 and
Router2
Authentication will fail because only one key is configured
Authentication will succeed and EIGRP updates can be exchanged
Authentication will fail because the key chain names do not match
Authentication will fail because the key chain names must match the router names
26 A network designer must select a routing protocol for the network of a customer The currently installed network
contains both Cisco and non-Cisco routers and there is no budget to replace them The designer plans on
implementing both VLSM and route summarization in the new network design Which two protocols can
provide the necessary functionality for this LAN (Choose two)
RTP
RSTP
RIPv1
RIPv2
EIGRP
OSPF
27 A company offers online ordering of its products The web service is provided by a primary web server that
synchronizes with a backup server A network designer recommends adding a load balancing unit and installing
additional web servers so that the online ordering traffic can be equally distributed among four web servers
What network design risk is addressed with this recommendation
limited bandwidth
possible bottleneck
single point of failure
large failure domains
28
Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial
connection requires PPP encapsulation and authentication with CHAP However the connection cannot be
established According to the partial output of the show running-config command what is the cause of the
problem
The password should be all lowercase
The password should contain fewer than 8 characters
The usernames must be the same as the sending router hostnames
The usernames must be the same as the destination router hostnames
29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or
technologies must the network designer identify as training needs (Choose two)
IPv6 tunneling
QoS operation
tunneling protocols
VLAN configuration
encryption algorithms
30 What is a function of software queuing
filters traffic on the basis of administrator defined rules
stores received traffic and sends packets based on the order that the packets are received
sends packets on the basis of priorities that are manually set
transmits packets in a priority sequence that is based on source port
Showing 2 of 4 ltPrev
Page 2
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
Close Window
Assessment System
1 Assessment Selection
2 Assessment Settings
3 Take Assessment
Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting
Computer Networks (Version 40)
Time Remaining
46 What makes the Cisco EasyVPN application a useful tool for VPN implementation
It provides encryption algorithms unavailable in other systems
It ensures that remote workers actually use the VPN for connectivity
It simplifies the configuration tasks for the device that is used as the VPN server
It allows a greater variety of network devices to be used for VPN connections
47
Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing
scheme what is causing the problem
The WAN link that connects R1 to R3 has an incorrect mask
The WAN links need IP addresses from a different major network
The WAN link that connects R1 to R2 overlaps with the R3 LAN
The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM
48 Which technical requirement is satisfied when providing QoS for delay sensitive applications
availability
manageability
scalability
security
49 Which statement best describes the VPN feature called split tunneling
It creates separate pathways for different VLANs
It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP
It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic
destined for the Internet travels through the local LAN of the VPN client
It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth
tunnel while all other user traffic travels on the lower bandwidth tunnel
50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router
reaches 90 several times a day Which protocol is in use to monitor the network performance
DNS
SNMP
SMTP
DHCP
TFTP
51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate
point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and
the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A
single local loop connection can be installed at the main office with three separate PVCs to connect the branch
offices How can the main office edge router be configured to enable the customer to continue to use RIP as the
WAN routing protocol
Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote
routers
To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial
interface
Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP
address to each one
Configure the serial interface with a single interface DLCI number and create frame-relay map statements
for each remote site address
52 Which command can be used to load a new Cisco IOS image on a router
copy startup-config tftp
copy tftp startup-config
copy running-config tftp
copy tftp flash
copy flash tftp
copy flash startup-config
Showing 4 of 4 ltPrev
Page 4
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
s
Refer to the exhibit A network administrator is validating the routing for the new network design Which
command should be used to configure the s000 interface of the SALES router to advertise the Sales
Department networks as one route
SALES(config-if) ip summary-address eigrp 100 1721600 25525500
SALES(config-if) ip summary-address eigrp 100 1721680 2552552400
SALES(config-if) ip summary-address eigrp 100 17216160 2552552400
SALES(config-if) ip summary-address eigrp 100 17216310 2552552480
20
Refer to the exhibit A pre-sales systems engineer receives a diagram of the exhibited WAN implementation
from a customer EIGRP is the routing protocol that is used on the WAN None of the parameters for EIGRP
metric calculation have been modified in any router configurations Which statement is true about the routing
table on router RM
There is a single route to the 19216824024 LAN using the T1 connection
There is a single route to the 19216824024 LAN using the DSL connection
There is a single route to the 19216824024 LAN using the Metro Ethernet connection
EIGRP installs all three routes to the 19216824024 LAN and load balances the traffic
21
Refer to the exhibit Which set of commands will meet the security requirements that are shown
22 What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a
partial mesh topology
It adds scalability to the corporate network
It provides fully redundant links to connecting modules
It lowers the impact and risk of DoS attacks from the Internet
It increases the manageability of the network devices in the core layer
23 What are two disadvantages to using simulation software such as Packet Tracer to validate a network design
(Choose two)
unrealistic performance
little control over network operation
inability to create large or complex networks
inability to simulate all required network conditions
lack of flexibility to support different devices and connectivity options
24 During a review of the proposed bill of materials an account manager of the network solution company realizes
that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than
was originally specified by the network designer When questioned the systems engineer responds that the
switches specified by the designer cannot be purchased within the budget limitations of the customer Which
action should the account manager take
Inform the customer that the project budget must be increased
Inform the customer that the project cannot be completed given the unreasonable budget constraints
Communicate any risks that are associated with the equipment substitution and obtain customer approval to
proceed
Because the customer is probably aware that the budget limitations will require lower cost less capable
equipment the account manager should do nothing
25
Refer to the exhibit What can the field engineer conclude about the EIGRP authentication between Router1 and
Router2
Authentication will fail because only one key is configured
Authentication will succeed and EIGRP updates can be exchanged
Authentication will fail because the key chain names do not match
Authentication will fail because the key chain names must match the router names
26 A network designer must select a routing protocol for the network of a customer The currently installed network
contains both Cisco and non-Cisco routers and there is no budget to replace them The designer plans on
implementing both VLSM and route summarization in the new network design Which two protocols can
provide the necessary functionality for this LAN (Choose two)
RTP
RSTP
RIPv1
RIPv2
EIGRP
OSPF
27 A company offers online ordering of its products The web service is provided by a primary web server that
synchronizes with a backup server A network designer recommends adding a load balancing unit and installing
additional web servers so that the online ordering traffic can be equally distributed among four web servers
What network design risk is addressed with this recommendation
limited bandwidth
possible bottleneck
single point of failure
large failure domains
28
Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial
connection requires PPP encapsulation and authentication with CHAP However the connection cannot be
established According to the partial output of the show running-config command what is the cause of the
problem
The password should be all lowercase
The password should contain fewer than 8 characters
The usernames must be the same as the sending router hostnames
The usernames must be the same as the destination router hostnames
29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or
technologies must the network designer identify as training needs (Choose two)
IPv6 tunneling
QoS operation
tunneling protocols
VLAN configuration
encryption algorithms
30 What is a function of software queuing
filters traffic on the basis of administrator defined rules
stores received traffic and sends packets based on the order that the packets are received
sends packets on the basis of priorities that are manually set
transmits packets in a priority sequence that is based on source port
Showing 2 of 4 ltPrev
Page 2
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
Close Window
Assessment System
1 Assessment Selection
2 Assessment Settings
3 Take Assessment
Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting
Computer Networks (Version 40)
Time Remaining
46 What makes the Cisco EasyVPN application a useful tool for VPN implementation
It provides encryption algorithms unavailable in other systems
It ensures that remote workers actually use the VPN for connectivity
It simplifies the configuration tasks for the device that is used as the VPN server
It allows a greater variety of network devices to be used for VPN connections
47
Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing
scheme what is causing the problem
The WAN link that connects R1 to R3 has an incorrect mask
The WAN links need IP addresses from a different major network
The WAN link that connects R1 to R2 overlaps with the R3 LAN
The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM
48 Which technical requirement is satisfied when providing QoS for delay sensitive applications
availability
manageability
scalability
security
49 Which statement best describes the VPN feature called split tunneling
It creates separate pathways for different VLANs
It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP
It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic
destined for the Internet travels through the local LAN of the VPN client
It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth
tunnel while all other user traffic travels on the lower bandwidth tunnel
50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router
reaches 90 several times a day Which protocol is in use to monitor the network performance
DNS
SNMP
SMTP
DHCP
TFTP
51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate
point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and
the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A
single local loop connection can be installed at the main office with three separate PVCs to connect the branch
offices How can the main office edge router be configured to enable the customer to continue to use RIP as the
WAN routing protocol
Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote
routers
To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial
interface
Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP
address to each one
Configure the serial interface with a single interface DLCI number and create frame-relay map statements
for each remote site address
52 Which command can be used to load a new Cisco IOS image on a router
copy startup-config tftp
copy tftp startup-config
copy running-config tftp
copy tftp flash
copy flash tftp
copy flash startup-config
Showing 4 of 4 ltPrev
Page 4
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
s
There is a single route to the 19216824024 LAN using the Metro Ethernet connection
EIGRP installs all three routes to the 19216824024 LAN and load balances the traffic
21
Refer to the exhibit Which set of commands will meet the security requirements that are shown
22 What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a
partial mesh topology
It adds scalability to the corporate network
It provides fully redundant links to connecting modules
It lowers the impact and risk of DoS attacks from the Internet
It increases the manageability of the network devices in the core layer
23 What are two disadvantages to using simulation software such as Packet Tracer to validate a network design
(Choose two)
unrealistic performance
little control over network operation
inability to create large or complex networks
inability to simulate all required network conditions
lack of flexibility to support different devices and connectivity options
24 During a review of the proposed bill of materials an account manager of the network solution company realizes
that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than
was originally specified by the network designer When questioned the systems engineer responds that the
switches specified by the designer cannot be purchased within the budget limitations of the customer Which
action should the account manager take
Inform the customer that the project budget must be increased
Inform the customer that the project cannot be completed given the unreasonable budget constraints
Communicate any risks that are associated with the equipment substitution and obtain customer approval to
proceed
Because the customer is probably aware that the budget limitations will require lower cost less capable
equipment the account manager should do nothing
25
Refer to the exhibit What can the field engineer conclude about the EIGRP authentication between Router1 and
Router2
Authentication will fail because only one key is configured
Authentication will succeed and EIGRP updates can be exchanged
Authentication will fail because the key chain names do not match
Authentication will fail because the key chain names must match the router names
26 A network designer must select a routing protocol for the network of a customer The currently installed network
contains both Cisco and non-Cisco routers and there is no budget to replace them The designer plans on
implementing both VLSM and route summarization in the new network design Which two protocols can
provide the necessary functionality for this LAN (Choose two)
RTP
RSTP
RIPv1
RIPv2
EIGRP
OSPF
27 A company offers online ordering of its products The web service is provided by a primary web server that
synchronizes with a backup server A network designer recommends adding a load balancing unit and installing
additional web servers so that the online ordering traffic can be equally distributed among four web servers
What network design risk is addressed with this recommendation
limited bandwidth
possible bottleneck
single point of failure
large failure domains
28
Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial
connection requires PPP encapsulation and authentication with CHAP However the connection cannot be
established According to the partial output of the show running-config command what is the cause of the
problem
The password should be all lowercase
The password should contain fewer than 8 characters
The usernames must be the same as the sending router hostnames
The usernames must be the same as the destination router hostnames
29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or
technologies must the network designer identify as training needs (Choose two)
IPv6 tunneling
QoS operation
tunneling protocols
VLAN configuration
encryption algorithms
30 What is a function of software queuing
filters traffic on the basis of administrator defined rules
stores received traffic and sends packets based on the order that the packets are received
sends packets on the basis of priorities that are manually set
transmits packets in a priority sequence that is based on source port
Showing 2 of 4 ltPrev
Page 2
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
Close Window
Assessment System
1 Assessment Selection
2 Assessment Settings
3 Take Assessment
Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting
Computer Networks (Version 40)
Time Remaining
46 What makes the Cisco EasyVPN application a useful tool for VPN implementation
It provides encryption algorithms unavailable in other systems
It ensures that remote workers actually use the VPN for connectivity
It simplifies the configuration tasks for the device that is used as the VPN server
It allows a greater variety of network devices to be used for VPN connections
47
Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing
scheme what is causing the problem
The WAN link that connects R1 to R3 has an incorrect mask
The WAN links need IP addresses from a different major network
The WAN link that connects R1 to R2 overlaps with the R3 LAN
The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM
48 Which technical requirement is satisfied when providing QoS for delay sensitive applications
availability
manageability
scalability
security
49 Which statement best describes the VPN feature called split tunneling
It creates separate pathways for different VLANs
It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP
It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic
destined for the Internet travels through the local LAN of the VPN client
It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth
tunnel while all other user traffic travels on the lower bandwidth tunnel
50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router
reaches 90 several times a day Which protocol is in use to monitor the network performance
DNS
SNMP
SMTP
DHCP
TFTP
51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate
point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and
the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A
single local loop connection can be installed at the main office with three separate PVCs to connect the branch
offices How can the main office edge router be configured to enable the customer to continue to use RIP as the
WAN routing protocol
Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote
routers
To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial
interface
Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP
address to each one
Configure the serial interface with a single interface DLCI number and create frame-relay map statements
for each remote site address
52 Which command can be used to load a new Cisco IOS image on a router
copy startup-config tftp
copy tftp startup-config
copy running-config tftp
copy tftp flash
copy flash tftp
copy flash startup-config
Showing 4 of 4 ltPrev
Page 4
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
s
22 What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a
partial mesh topology
It adds scalability to the corporate network
It provides fully redundant links to connecting modules
It lowers the impact and risk of DoS attacks from the Internet
It increases the manageability of the network devices in the core layer
23 What are two disadvantages to using simulation software such as Packet Tracer to validate a network design
(Choose two)
unrealistic performance
little control over network operation
inability to create large or complex networks
inability to simulate all required network conditions
lack of flexibility to support different devices and connectivity options
24 During a review of the proposed bill of materials an account manager of the network solution company realizes
that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than
was originally specified by the network designer When questioned the systems engineer responds that the
switches specified by the designer cannot be purchased within the budget limitations of the customer Which
action should the account manager take
Inform the customer that the project budget must be increased
Inform the customer that the project cannot be completed given the unreasonable budget constraints
Communicate any risks that are associated with the equipment substitution and obtain customer approval to
proceed
Because the customer is probably aware that the budget limitations will require lower cost less capable
equipment the account manager should do nothing
25
Refer to the exhibit What can the field engineer conclude about the EIGRP authentication between Router1 and
Router2
Authentication will fail because only one key is configured
Authentication will succeed and EIGRP updates can be exchanged
Authentication will fail because the key chain names do not match
Authentication will fail because the key chain names must match the router names
26 A network designer must select a routing protocol for the network of a customer The currently installed network
contains both Cisco and non-Cisco routers and there is no budget to replace them The designer plans on
implementing both VLSM and route summarization in the new network design Which two protocols can
provide the necessary functionality for this LAN (Choose two)
RTP
RSTP
RIPv1
RIPv2
EIGRP
OSPF
27 A company offers online ordering of its products The web service is provided by a primary web server that
synchronizes with a backup server A network designer recommends adding a load balancing unit and installing
additional web servers so that the online ordering traffic can be equally distributed among four web servers
What network design risk is addressed with this recommendation
limited bandwidth
possible bottleneck
single point of failure
large failure domains
28
Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial
connection requires PPP encapsulation and authentication with CHAP However the connection cannot be
established According to the partial output of the show running-config command what is the cause of the
problem
The password should be all lowercase
The password should contain fewer than 8 characters
The usernames must be the same as the sending router hostnames
The usernames must be the same as the destination router hostnames
29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or
technologies must the network designer identify as training needs (Choose two)
IPv6 tunneling
QoS operation
tunneling protocols
VLAN configuration
encryption algorithms
30 What is a function of software queuing
filters traffic on the basis of administrator defined rules
stores received traffic and sends packets based on the order that the packets are received
sends packets on the basis of priorities that are manually set
transmits packets in a priority sequence that is based on source port
Showing 2 of 4 ltPrev
Page 2
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
Close Window
Assessment System
1 Assessment Selection
2 Assessment Settings
3 Take Assessment
Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting
Computer Networks (Version 40)
Time Remaining
46 What makes the Cisco EasyVPN application a useful tool for VPN implementation
It provides encryption algorithms unavailable in other systems
It ensures that remote workers actually use the VPN for connectivity
It simplifies the configuration tasks for the device that is used as the VPN server
It allows a greater variety of network devices to be used for VPN connections
47
Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing
scheme what is causing the problem
The WAN link that connects R1 to R3 has an incorrect mask
The WAN links need IP addresses from a different major network
The WAN link that connects R1 to R2 overlaps with the R3 LAN
The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM
48 Which technical requirement is satisfied when providing QoS for delay sensitive applications
availability
manageability
scalability
security
49 Which statement best describes the VPN feature called split tunneling
It creates separate pathways for different VLANs
It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP
It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic
destined for the Internet travels through the local LAN of the VPN client
It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth
tunnel while all other user traffic travels on the lower bandwidth tunnel
50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router
reaches 90 several times a day Which protocol is in use to monitor the network performance
DNS
SNMP
SMTP
DHCP
TFTP
51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate
point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and
the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A
single local loop connection can be installed at the main office with three separate PVCs to connect the branch
offices How can the main office edge router be configured to enable the customer to continue to use RIP as the
WAN routing protocol
Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote
routers
To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial
interface
Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP
address to each one
Configure the serial interface with a single interface DLCI number and create frame-relay map statements
for each remote site address
52 Which command can be used to load a new Cisco IOS image on a router
copy startup-config tftp
copy tftp startup-config
copy running-config tftp
copy tftp flash
copy flash tftp
copy flash startup-config
Showing 4 of 4 ltPrev
Page 4
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
s
Refer to the exhibit What can the field engineer conclude about the EIGRP authentication between Router1 and
Router2
Authentication will fail because only one key is configured
Authentication will succeed and EIGRP updates can be exchanged
Authentication will fail because the key chain names do not match
Authentication will fail because the key chain names must match the router names
26 A network designer must select a routing protocol for the network of a customer The currently installed network
contains both Cisco and non-Cisco routers and there is no budget to replace them The designer plans on
implementing both VLSM and route summarization in the new network design Which two protocols can
provide the necessary functionality for this LAN (Choose two)
RTP
RSTP
RIPv1
RIPv2
EIGRP
OSPF
27 A company offers online ordering of its products The web service is provided by a primary web server that
synchronizes with a backup server A network designer recommends adding a load balancing unit and installing
additional web servers so that the online ordering traffic can be equally distributed among four web servers
What network design risk is addressed with this recommendation
limited bandwidth
possible bottleneck
single point of failure
large failure domains
28
Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial
connection requires PPP encapsulation and authentication with CHAP However the connection cannot be
established According to the partial output of the show running-config command what is the cause of the
problem
The password should be all lowercase
The password should contain fewer than 8 characters
The usernames must be the same as the sending router hostnames
The usernames must be the same as the destination router hostnames
29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or
technologies must the network designer identify as training needs (Choose two)
IPv6 tunneling
QoS operation
tunneling protocols
VLAN configuration
encryption algorithms
30 What is a function of software queuing
filters traffic on the basis of administrator defined rules
stores received traffic and sends packets based on the order that the packets are received
sends packets on the basis of priorities that are manually set
transmits packets in a priority sequence that is based on source port
Showing 2 of 4 ltPrev
Page 2
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
Close Window
Assessment System
1 Assessment Selection
2 Assessment Settings
3 Take Assessment
Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting
Computer Networks (Version 40)
Time Remaining
46 What makes the Cisco EasyVPN application a useful tool for VPN implementation
It provides encryption algorithms unavailable in other systems
It ensures that remote workers actually use the VPN for connectivity
It simplifies the configuration tasks for the device that is used as the VPN server
It allows a greater variety of network devices to be used for VPN connections
47
Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing
scheme what is causing the problem
The WAN link that connects R1 to R3 has an incorrect mask
The WAN links need IP addresses from a different major network
The WAN link that connects R1 to R2 overlaps with the R3 LAN
The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM
48 Which technical requirement is satisfied when providing QoS for delay sensitive applications
availability
manageability
scalability
security
49 Which statement best describes the VPN feature called split tunneling
It creates separate pathways for different VLANs
It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP
It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic
destined for the Internet travels through the local LAN of the VPN client
It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth
tunnel while all other user traffic travels on the lower bandwidth tunnel
50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router
reaches 90 several times a day Which protocol is in use to monitor the network performance
DNS
SNMP
SMTP
DHCP
TFTP
51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate
point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and
the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A
single local loop connection can be installed at the main office with three separate PVCs to connect the branch
offices How can the main office edge router be configured to enable the customer to continue to use RIP as the
WAN routing protocol
Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote
routers
To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial
interface
Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP
address to each one
Configure the serial interface with a single interface DLCI number and create frame-relay map statements
for each remote site address
52 Which command can be used to load a new Cisco IOS image on a router
copy startup-config tftp
copy tftp startup-config
copy running-config tftp
copy tftp flash
copy flash tftp
copy flash startup-config
Showing 4 of 4 ltPrev
Page 4
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
s
28
Refer to the exhibit A network administrator configures two routers to test the WAN connection The serial
connection requires PPP encapsulation and authentication with CHAP However the connection cannot be
established According to the partial output of the show running-config command what is the cause of the
problem
The password should be all lowercase
The password should contain fewer than 8 characters
The usernames must be the same as the sending router hostnames
The usernames must be the same as the destination router hostnames
29 In order for the IT staff of a company to understand the basic operation of VPNs which two features or
technologies must the network designer identify as training needs (Choose two)
IPv6 tunneling
QoS operation
tunneling protocols
VLAN configuration
encryption algorithms
30 What is a function of software queuing
filters traffic on the basis of administrator defined rules
stores received traffic and sends packets based on the order that the packets are received
sends packets on the basis of priorities that are manually set
transmits packets in a priority sequence that is based on source port
Showing 2 of 4 ltPrev
Page 2
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
Close Window
Assessment System
1 Assessment Selection
2 Assessment Settings
3 Take Assessment
Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting
Computer Networks (Version 40)
Time Remaining
46 What makes the Cisco EasyVPN application a useful tool for VPN implementation
It provides encryption algorithms unavailable in other systems
It ensures that remote workers actually use the VPN for connectivity
It simplifies the configuration tasks for the device that is used as the VPN server
It allows a greater variety of network devices to be used for VPN connections
47
Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing
scheme what is causing the problem
The WAN link that connects R1 to R3 has an incorrect mask
The WAN links need IP addresses from a different major network
The WAN link that connects R1 to R2 overlaps with the R3 LAN
The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM
48 Which technical requirement is satisfied when providing QoS for delay sensitive applications
availability
manageability
scalability
security
49 Which statement best describes the VPN feature called split tunneling
It creates separate pathways for different VLANs
It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP
It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic
destined for the Internet travels through the local LAN of the VPN client
It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth
tunnel while all other user traffic travels on the lower bandwidth tunnel
50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router
reaches 90 several times a day Which protocol is in use to monitor the network performance
DNS
SNMP
SMTP
DHCP
TFTP
51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate
point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and
the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A
single local loop connection can be installed at the main office with three separate PVCs to connect the branch
offices How can the main office edge router be configured to enable the customer to continue to use RIP as the
WAN routing protocol
Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote
routers
To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial
interface
Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP
address to each one
Configure the serial interface with a single interface DLCI number and create frame-relay map statements
for each remote site address
52 Which command can be used to load a new Cisco IOS image on a router
copy startup-config tftp
copy tftp startup-config
copy running-config tftp
copy tftp flash
copy flash tftp
copy flash startup-config
Showing 4 of 4 ltPrev
Page 4
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
s
Showing 2 of 4 ltPrev
Page 2
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
Close Window
Assessment System
1 Assessment Selection
2 Assessment Settings
3 Take Assessment
Take Assessment - DCompNtwk Final - CCNA Discovery Designing and Supporting
Computer Networks (Version 40)
Time Remaining
46 What makes the Cisco EasyVPN application a useful tool for VPN implementation
It provides encryption algorithms unavailable in other systems
It ensures that remote workers actually use the VPN for connectivity
It simplifies the configuration tasks for the device that is used as the VPN server
It allows a greater variety of network devices to be used for VPN connections
47
Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing
scheme what is causing the problem
The WAN link that connects R1 to R3 has an incorrect mask
The WAN links need IP addresses from a different major network
The WAN link that connects R1 to R2 overlaps with the R3 LAN
The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM
48 Which technical requirement is satisfied when providing QoS for delay sensitive applications
availability
manageability
scalability
security
49 Which statement best describes the VPN feature called split tunneling
It creates separate pathways for different VLANs
It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP
It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic
destined for the Internet travels through the local LAN of the VPN client
It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth
tunnel while all other user traffic travels on the lower bandwidth tunnel
50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router
reaches 90 several times a day Which protocol is in use to monitor the network performance
DNS
SNMP
SMTP
DHCP
TFTP
51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate
point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and
the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A
single local loop connection can be installed at the main office with three separate PVCs to connect the branch
offices How can the main office edge router be configured to enable the customer to continue to use RIP as the
WAN routing protocol
Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote
routers
To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial
interface
Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP
address to each one
Configure the serial interface with a single interface DLCI number and create frame-relay map statements
for each remote site address
52 Which command can be used to load a new Cisco IOS image on a router
copy startup-config tftp
copy tftp startup-config
copy running-config tftp
copy tftp flash
copy flash tftp
copy flash startup-config
Showing 4 of 4 ltPrev
Page 4
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
s
Refer to the exhibit A customer has a problem with connectivity in the network Based on the IP addressing
scheme what is causing the problem
The WAN link that connects R1 to R3 has an incorrect mask
The WAN links need IP addresses from a different major network
The WAN link that connects R1 to R2 overlaps with the R3 LAN
The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM
48 Which technical requirement is satisfied when providing QoS for delay sensitive applications
availability
manageability
scalability
security
49 Which statement best describes the VPN feature called split tunneling
It creates separate pathways for different VLANs
It creates two tunnels one for user traffic and one for management traffic such as CDP and SNMP
It allows user traffic that is destined for the corporate network to travel across the VPN tunnel while traffic
destined for the Internet travels through the local LAN of the VPN client
It allows separate tunnels so that high priority traffic such as voice and video uses the higher bandwidth
tunnel while all other user traffic travels on the lower bandwidth tunnel
50 As part of network monitoring a network administrator receives an alert that the CPU usage of the core router
reaches 90 several times a day Which protocol is in use to monitor the network performance
DNS
SNMP
SMTP
DHCP
TFTP
51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate
point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and
the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A
single local loop connection can be installed at the main office with three separate PVCs to connect the branch
offices How can the main office edge router be configured to enable the customer to continue to use RIP as the
WAN routing protocol
Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote
routers
To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial
interface
Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP
address to each one
Configure the serial interface with a single interface DLCI number and create frame-relay map statements
for each remote site address
52 Which command can be used to load a new Cisco IOS image on a router
copy startup-config tftp
copy tftp startup-config
copy running-config tftp
copy tftp flash
copy flash tftp
copy flash startup-config
Showing 4 of 4 ltPrev
Page 4
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
s
SMTP
DHCP
TFTP
51 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate
point-to-point T1 circuits The customer network uses RIPv2 as the routing protocol within both the LAN and
the WAN The account manager proposes a change to a Frame Relay network because the costs are lower A
single local loop connection can be installed at the main office with three separate PVCs to connect the branch
offices How can the main office edge router be configured to enable the customer to continue to use RIP as the
WAN routing protocol
Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote
routers
To prevent the Frame Relay network from causing a routing loop disable split horizon on the serial
interface
Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP
address to each one
Configure the serial interface with a single interface DLCI number and create frame-relay map statements
for each remote site address
52 Which command can be used to load a new Cisco IOS image on a router
copy startup-config tftp
copy tftp startup-config
copy running-config tftp
copy tftp flash
copy flash tftp
copy flash startup-config
Showing 4 of 4 ltPrev
Page 4
Nextgt
Close Window
All contents copyright 1992-2009 Cisco Systems Inc Privacy Statement and Trademarks
s