Vous êtes sur la page 1sur 18

A router has been removed from the network for maintenance. A new Cisco IOS software image has been successfully downloaded to a server and copied into the flash of the router. What should be done before plac the router back into service?

Back up the new image.should be done before plac the router back into service? Copy the running configuration to NVRAM.

Copy the running configuration to NVRAM.plac the router back into service? Back up the new image. Delete the previous version of

Delete the previous version of the Cisco IOS software from flash.up the new image. Copy the running configuration to NVRAM. Restart the router and verify that

Restart the router and verify that the new image starts successfully.the previous version of the Cisco IOS software from flash. 2   Refer to the exhibit.

2

 
 

Refer to the exhibit. The named ACL "Managers" already exists on the router. What will happen when the network administrator issues the commands that are shown in the exhibit?

The commands overwrite the existing Managers ACL.issues the commands that are shown in the exhibit? The commands are added at the end

The commands are added at the end of the existing Managers ACL.exhibit? The commands overwrite the existing Managers ACL. The commands are added at the beginning of

The commands are added at the beginning of the existing Managers ACL.commands are added at the end of the existing Managers ACL. The network administrator receives an

The network administrator receives an error that states that the ACL already exists.are added at the beginning of the existing Managers ACL. 3 Which IOS component can be

3

Which IOS component can be used to classify and monitor network traffic?

CDPcan be used to classify and monitor network traffic? NBAR CiscoWorks Network Assistant 4 Which two

NBARcan be used to classify and monitor network traffic? CDP CiscoWorks Network Assistant 4 Which two

CiscoWorksbe used to classify and monitor network traffic? CDP NBAR Network Assistant 4 Which two pieces

Network Assistantto classify and monitor network traffic? CDP NBAR CiscoWorks 4 Which two pieces of information are

4

Which two pieces of information are needed before an IOS image may be loaded on a router from a TFTP server? (Choose two.)

the IP address of the TFTP servermay be loaded on a router from a TFTP server? (Choose two.) the current name of

the current name of the IOS image on the routerTFTP server? (Choose two.) the IP address of the TFTP server the operating system of the

the operating system of the TFTP serverTFTP server the current name of the IOS image on the router the name of the

the name of the configuration file in NVRAMimage on the router the operating system of the TFTP server the name of the IOS

the name of the IOS image on the TFTP serverthe TFTP server the name of the configuration file in NVRAM encapsulation of the router interface

encapsulation of the router interface that is connected to the TFTP serverfile in NVRAM the name of the IOS image on the TFTP server 5 Which statement

5

Which statement is true about the pairing of services and transport layer protocols for FTP and VoIP?

FTP applications and VoIP use TCP at the transport layer.of services and transport layer protocols for FTP and VoIP? FTP applications and VoIP use UDP

FTP applications and VoIP use UDP at the transport layer.FTP applications and VoIP use TCP at the transport layer. FTP applications use TCP at the

FTP applications use TCP at the transport layer while VoIP uses UDP at the transport layer.FTP applications and VoIP use UDP at the transport layer. FTP applications use UDP at the

FTP applications use UDP at the transport layer while VoIP uses TCP at the transport layer.UDP at the transport layer. FTP applications use TCP at the transport layer while VoIP uses

6 A large company plans to add several servers and requires that the servers be
6
A large company plans to add several servers and requires that the servers be reachable directly from the
Internet. Which action will help the company accomplish this goal?
Assign to each server a static internal IP address that is mapped statically to a public IP address.
Place all servers in their own Class C private subnet.
Provide a private address to each server using DHCP.
Assign addresses from a pool of public Class B addresses using DHCP.
7
Refer to the exhibit. A network administrator is configuring a new router to provide routing between VLAN
The administrator removes the router from the box and connects the Fa0/0 interface to a trunking port on the
switch. After the configuration is applied to the router, as shown in the exhibit, the traffic between VLANs f
What is causing this to occur?
The R1 router needs a routing protocol configured.
The subinterfaces of the R1 router should have IP addresses applied.
The R1 router needs three additional Fast Ethernet interfaces installed.
The subinterfaces of the R1 router should be configured in the same VLAN.
8
Refer to the exhibit. All router interfaces are up and RIP version 2 is configured

Refer to the exhibit. All router interfaces are up and RIP version 2 is configured as the routing protocol. The users in networks 172.16.8.0 /24 and 172.16.9.0/24 are not able to reach users in the 172.16.16.0/24 network The network administrator examines the routing tables and finds that even though all directly connected networks have been entered in the RIP configuration, not all routes are present. What is the most likely caus this problem?

Autosummarization is enabled on all routers.are present. What is the most likely caus this problem? The split-horizon rule is disabled on

The split-horizon rule is disabled on all routers.this problem? Autosummarization is enabled on all routers. RIP version 2 does not support classless routing.

RIP version 2 does not support classless routing.routers. The split-horizon rule is disabled on all routers. RIP version 1 should have been used

RIP version 1 should have been used instead of version 2.routers. RIP version 2 does not support classless routing. The 10.10.4.0 networks should be replaced with

The 10.10.4.0 networks should be replaced with 192.168.4.0 networks.RIP version 1 should have been used instead of version 2. 9 When implementing an IP

9

When implementing an IP telephony solution, why should VLANs be used?

to allow the use of a single IP gatewayan IP telephony solution, why should VLANs be used? to separate voice from data traffic for

to separate voice from data traffic for ease of prioritizationVLANs be used? to allow the use of a single IP gateway to allow the PBX

to allow the PBX to use VLAN IDs to filter both voice and data trafficseparate voice from data traffic for ease of prioritization to allow connectivity between traditional phone devices

to allow connectivity between traditional phone devices and IP-based telephony devicesfrom data traffic for ease of prioritization to allow the PBX to use VLAN IDs to

10

Refer to the exhibit. EIGRP is correctly configured on router Remote and router HQ. A

Refer to the exhibit. EIGRP is correctly configured on router Remote and router HQ. A network technician i configuring a backup route on router Remote to network 198.133.219.32 via router Branch. Which configur option will successfully create the backup route?

Remote(config)# ip route 198.133.219.32 255.255.255.224 198.133.219.9 ip route 198.133.219.32 255.255.255.224 198.133.219.9

Remote(config)# ip route 198.133.219.32 255.255.255.224 198.133.219.9 85 ip route 198.133.219.32 255.255.255.224 198.133.219.9 85

Remote(config)# ip route 198.133.219.32 255.255.255.224 198.133.219.9 90 ip route 198.133.219.32 255.255.255.224 198.133.219.9 90

Remote(config)# ip route 198.133.219.32 255.255.255.224 198.133.219.9 100 ip route 198.133.219.32 255.255.255.224 198.133.219.9 100

11

 
 

Refer to the exhibit. In the Cisco IOS filename that is shown, what is signified by the underlined portion?

versionthat is shown, what is signified by the underlined portion? platform file format feature set 1

platformshown, what is signified by the underlined portion? version file format feature set 1 2 A

file formatis signified by the underlined portion? version platform feature set 1 2 A technician adds the

feature setby the underlined portion? version platform file format 1 2 A technician adds the command

12

A technician adds the command Router(config-router)# variance 5 to a router using EIGRP as the routing protocol. What is the result of entering this command?

enables unequal cost load balancing enables unequal cost load balancing

adjusts the metric of all EIGRP routes to 5entering this command? enables unequal cost load balancing restricts the number of EIGRP feasible successor routes

restricts the number of EIGRP feasible successor routes to 5load balancing adjusts the metric of all EIGRP routes to 5 activates the use of all

activates the use of all K values in the composite metric calculationrestricts the number of EIGRP feasible successor routes to 5 enables EIGRP equal cost load balancing

enables EIGRP equal cost load balancing over a maximum of 5 routesthe use of all K values in the composite metric calculation 1 3 A network technician

13

A network technician needs to install a four-port switch module in an operational Cisco 1841 router that has available HWIC slot. What should the technician do first?

Turn off the power to the router before installing the new module.switch module in an operational Cisco 1841 router that has available HWIC slot. What should the

Install the hot-swappable four-port switch module directly into slot 1 of the 1841.Move the existing WIC-2T module to slot 1 and install the four-port module in slot

Move the existing WIC-2T module to slot 1 and install the four-port module in slot 0.four-port switch module directly into slot 1 of the 1841. Shut down all Fast Ethernet ports

Shut down all Fast Ethernet ports on the router until the switch module installation is complete.module to slot 1 and install the four-port module in slot 0. 14 Refer to the

14 Refer to the exhibit. What is an accurate description of the first neighbor that
14
Refer to the exhibit. What is an accurate description of the first neighbor that is displayed in the output?
port 2950 switch with a non-default native VLAN
24
port 2950 switch that is connected to Fa0/0 on Router1
24
port 2950 switch that is assigned to the administrator-defined VTP domain
24
port 2950 switch with interface GigabitEthernet0/1 that is operating at 1000 Mb/s
24
15
What will prevent workstations with unauthorized MAC addresses from connecting to the network through
switch?

STPaddresses from connecting to the network through switch? VTP RSTP BPDU port security 16. Who provides

VTPfrom connecting to the network through switch? STP RSTP BPDU port security 16. Who provides technical

RSTPfrom connecting to the network through switch? STP VTP BPDU port security 16. Who provides technical

BPDUfrom connecting to the network through switch? STP VTP RSTP port security 16. Who provides technical

port securityconnecting to the network through switch? STP VTP RSTP BPDU 16. Who provides technical support and

16. Who provides technical support and training after deploying a network solution on a large networking team? account manager

Who provides technical support and training after deploying a network solution on a large networking team?

network designerpre-sales engineer post-sales field engineer 17 Refer to the exhibit. A technician at the ISP

pre-sales engineernetwork designer post-sales field engineer 17 Refer to the exhibit. A technician at the ISP site

post-sales field engineernetwork designer pre-sales engineer 17 Refer to the exhibit. A technician at the ISP site asks

17 Refer to the exhibit. A technician at the ISP site asks the network administrator
17
Refer to the exhibit. A technician at the ISP site asks the network administrator at the client site to change th
CHAP password as part of the routing security maintenance. After the administrator makes the change and
reboots the router, the technician issues a show interfaces serial 0/0/0 command. According to the output, w
can be concluded about the serial connection between the client site and ISP site?
The router at the client site is still in the process of rebooting.
The administrator probably configured the wrong password.
The administrator has not issued a no shut command on the serial interface.
The administrator probably configured the wrong IP address for the serial interface.
18
Which address can be dynamically mapped using Inverse ARP on a Frame Relay network?

the MAC address of the device at the remote end of the virtual circuitmapped using Inverse ARP on a Frame Relay network? the IP address of the device at

the IP address of the device at the remote end of the virtual circuitof the device at the remote end of the virtual circuit the DLCI of the device

the DLCI of the device on the remote end of the virtual circuitof the device at the remote end of the virtual circuit the local DLCI of the

the local DLCI of the Frame Relay virtual circuitDLCI of the device on the remote end of the virtual circuit the MAC address of

the MAC address of the Frame Relay switchend of the virtual circuit the local DLCI of the Frame Relay virtual circuit the IP

the IP address of the Frame Relay switchend of the virtual circuit the local DLCI of the Frame Relay virtual circuit the MAC

19 What feature of EIGRP should be considered when selecting a routing protocol? EIGRP cannot
19
What feature of EIGRP should be considered when selecting a routing protocol?
EIGRP cannot secure routing updates.
It does not scale well for large networks.
It is designed for WAN connections only.
It can only be configured on Cisco devices.
20
A customer of a large multisite organization has asked a network engineer to compare a new IPv4 addressin
strategy with an IPv6 strategy for their new network implementation. Which tool is appropriate for testing an
comparing both addressing schemes?
NBAR
Cisco SDM
Network Assistant
network simulation tool
21
Refer to the exhibit. An extended ACL has been created to deny traffic from the 192.168.35.0/24 network to
web server with IP address 209.165.201.15. According to Cisco best practices, where should the ACL be
applied?
RTB Fa0/0 inbound
RTC S0/0/1 inbound
RTD Fa0/0 outbound
RTC S0/1/0 outbound
22
What can be broadcast over the wireless network to help a user connect to the network and use wireless
services?

SSIDWEP keys VLAN parameters WPA encryption keys VPN authentication information 2 3 When implementing a

WEP keysSSID VLAN parameters WPA encryption keys VPN authentication information 2 3 When implementing a security policy,

VLAN parametersSSID WEP keys WPA encryption keys VPN authentication information 2 3 When implementing a security policy,

WPA encryption keysSSID WEP keys VLAN parameters VPN authentication information 2 3 When implementing a security policy, which

VPN authentication informationSSID WEP keys VLAN parameters WPA encryption keys 2 3 When implementing a security policy, which

23 When implementing a security policy, which two actions should be included as part of the security checklist (Choose two.)

Disable all logging.be included as part of the security checklist (Choose two.) Enable Telnet on TCP port 23.

Enable Telnet on TCP port 23.of the security checklist (Choose two.) Disable all logging. Use HTTP for web administration. Set timeouts

Use HTTP for web administration.two.) Disable all logging. Enable Telnet on TCP port 23. Set timeouts and ACLs on VTY

Set timeouts and ACLs on VTY lines.Telnet on TCP port 23. Use HTTP for web administration. Shut down any unused ports and

Shut down any unused ports and interfaces.for web administration. Set timeouts and ACLs on VTY lines. 2 4 A network administrator is

24 A network administrator is asked to upgrade the enterprise network devices and to modify the addressing scheme to support VLSM and route summarization. The current network infrastructure contains both Cisco non-Cisco routers. The plan is to replace old routers gradually with the latest Cisco routers. Which two routi protocols can the administrator use to support both upgrading requirements? (Choose two.)

BGPuse to support both upgrading requirements? (Choose two.) OSPF RIPv1 RIPv2 EIGRP 2 5 During a

OSPFto support both upgrading requirements? (Choose two.) BGP RIPv1 RIPv2 EIGRP 2 5 During a review

RIPv1support both upgrading requirements? (Choose two.) BGP OSPF RIPv2 EIGRP 2 5 During a review of

RIPv2both upgrading requirements? (Choose two.) BGP OSPF RIPv1 EIGRP 2 5 During a review of the

EIGRPupgrading requirements? (Choose two.) BGP OSPF RIPv1 RIPv2 2 5 During a review of the proposed

25 During a review of the proposed bill of materials, an account manager of the network solution company real that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than was originally specified by the network designer. When questioned, the systems engineer responds that the switches specified by the designer cannot be purchased within the budget limitations of the customer. Which action should the account manager take?

Inform the customer that the project budget must be increased.the customer. Which action should the account manager take? Inform the customer that the project cannot

Inform the customer that the project cannot be completed given the unreasonable budget constraints.the customer that the project budget must be increased. Communicate any risks that are associated with

Communicate any risks that are associated with the equipment substitution and obtain customer approva proceed.be completed given the unreasonable budget constraints. Because the customer is probably aware that the budget

Because the customer is probably aware that the budget limitations will require lower cost, less capable equipment, the account manager should do nothing.equipment substitution and obtain customer approva proceed. 2 6 A user in a large office calls

26 A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. The technician asks the caller to talk to nearby users to see if other machines are affected. The calle reports that several immediate neighbors in the same department have a similar problem and that they canno ping each other. Those who are seated in other departments have connectivity. What should the technician c as the first step in troubleshooting the issue?

the power outlet to the PC that is used by the caller.in other departments have connectivity. What should the technician c as the first step in troubleshooting

the trunks between switches in the wiring closet.the status of the departmental workgroup switch in the wiring closet. the cable that connects

the status of the departmental workgroup switch in the wiring closet.the trunks between switches in the wiring closet. the cable that connects the PC of the

the cable that connects the PC of the caller to the network jack.of the departmental workgroup switch in the wiring closet. the cable connection between a PC and

the cable connection between a PC and a network outlet that is used by a neighbor.that connects the PC of the caller to the network jack. 27 Refer to the exhibit.

27 Refer to the exhibit. A pre-sales system engineer receives a diagram of the current
27
Refer to the exhibit. A pre-sales system engineer receives a diagram of the current WAN from a customer.
EIGRP is the routing protocol used on the WAN. Based on the default operation of EIGRP, which statement
true about the routing table on router R1?
There is a single route to the 192.168.16.0/24 LAN using the T1 connection.
There is a single route to the 192.168.16.0/24 LAN using the DSL connection.
There is a single route to the 192.168.16.0/24 LAN using the Metro Ethernet connection.
EIGRP installs all three routes to the 192.168.16.0/24 LAN and load balances the traffic.
28
Which statement describes the use of a network baseline?
It creates a high level logical network diagram.
It provides a point of reference for future network evaluations.
It allows precise identification of the original location of network equipment.
It should be established as soon as a problem is detected on the network.
29
Refer to the exhibit. Router R1 is unable to establish a usable connection with router

Refer to the exhibit. Router R1 is unable to establish a usable connection with router R2 via the interfaces th are shown in the exhibit. What is a possible cause of this connection failure?

There is an encapsulation mismatch.What is a possible cause of this connection failure? The bandwidth settings on the serial connection

The bandwidth settings on the serial connection are not the same.this connection failure? There is an encapsulation mismatch. clock rate has not been set on the

clock rate has not been set on the appropriate DTE interface.settings on the serial connection are not the same. shutdown command has been issued on the

shutdown command has been issued on the serial 0/1/0 interface on R2. command has been issued on the serial 0/1/0 interface on R2.

A

A

30 What value is an alternative representation of the IPv6 address 2001:DB80:0000:0000:0C41:3EFF:FE00:00

2001:DB8::C41:3EFF:FE:

2001:DB8::C41:3EFF:FE:

2001:DB80::C41:3EFF:FE00::

2001:DB80::C41:3EFF:FE00::

2001:DB80::C41:3EFF:FE00:0

2001:DB80::C41:3EFF:FE00:0

2001:DB80:0:0:0:C41:3EFF:FE::

2001:DB80:0:0:0:C41:3EFF:FE::

31 What makes the Cisco EasyVPN application a useful tool for VPN implementation?

provides encryption algorithms unavailable in other systems.EasyVPN application a useful tool for VPN implementation? ensures that remote workers actually use the VPN

ensures that remote workers actually use the VPN for connectivity.provides encryption algorithms unavailable in other systems. simplifies the configuration tasks for the device that is

simplifies the configuration tasks for the device that is used as the VPN server.that remote workers actually use the VPN for connectivity. allows a greater variety of network devices

allows a greater variety of network devices to be used for VPN connections.tasks for the device that is used as the VPN server. It It It It 3

It

It

It

It

32 What type of Frame Relay subinterface must be used to connect remote sites without having to disable split horizon?

multipointmultiaccess point-to-point nonbroadcast multiaccess 3 3 As part of network monitoring, a network administrator

multiaccessmultipoint point-to-point nonbroadcast multiaccess 3 3 As part of network monitoring, a network administrator

point-to-pointmultipoint multiaccess nonbroadcast multiaccess 3 3 As part of network monitoring, a network administrator receives

nonbroadcast multiaccessmultipoint multiaccess point-to-point 3 3 As part of network monitoring, a network administrator receives an alert

33

As part of network monitoring, a network administrator receives an alert that the CPU usage of the core rout reaches 90% several times a day. Which protocol is in use to monitor the network performance?

DNSWhich protocol is in use to monitor the network performance? SNMP SMTP DHCP TFTP 3 4

SNMPprotocol is in use to monitor the network performance? DNS SMTP DHCP TFTP 3 4 What

SMTPis in use to monitor the network performance? DNS SNMP DHCP TFTP 3 4 What is

DHCPis in use to monitor the network performance? DNS SNMP SMTP TFTP 3 4 What is

TFTPuse to monitor the network performance? DNS SNMP SMTP DHCP 3 4 What is a characteristic

34

What is a characteristic of FTP traffic flows?

low-volume trafficTFTP 3 4 What is a characteristic of FTP traffic flows? predictable bandwidth usage large packet

predictable bandwidth usageis a characteristic of FTP traffic flows? low-volume traffic large packet sizes for transfers low throughput

large packet sizes for transfersFTP traffic flows? low-volume traffic predictable bandwidth usage low throughput with high response-time requirements 35

low throughput with high response-time requirementsa characteristic of FTP traffic flows? low-volume traffic predictable bandwidth usage large packet sizes for transfers

35

low throughput with high response-time requirements 35 Refer to the exhibit. Following a test plan, the

Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of an access layer switch and connects three PCs. The engineer attempts to ping from each PC to the other connec

PCs to test the configuration. Which statement describes the result of the last step?

Host 1 can ping Host 2.Which statement describes the result of the last step? Host 1 can ping Host 3. Host

Host 1 can ping Host 3.the result of the last step? Host 1 can ping Host 2. Host 2 can ping

Host 2 can ping Host 3.last step? Host 1 can ping Host 2. Host 1 can ping Host 3. No hosts

No hosts can ping any other host.ping Host 2. Host 1 can ping Host 3. Host 2 can ping Host 3. 36

36 Refer to the exhibit. What result can be expected for STP in VLAN1? DSW1
36
Refer to the exhibit. What result can be expected for STP in VLAN1?
DSW1 is the root bridge. DSW3 would become root upon failure of DSW1.
DSW2 is the root bridge. DSW3 would become root upon failure of DSW2.
DSW3 is the root bridge. DSW1 would become root upon failure of DSW3.
DSW3 is the root bridge. DSW2 would become root upon failure of DSW3.
37
bridge. DSW2 would become root upon failure of DSW3. 37 Refer to the exhibit. What will

Refer to the exhibit. What will be the result of entering the commands as shown in the exhibit?

RIPng will not be enabled on interface fa0/0 because the network address is a broadcast address.RIPng will not be enabled on this interface because the IPv6 address is only /64

RIPng will not be enabled on this interface because the IPv6 address is only /64 bits long.fa0/0 because the network address is a broadcast address. RIPng will be enabled on interface fa0/0

RIPng will be enabled on interface fa0/0 and will advertise the configured network.interface because the IPv6 address is only /64 bits long. The IPv6 interface configuration requires a

The IPv6 interface configuration requires a network statement for the network. network statement for the network.

The IPv6 routing instance must be called RTA not RT0 . RTA not RT0.

38 Refer to the exhibit. Access list 100 is applied inbound to interface serial 0/0/0
38
Refer to the exhibit. Access list 100 is applied inbound to interface serial 0/0/0 on the SOHO Router1. Whic
traffic will be denied by the configuration?
DNS traffic from host A to the Internet
FTP traffic from host A to the Internet
ICMP traffic from the ISP to server 1
traffic from the ISP to the server on port 23
39
What should be considered in the design of a wireless LAN on a corporate campus?
the vendor of all employee wireless NICs
the cables that are used for LAN connectivity
the number of wireless NICs required on enterprise servers
the messaging features that are used on employee cell phones
the location of the concrete pillars and walls between the offices
40
What is used locally by a router to identify each Frame Relay PVC?

LMIDLCI IP address MAC address 41 Refer to the exhibit. EIGRP has been configured as

DLCILMI IP address MAC address 41 Refer to the exhibit. EIGRP has been configured as a

IP addressLMI DLCI MAC address 41 Refer to the exhibit. EIGRP has been configured as a routing

MAC addressLMI DLCI IP address 41 Refer to the exhibit. EIGRP has been configured as a routing

41 Refer to the exhibit. EIGRP has been configured as a routing protocol in the
41
Refer to the exhibit. EIGRP has been configured as a routing protocol in the network. Users who are connec
on LAN_1 and LAN_2 can ping their default gateways. Users on LAN_1 complain that they are unable to a
the resources on the file server that is connected to LAN_2. A technician issues the show ip interface brief
command on R1 to verify the status of the interfaces. What information will help the technician troubleshoot
issue?
Interface S0/0/1 line protocol is down.
Interface Vlan1 is administratively down.
Interface Fa0/1 is missing an IP address.
Interface S0/0/0 is configured with an incorrect IP address.
42
Which characteristic should be considered by a network designer when implementing a VoIP solution?

VoIP traffic is generally classified as low priority.by a network designer when implementing a VoIP solution? VoIP centrally routes calls in the same

VoIP centrally routes calls in the same manner as a traditional PBX.VoIP traffic is generally classified as low priority. VoIP traffic is highly reliable because of retransmission

VoIP traffic is highly reliable because of retransmission of dropped packets.routes calls in the same manner as a traditional PBX. VoIP can make use of QoS

VoIP can make use of QoS features to help reduce interruptions in communication.in the same manner as a traditional PBX. VoIP traffic is highly reliable because of retransmission

43 Refer to the exhibit. A networking company designer is reviewing a diagram of a
43
Refer to the exhibit. A networking company designer is reviewing a diagram of a customer network. What a
the two problems that need to be resolved in the topology that is shown? (Choose two.)
The firewall router and ISP connection represent a single point of failure.
one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable.
If
power supply failure of the server block switch will cause the entire IP telephony system to fail.
A
Using Layer 3 switches to interconnect the server block servers to the IP phones introduces too much de
The IP phones need to be redundantly connected to the switches to prevent single points of failure at the
access layer.
44
To reduce unwanted incoming traffic from the outside, a network technician is tasked with establishing the
filtering rules for the network firewall. Which traffic should be allowed?
incoming ICMP traffic
all incoming connections to internal servers
incoming responses to traffic that is generated from the inside
incoming connections from the outside that duplicate inside addresses
45
46 Refer to the exhibit. PPP was successfully negotiated between the two routers. Which command

46

Refer to the exhibit. PPP was successfully negotiated between the two routers. Which command set can be f on the local router to produce the results that are shown in the graphic? hostname Sales interface serial0/0 encapsulation ppp ppp authentication chap username Market password 5 jdhdh4737f7hssn hostname Market interface serial0/0 encapsulation ppp ppp authentication chap username sales password 5 jdhdh4737f7hssn hostname Market interface serial0/0 encapsulation ppp ppp authentication pap username sales password 5 jdhdh4737f7hssn hostname Sales interface serial0/0 encapsulation ppp ppp authentication pap username Market password 5 jdhdh4737f7hssn

pap username Market password 5 jdhdh4737f7hssn Refer to the exhibit. The routers are configured with RIPv2
pap username Market password 5 jdhdh4737f7hssn Refer to the exhibit. The routers are configured with RIPv2
pap username Market password 5 jdhdh4737f7hssn Refer to the exhibit. The routers are configured with RIPv2
pap username Market password 5 jdhdh4737f7hssn Refer to the exhibit. The routers are configured with RIPv2
pap username Market password 5 jdhdh4737f7hssn Refer to the exhibit. The routers are configured with RIPv2

Refer to the exhibit. The routers are configured with RIPv2 with default configurations. When attempting to communicate with other networks, hosts from 172.16.2.0/24 are experiencing connectivity issues. What coul done to resolve this issue? Change to a public IP address scheme.

are experiencing connectivity issues. What coul done to resolve this issue? Change to a public IP

Disable automatic route summarization.Change the IP network address on R3 Fa0/0 to 172.16.1.128 /26. Change the subnet mask

Change the IP network address on R3 Fa0/0 to 172.16.1.128 /26.Disable automatic route summarization. Change the subnet mask on the link between R2 and R3 to

Change the subnet mask on the link between R2 and R3 to 255.255.255.0.the IP network address on R3 Fa0/0 to 172.16.1.128 /26. 4 7 A network engineer is

47 A network engineer is prototyping a new IP addressing and summarization strategy for a new network that w be integrated into the existing infrastructure. Which method is appropriate for testing the addressing scheme

using the production network of the customermethod is appropriate for testing the addressing scheme using actual network equipment in a lab using

using actual network equipment in a labscheme using the production network of the customer using the Cisco Network Assistant using a network

using the Cisco Network Assistantof the customer using actual network equipment in a lab using a network simulation tool 4

using a network simulation toolnetwork equipment in a lab using the Cisco Network Assistant 4 8 Which two statements accurately

48 Which two statements accurately describe the result of entering the command BRT(config-if)# frame-relay map ip 10.1.10.1 35 on a router? (Choose two.)

The remote router updates the Frame Relay map table with DLCI 35 to reach the 10.1.10.0 network.frame-relay map ip 10.1.10.1 35 on a router? (Choose two.) Inverse ARP is used to add

Inverse ARP is used to add an entry for 10.1.10.1 into the Frame Relay map table via the use of DLCI 3Relay map table with DLCI 35 to reach the 10.1.10.0 network. DLCI 35 replaces the MAC

DLCI 35 replaces the MAC address in the ARP table for entry 10.1.10.1.into the Frame Relay map table via the use of DLCI 3 A Layer 2 address

A Layer 2 address is statically mapped to a Layer 3 address.the MAC address in the ARP table for entry 10.1.10.1. Router BRT uses DLCI 35 to

Router BRT uses DLCI 35 to forward data to 10.1.10.1.A Layer 2 address is statically mapped to a Layer 3 address. 4 9 Using the

49 Using the show frame-relay pvc and debug frame-relay lmi commands to troubleshoot a Frame Relay problem, a network administrator rules out issues at Layers 1 and 2. Further investigation reveals that the IP address of the remote router does not appear in the Frame Relay table. What should the next step be in solvi the problem?

Configure the router using the frame-relay map ip command. frame-relay map ip command.

Disable Inverse ARP on the local router.Configure the router using the frame-relay map ip command. Verify that the remote router has Frame

Verify that the remote router has Frame Relay encapsulation enabled.map ip command. Disable Inverse ARP on the local router. Ensure that the LMI type is

Ensure that the LMI type is correct for the circuit.the remote router has Frame Relay encapsulation enabled. 5 0 I n the Cisco Enterprise Architecture,

50In the Cisco Enterprise Architecture, which module would include web and e-commerce servers for access by users external to the organization?

campus coreservers for access by users external to the organization? enterprise edge enterprise branch enterprise campus 51

enterprise edgee-commerce servers for access by users external to the organization? campus core enterprise branch enterprise campus

enterprise branchand e-commerce servers for access by users external to the organization? campus core enterprise edge enterprise

enterprise campusand e-commerce servers for access by users external to the organization? campus core enterprise edge enterprise

51

Refer to the exhibit. During prototype testing of the network, the network administrator verifies that

Refer to the exhibit. During prototype testing of the network, the network administrator verifies that CDP is e all devices. On which device did the network administrator issue the command?

R1device did the network administrator issue the command? R2 R3 R4 R5 Sw3 5 2 A

R2device did the network administrator issue the command? R1 R3 R4 R5 Sw3 5 2 A

R3did the network administrator issue the command? R1 R2 R4 R5 Sw3 5 2 A company

R4did the network administrator issue the command? R1 R2 R3 R5 Sw3 5 2 A company

R5did the network administrator issue the command? R1 R2 R3 R4 Sw3 5 2 A company

Sw3the network administrator issue the command? R1 R2 R3 R4 R5 5 2 A company uses

52 A company uses the Frame Relay network to establish a VPN connection between headquarters and the bran office. The company wants to add a backup link in case the Frame Relay connection fails. The backup link w use the business DSL connection through another ISP. How should the router be configured to include the backup link?

Create a static route with the administrative distance of 1.should the router be configured to include the backup link? Create a floating static route. Add

Create a floating static route.Create a static route with the administrative distance of 1. Add a new route to the

Add a new route to the routing protocol configuration.with the administrative distance of 1. Create a floating static route. Create a second default route

Create a second default route for the backup path.the administrative distance of 1. Create a floating static route. Add a new route to the