Vous êtes sur la page 1sur 6

Questions and Answers Chapter 2-Week 2

1. Which two functions are provided by the upper layers of the OSI model? (Choose two.)
A. placing electrical signals on the medium for transmission
B. initiating the network communication process
C. encrypting and compressing data for transmission
D. segmenting and identifying data for reassembly at the destination
E. choosing the appropriate path for the data to take through the network
2. Which device is responsible for moving packets between multiple network segments?
A. Router
B. Switch
C. CSU/DSU
D. IDS device
3. Which is a function of the transport layer of the OSI model?
A. routes data between networks
B. converts data to bits for transmission
C. delivers data reliably across the network using TCP
D. formats and encodes data for transmission
E. transmits data to the next directly connected device
4. An investment company has multiple servers that hold mission critical datThey are
worried that ifsomething happens to these servers, they will lose this valuable
information. Which type of plan isneeded for this company to help minimize loss in the
event of a server crash?
A. business security
B. business continuity
C. network maintenance
D. service level agreement
5. Which two router parameters can be set from interface configuration mode? (Choose
two.)
A. IP address
B. Telnet password
C. Hostname
D. console password
E. subnet mask
F. enable secret password
6. Which common Layer 1 problem can cause a user to lose connectivity?
A. incorrect subnet mask
B. incorrect default gateway
C. loose network cable
D. NIC improperly installed
7. A DoS attack crippled the daily operations of a large company for 8 hours. Which two
optionscould be implemented by the network administrator to possibly prevent such an
attack in the future? (Choose two.)
A. install security devices with IDS and IPS at the enterprise edge
B. reset all user passwords every 30 days
C. filter packets based on IP address, traffic pattern, and protocol
D. deny external workers VPN access to internal resources
E. ensure critical devices are physically secure and placed behind the demarc

8. A network administrator must define specific business processes to implement if a


catastrophicdisaster prevents a company from performing daily business routines.
Which portion of the networkdocumentation is the administrator defining?
A. business security plan
B. business continuity plan
C. network solvency plan
D. service level agreement
E. network maintenance plan
9. A network administrator needs to configure Telnet access to a router. Which group of
commandsenable Telnet access to the router?
A. Router(config)# enable password class
B. Router(config)# line con 0
C. Router(config-line)# login
D. Router(config-line)# password cisco
E. Router(config)# ip host 192.168.1.1 NewYork
F. Router(config)# enable password cisco
G. Router(config)# line aux 0
H. Router(config-line)# login
I. Router(config-line)# password cisco
J. Router(config)# enable password class
K. Router(config)# line vty 0 4
L. Router(config-line)# login
M. Router(config-line)# password cisco
10. Which two types of information should be included in a business continuity plan?
(Choose two.)
A. maintenance time periods
B. intrusion monitoring records
C. offsite data storage procedures
D. alternate IT processing locations
E. problem resolution escalation steps
11. Which two devices protect a corporate network against malicious attacks at the
enterprise edge ?(Choose two.)
A. demark
B. IP security (IPSec)
C. Data Service Unit (DSU)
D. intrusion prevention system (IPS)
E. intrusion detection system (IDS)
12. Which three steps must be performed to remove all VLAN information from a switch
but retain therest of the configuration? (Choose three.)
A. Remove all VLAN associations from the interfaces.
B. Remove the 802.1q encapsulation from the interface
C. Issue the command copy start run.
D. Issue the command delete flash:vlan.dat.
E. Issue the command erase start.
F. Reload the switch.
13. Which two situations require a network administrator to use out-of-band management
to change arouter configuration? (Choose two.)
A. Network links to the router are down.
B. No Telnet password has been configured on the router.
C. The administrator can only connect to the router using SSH.
D. The network interfaces of the router are not configured with IP addresses.
E. Company security policy requires that only HTTPS be used to connect to routers.

14. A network manager wants to have processes in place to ensure that network upgrades
do not affectbusiness operations. What will the network manager create for this
purpose?
A. business security plan
B. business continuity plan
C. service level agreement
D. network maintenance plan
15. When searching for information about authentication methods and usernames of
companypersonnel, where can a network administrator look?
A. Business Continuity Plan
B. Business Security Plan
C. Network Maintenance Plan
D. Service Level Agreement
16. Refer to the exhibit. Which statement is true about port Fa5/1?
A. When a violation is detected, the port will log the information to a syslog server.
B. When a violation is detected, the port will go into err-disable mod
C. There have been 11 security violations since the last reload
D. The port is currently in the shutdown state.
17. What is the demarcation?
A. physical point where the ISP responsibilty ends and the customer responsibilty begins
B. physical location where all server farm connections meet before being distributed into the
Core
C. point of entry for outside attacks and is often vulnerabl
D. point of entry for all Access Layer connections from the Distribution Layer devices
18. What information can an administrator learn using the show version command?
A. Cisco IOS filename
B. configured routing protocol
C. status of each interface
D. IP addresses of all interfaces
19. It is crucial that network administrators be able to examine and configure network
devices fromtheir homes. Which two approaches allow this connectivity without
increasing vulnerability to externalattacks? (Choose two.)
A. Configure a special link at the POP to allow external entry from the home computer.
B. Set up VPN access between the home computer and the network.
C. Install a cable modem in the home to link to the network.
D. Configure ACLs on the edge routers that allow only authorized users to access
management portson network devices.
E. Configure a server in the DMZ with a special username and password to allow external
access.
20. What type of connection point is a point of presence (POP)?
A. between a client and a host
B. between two local networks
C. between a computer and a switch
D. between an ISP and an Enterprise network
21. Which three command line utilities are most commonly used to troubleshoot issues at
Layer 3? (Choose three.)
A. ping
B. a packet sniffer
C. Telnet
D. ipconfig
E. Traceroute
22. Which address is used by the router to direct a packet between networks?

23.

24.

25.

26.

27.

28.

29.

A. source MAC address


B. destination MAC address
C. source IP address
D. destination IP address
What is the correct encapsulation order when data is passed from Layer 1 up to Layer 4
of the OSI model?
A. bits, frames, packets, segments
B. frames, bits, packets, segments
C. packets, frames, segments, bits
D. segments, packets, frames, bits
What are two goals of the ISP help desk? (Choose two.)
A. conserving support resources
B. network optimization
C. competitive scalability
D. customer retention
E. sales of network services
In what two ways do Level 1 and Level 2 help desk technicians attempt to solve a
customers problems? (Choose three.)
A. talking to the customer on the telephone
B. upgrading hardware and software
C. using various web tools
D. making an onsite visit
E. installing new equipment
F. with remote desktop sharing applications
A customer calls the help desk about setting up a new PC and cable modem and being
unable to access the Internet. What three questions would the technician ask if the
bottom-up troubleshooting approach is used? (Choose three.)
A. Is the NIC link light blinking?
B. What is the IP address and subnet mask?
C. Can the default gateway be successfully pinged?
D. Is the network cable properly attached to the modem?
E. Is the Category 5 cable properly connected to the network slot on the PC?
F. Can you access your e-mail account?
A customer calls to report a problem accessing an e-commerce web site. The help desk
technician begins troubleshooting using a top-down approach. Which question would
the technician ask the customer first?
A. Can you access other web sites?
B. Is there a firewall installed on your computer?
C. What is your IP address?
D. Is the link light lit on your NIC card?
Which statement describes the process of escalating a help desk trouble ticket?
A. The help desk technican resolves the customer problem over the phone and closes the
trouble ticket.
B. Remote desktop utilities enable the help desk technician to fix a configuration error and
close the trouble ticket.
C. After trying unsuccessfully to fix a problem, the help desk technician sends the trouble
ticket to the onsite support staff.
D. When the problem is solved, all information is recorded on the trouble ticket for future
reference.
What are two functions of the physical layer of the OSI model? (Choose two.)
A. adding the hardware address
B. converting data to bits

30.

31.

32.

33.

34.

35.

36.

C. encapsulating data into frames


D. signal generation
E. routing packets
A customer calls the ISP help desk after setting up a new PC with a cable modem but
being unable to access the Internet. After the help desk technician has verified Layer 1
and Layer 2, what are three questions the help desk technician should ask the
customer? (Choose three.)
A. What is your subnet mask?
B. What is your IP address?
C. Is the NIC link light blinking?
D. Can you ping the default gateway?
E. Is the network cable properly attached to the cable modem?
F. Is the network cable correctly connected to the network port on the PC?
Which scenario represents a problem at Layer 4 of the OSI model?
A. An incorrect IP address on the default gateway.
B. A bad subnet mask in the host IP configuration.
C. A firewall filtering traffic addressed to TCP port 25 on an email server.
D. An incorrect DNS server address being given out by DHCP.
What are two basic procedures of incident management? (Choose two.)
A. opening a trouble ticket
B. using diagnostic tools to identify the problem
C. surveying network conditions for further analysis
D. configuring new equipment and software upgrades
E. adhering to a problem-solving strategy
F. e-mailing a problem resolution to the customer
Which level of support is supplied by an ISP when providing managed services?
A. Level 1
B. Level 2
C. Level 3
D. Level 4
What is the first step that is used by a help desk technician in a systematic approach to
helping a customer solve a problem?
A. identify and prioritize alternative solutions
B. isolate the cause of the problem
C. define the problem
D. select an evaluation process
A network technician has isolated a problem at the transport layer of the OSI model.
Which question would provide further information about the problem?
A. Do you have a firewall that is configured on your PC?
B. Do you have a link light on your network card?
C. Is your PC configured to obtain addressing information using DHCP?
D. What default gateway address is configured in your TCP/IP settings?
E. Can you ping http://www.cisco.com?
An ISP help desk technician receives a call from a customer who reports that no one at
their business can reach any websites, or get their e-mail. After testing the
communication line and finding everything fine, the technician instructs the customer to
run nslookup from the command prompt. What does the technician suspect is causing
the customers problem?
A. improper IP address configuration on the host
B. hardware failure of the ISR used to connect the customer to the ISP
C. bad cables or connections at the customer site
D. failure of DNS to resolve names to IP addresses

37. Which layers of the OSI model are commonly referred to as the upper layers?
A. application, presentation, session application, session, network
B. presentation, transport, network
C. presentation, network, data link
D. session, transport, network