Vous êtes sur la page 1sur 5

. Which two statements are true about IPv6 link local addresses? (Choose two.

)
---They begin with the FE80::/10 prefix.
---They are assigned to a host by a stateless autoconfiguration process.
. Refer to the exhibit. What is another way to represent this IPv6 address?
---2031:0:130F::9C0:0:130B (é o que tem zeros individuais entre dois pontos"
. Refer to the exhibit. A host connected to Fa0/0 is unable to acquire an IP add
ress from the DHCP server. The output of the debug ip dhcp server command shows
"DHCPD: there is no address pool for 192.168.3.17". What is the problem?
---The pool of addresses for the 192Network pool is configured incorrectly.

. What will be the result of adding the command ip dhcp excluded-address 10.10.4
.1 10.10.4.5 to the configuration of a local router that has been configured as
a DHCP server?
---The DHCP server will not issue the addresses ranging from 10.10.4.1 to 10.10.
4.5.
. Refer to the exhibit. PC1, PC2, and PC3 are configured with dynamic address as
signments. PC2 is assigned an IP address from the DHCP server. What would accoun
t for the IP addresses that are currently assigned to PC1 and PC3?
---R1 interfaces Fa0/0 and Fa1/0 do not include the ip helper-address command.

. Refer to the exhibit. R1 is performing NAT overload for the 10.1.1.0/24 inside
network. Host A has sent a packet to Web Server. What is the destination IP add
ress of the return packet from Web Server when received at R1?
---172.30.20.1:3333

. Refer to the exhibit. Which configuration command would result in the output i
n the exhibit?
---ip nat inside source static 192.168.0.10 172.16.76.3

. At what physical location does the responsibilty for a WAN connection change f
rom the user to the service provider?
---demarcation point

. Which additional functionality is available on an interface when the encapsula


tion is changed from HDLC to PPP?
---authentication
. Which statement accurately describes a role that is played in establishing a W
AN connection?
---Data link layer protocols like PPP and HDLC define how data is encapsulated f
or transmission across a WAN link.

. Which data link layer encapsulation protocol is used by default for serial con
nections between two Cisco routers?
---HDLC

. Refer to the exhibit. A network administrator is creating a prototype to verif


y the new WAN design. However, the communication between the two routers cannot
be established. Based on the output of the commands, what can be done to solve t
he problem?
---Configure RA with a clock rate command.
. Which protocol is used to authenticate connections over serial links securely?
---CHAP
. Which statement is true about PAP in the authentication of a PPP session?
---PAP uses a two-way handshake.
. What is an accurate description of CHAP when used with PPP on a serial connect
ion between two routers?
---A challenge message is sent to the peer router, which responds with its usern
ame and a calculated value based on a shared secret. This value is then compared
by the challenger to its own calculations.
. Refer to the exhibit. Communication between two peers has failed. Based on the
output that is shown, what is the most likely cause?
---PPP negotiation failure
. When configuring a Frame Relay connection, what is the purpose of Inverse ARP?
---to create a mapping of DLCI to Layer 3 addresses that belong to remote peers
. A company is looking for a WAN solution to connect its headquarters site to fo
ur remote sites. What are two advantages that dedicated leased lines provide com
pared to a shared Frame Relay solution? (Choose two.)
---reduced jitter
---reduced latency
. Refer to the exhibit. What is placed in the address field in the header of a f
rame that will travel from the San Jose router to the DC router?
---DLCI 301
. Which option correctly defines the capacity through the local loop guaranteed
to a customer by the service provider?
---CIR
. When Frame Relay encapsulation is used, what feature provides flow control and
exchanges information about the status of virtual circuits?
---LMI

. Refer to the exhibit. Branch A has a non-Cisco router that is using IETF encap
sulation and Branch B has a Cisco router. After the commands that are shown are
entered, R1 and R2 fail to establish the PVC. The R2 LMI is Cisco, and the R1 LM
I is ANSI. The LMI is successfully established at both locations. Why is the PVC
failing?
---The IETF parameter is missing from the frame-relay map ip 10.10.10.1 201 comm
and.

. Refer to the exhibit. You are a network administrator who has been tasked with
completing the Frame Relay topology that interconnects two remote sites. How sh
ould the point-to-point subinterfaces be configured on HQ to complete the topolo
gy?
---HQ(config-subif)# frame-relay interface-dlci 301 on Serial 0/0/0.1
---HQ(config-subif)# frame-relay interface-dlci 302 on Serial 0/0/0.2

. Refer to the exhibit. Which statement is true about the Frame Relay connection
?
---A congestion control mechanism is enabled on the Frame Relay connection.
. Which IEEE 802.16 broadband wireless technology allows users to connect to the
ISP at speeds comparable to DSL and cable?
---WiMAX
. What are two main components of data confidentiality? (Choose two.)
---encapsulation
---encryption

. Which statement about a VPN is true?


---VPNs use virtual Layer 3 connections that are routed through the Internet.
. From observing lots of port scans and ping sweeps on the company network, an a
dministrator has determined that an edge router is experiencing an attack. These
exploits are examples of what type of network attack?
---reconnaissance
. A network administrator determines that falsified routing information is propa
gating through the network.
What action can be used to address this threat?
---Configure routing protocol authentication.
. Refer to the exhibit. Which statement is true about the configuration of R1?
---The remote session is encrypted.
. What can a network administrator do to recover from a lost router password?
---boot the router to ROM monitor mode and configure the router to ignore the st
artup configuration when it initializes

. Refer to the exhibit. A network administrator is trying to backup the IOS soft
ware on R1 to the TFTP server. He receives the error message that is shown in th
e exhibit, and cannot ping the TFTP server from R1. What is an action that can h
elp to isolate this problem?
---Check that R1 has a route to the network where the TFTP server resides.
. Refer to the exhibit. A network administrator is considering updating the IOS
on Router1. What version of IOS is currently installed on Router1?
12.4
. Which statement is true about wildcard masks?
---A wildcard mask of 0.0.0.0 means the address should match exactly.
. Which type of ACL will permit traffic inbound into a private network only if a
n outbound session has already been established between the source and destinati
on?
---reflexive

. Which variable is permitted or denied by a standard access control list?


---source IP address
. A technician is editing and reapplying ACL 115 to a router, what is the result
of adding the command access-list 115 permit tcp any 172.16.0.0 0.0.255.255 est
ablished to the ACL when it is reapplied to the router?
---Responses to traffic that originates from the 172.16.0.0/16 network are allow
ed.
. Refer to the exhibit. The network administrator creates a standard access cont
rol list to prohibit traffic from the 192.168.1.0/24 network from reaching the 1
92.168.2.0/24 network while still permitting Internet access for all networks. O
n which router interface and in which direction should it be applied?
---interface Fa0/1, outbound
. Which option represents a best practice for applying ACLs?
---Extended ACLs should be applied closest to the source that is specified by th
e ACL.
. Refer to the exhibit. Which statement correctly describes how Router1 processe
s an FTP request packet that enters interface S0/0/0, and is destined for an FTP
server at IP address 172.16.1.5?
---The router matches the incoming packet to the statement that was created by t
he access-list 101 permit ip any 172.16.1.0 0.0.0.255 command, ignores the remai
ning statements in ACL 101, and allows the packet into the router.

. A network administrator has moved the company intranet web server from a switc
h port to a dedicated router interface. How can the administrator determine how
this change has affected performance and availability on the company intranet?
---Conduct a performance test and compare with the baseline that was established
previously.
. Technicians from Company A and Company B are comparing DSL transfer rates at t
heir respective companies. Both companies are in the same city, use the same ser
vice provider, and have the same rate/service plan. Company A, however, reports
higher download speeds than Company B. Which option best explains the reason for
Company A having the higher download speeds?
---The length of the local loop between Company A and the CO is shorter than the
length of the local loop between Company B and CO.

. Which characteristic of VPN technology prevents the contents of data communica


tions from being read by unauthorized parties?
---confidentiality

. A recently patched application server is experiencing response time problems.


The network on which the application server is located has been experiencing occ
asional outages that the network team believes may be related to recent routing
changes. Network and application teams have been notified to work on their respe
ctive issues. Which statement applies to this situation?
---It will be difficult to isolate the problem if two teams are implementing cha
nges independently.

. Because of a remote-procedure call failure, a user is unable to access an NFS


server. At what layer of the TCP/IP model does this problem occur?
---application layer
. Refer to the exhibit. The corporate network that is shown has been assigned ne
twork 172.16.128.0/19 for use at branch office LANs. If VLSM is used, what mask
should be used for addressing hosts at Branch4 with minimal waste from unused ad
dresses?
---/22

. Refer to the exhibit. All devices are configured as shown in the exhibit. PC1
is unable to ping the default gateway. What is the cause of the problem?
---Port Fa0/2 on S2 is assigned to the wrong VLAN.

. Refer to the exhibit. Results of the show vlan and show vtp status commands fo
r switches S1 and S2 are displayed in the exhibit. VLAN 11 was created on S1. Wh
y is VLAN 11 missing from S2?
---The VTP domain names do not match.
. Refer to the exhibit. Routers R1 and R2 have been configured with EIGRP in the
same autonomous system. Computers PC1 and PC2 are not able to ping each other.
Further investigation has revealed that the route to 192.168.10.0 is missing fro
m the routing table on R2. What is the cause of the problem?
---The FastEthernet interfaces on R1 are configured as passive.

. Refer to the exhibit. RIPv2 has been configured on all routers in the network.
Routers R1 and R3 have not received any RIP routing updates. What will fix the
issue?
---Enable RIP authentication on R2.

Vous aimerez peut-être aussi