Вы находитесь на странице: 1из 148

Topic 5 Ciscos Wireless Technologies (12 questions)

Topic 6 Identify Network Security (6 questions)

10

11

Topic 7 NAT and ACLs (37 questions)

12

13

14

15

16

17

Answer :

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

Topic 8 Implement and verify WAN links (26 questions)

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

Topic 9 Network Case (18 questions)

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

Topic 10 Update (32 questions)

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

Answer : BD
This question is to examine the differences between RIPv1 and RIPv2. RIPv1 A classful distance vector routing protocol Does not support VLSM Routing updates are broadcast Support auto-summarization. RIPv2 A classless distance vector routing protocol Support VLSM Routing updates are multicast Support manual route summarization.

131

Answer: B
This question is to examine the use of ACL. According to the information provided in the exhibit, 172.16.16.0 can reach SVR by using SSH. SVR can reach 172.16.16.0 by using telnet. So the correct answer is B.

132

This question is to examine the show version command. By using the show version command, you can display information such as Cisco IOS software version, hardware platform, flash and memory size. So the correct answer is D.

This question is to examine the DHCP-related knowledge. To display address conflicts found by a Dynamic Host Configuration Protocol (DHCP) server when addresses are offered to the client, use the show ip dhcp conflict command in privileged EXEC mode. The server uses ping to detect conflicts. The client uses gratuitous Address Resolution Protocol (ARP) to detect clients. If an address conflict is detected, the address is removed from the pool and the address is not assigned until an administrator resolves the conflict. The correct answer is A..

133

This question is to examine the BPDU Guard To prevent loops from occurring in a network, the PortFast mode is supported only on nontrunking access ports because these ports typically do not transmit or receive BPDUs. The most secure implementation of PortFast is to enable it only on ports that connect end stations to switches. Because PortFast can be enabled on nontrunking ports connecting two switches, spanning tree loops can occur because BPDUs are still being transmitted and received on those ports. The PortFast BPDU guard feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port. When the BPDU guard feature is enabled on the switch, spanning tree shuts down PortFast-configured interfaces that receive BPDUs, instead of putting them into the spanning tree blocking state. In a valid configuration, PortFast-configured interfaces do not receive BPDUs. If a PortFast-configured interface receives a BPDU, an invalid configuration exists, such as connection of an unauthorized device. The BPDU guard feature provides a secure response to invalid configurations because the administrator must manually put the interface back in service. So the correct answer is D.

This question is to check the trunking protocol. IGP is an interior gateway protocol and also a routing protocol, such as OSPF and EIGRP. 802.1q and ISL are trunking protocols which can be used to carry the traffic of multiple VLANs over a single link. ISL is a Cisco proprietary protocol. 802.3u (100Base-T) is 100 Mbps Ethernet standard. Andswer B D

134

This question is to examine the data link layer protocols. LAPB: Link Access Procedure Balanced for x.25 PPP: Point-to-Point Protocol HDLC: High-Level Data Link Control Frame-relay and the three protocols above are data link layer protocols. HDLC is the default serial encapsulation protocol. The correct answer is C.

This question is to examine the command show arp. The show arp command is used to check the corresponding relationship between IP address and MAC address of a device. So the correct answer is B.

135

This question is to examine the CDP protocol configuration. Cisco Discovery Protocol (CDP) is primarily used to obtain protocol addresses of neighboring devices and discover the platform of those devices. The cdp run command is used to enable CDP globally on the router. To enable CDP on an interface, use the cdp enable command. The correct answer is C.

This question is to examine the STP protocol. STP (802.1d) is used to prevent Layer 2 loops. 802.1q is a Frame Relay protocol which belongs to VLAN. SAP is a concept of the OSI model. So the correct answers are A and D.

136

This question is to examine the concept of the private IP address. Class A: 10.0.0.0 --10.255.255.255 Class B: 172.16.0.0--172.31.255.255 Class C: 192.168.0.0--192.168.255.255 The three classes of addresses shown above cannot be used on the Internet, they can only be used for the interior LAN addressing scheme. Because of the practical exhaustion of the IPv4 address space, private IP addresses are generated to save the address resources. The correct answer is C.

This question is to examine the OSI model. Two hosts are communicating through Internet. The communication process includes encapsulation and de-encapsulation. From down to top, de-encapsulation is required. From top to down, encapsulation is required. So the correct answer is C.

137

This question is to examine the IP addressing scheme. According to this question, we can know that the real examination point is the valid IP address range of the 192.168.5.32/28 network, which is 192.168.5.33~192.168.5.46. The correct answer is C.

This question is to examine the static route-related concept. ip route 172.16.3.0 255.255.255.0 192.168.2.4 This is a static route configuration command. 172.16.3.0 is the destination network, 192.168.2.4 is the next hop. The administrative distance is not configured, so the default administrative distance is used. The correct answers are A and D.

138

This question is to examine the Cisco IOS management. Prior to backing up an IOS image to a TFTP server, the following actions should be taken: Ensure the accessibility between the TFTP server and the device. Use the show version command to examine the IOS information to ensure that the network server has adequate space for the IOS image. So we choose A, C, D.

This question is to examine the trace route command. When checking the network connectivity, we often use the ping command or the trace route command. And the trace route command can also trace the network path of Internet routers that packets take as they are forwarded from your computer to a destination a ddress. The correct answer is C.

139

This question is to examine the network addressing scheme. When designing a network, Cisco recommends three layers structure: Core Layer, Convergence Layer and Access Layer. IP address es will be assigned to different subnets. The benefits by doing this are: ease of management and troubleshooting, reducing routing table entries and router's burden after continuous IP addresses are summarized. The correct answers are A and D.

This question is to examine QoS. Quality of Service is a network security mechanism, which is used to resolve the network delay problem. This mechanism is essential to multimedia application. When the network is overloaded, QoS will prevent a possible delay in the important data transmission and ensure the efficient operation of the network. The correct answer is B.

140

This question is to examine the OSI reference model. The Application layer is responsible for identifying and establishing the availability of the intended communication partner and determining whether sufficient resources for the intended communication exist. The correct answer is D.

This question is to examine the use of NAT. A global address pool is defined here. ip nat pool pool_name start-ip end-ip IP prefix-length number According to this question, the subnet mask is /21. The correct answer is A.

141

This question is to examine the show ip arp command. To display the Address Resolution Protocol (ARP) cache, where SLIP addresses appear as permanent ARP table entries, use the s how ip arp EXEC command. Age in minutes of the cache entry. A hyphen (-) means the address is local. The correct answer is B.

This question is to examine the concept of the distance vector routing protocol. After a distance-vector routing protocol is started on each router, the routing tables are updated with all route information gathered from neighbor routers and send periodic updates regardless of topology changes. For example, RIP updates are sent every 30 seconds by default. The correct answers are A and D.

142

This question is to examine the ARP working principle. When Host A doesn't know the MAC address of Host B,the ARP request will be broadcast so that all hosts on the LAN can see this request. If the IP is not local,the router will check its routing table to see whether there is a route to the destination network.If there is ,the router will reply with its own MAC address. So C is correct.

This question is to examine the MAC address structure. The MAC address is expressed as a 48-bit hexadecimal number. The first 24-bit number is to identify the vendor/manufacturer, also called OUI. The latter 24-bit is assigned by the vendor. The correct answer is C.

143

This question is to examine the show int command. According to the information provided in the exhibit, we can know that the data link protocol used in this network is the Frame Relay protocol. LMI enq sent So the correct answer is C.

144

This question is to examine the layer 2 port security. According to the exhibit, we know that the port security is configured to restrict the interface in the event of a violation. So A is wrong. The port security should be enabled on the interface, not globally. So the correct answers are B and D.

145

This question is to examine the IP addressing scheme. In the serial port network, only two IP addresses can be assigned. In order to save IP addresses, we often use the /30 subnet mask. So the correct answer is D.

146

147

148

Вам также может понравиться