Вы находитесь на странице: 1из 18

Refer to the exhibit. A new host needs to be connected to the switch and be assigned to VLAN 2.

Router RA is
attached to the switch via a trunk and is configured as shown. What IP address should be assigned to this new
host?
192.168.1.1 /26
192.168.1.22 /28
192.168.1.32 /28
192.168.1.44 /28
192.168.1.47 /28
192.168.1.55 /28

Refer to the exhibit. Based on the configuration of router R2, which statement is true if the four listed objectives
are requirements of an active security policy?

Objectives
(1) All traffic from the Internet into the DMZ is to be logged.
(2) Web traffic from the Internet is to be allowed into the DMZ.
(3) TCP traffic from established sessions is to be allowed into the internal network.
(4) Incoming e-mail from the Internet is to be handled by the DMZ e-mail server first.
Only objective 1 is met.
All four objectives are met.
Objectives 1, 2, and 4 are met.
Only objectives 2 and 4 are met.
Only objectives 2 and 3 are met.

3 A network engineer is designing a LAN prototype for a medium-sized business. What should be used to test the
IP addressing scheme?
Cisco SDM
network simulation tool
a fully functional network
network equipment in a testing lab

4 What is a characteristic of voice traffic in a converged network?


It is assigned secondary priority to data traffic.
It is processed in real time and cannot be retransmitted.
It consists of large packets with long, irregular data flows.
It uses the error-checking features of TCP to ensure good voice quality.

5 Which protocol allows redundant Layer 2 links without switching loops?


DHCP
HSRP
MPLS
RSTP

6 During a review of the proposed bill of materials, the ABC Networking Company account manager realizes that
the systems engineer included a lower cost, less capable switch model for the access layer connectivity than was
specified by the network designer. When questioned, the systems engineer responds that the switches that were
recommended by the designer cannot be purchased within the budget limitations of the customer. Which action
should the account manager take?
Inform the customer that the project cannot be completed given the unreasonable budget constraints.
Communicate any risks that are associated with the equipment substitution and obtain customer approval to
proceed.
Because the customer is probably aware that the budget limitations will require lower cost, less capable
equipment, the account manager should do nothing.
Inform the customer that the project budget must be increased.

7 Which two events occur when the command RTA(config)# frame-relay map ip 10.1.1.1 22 is issued on a
router? (Choose two.)
The remote router updates the Frame Relay map table with DLCI 22 to reach the 10.1.1.0 network.
Inverse-ARP is used to add an entry for 10.1.1.1 into the Frame Relay map table using DLCI 22.
DLCI 22 replaces the MAC address in the ARP table for entry 10.1.1.1.
A Layer 2 address is statically mapped to a Layer 3 address.
RTA uses DLCI 22 to forward data to 10.1.1.1.

8 A small bookstore would like to offer wireless connectivity for customers with laptops. Which wireless
components or devices will provide connectivity to the Internet for the customers with the least possible cost to
the bookstore?
wireless LAN controllers
standalone access points
wireless network cards for an ad hoc WLAN
lightweight access point and wireless LAN controller

9 When configuring Frame Relay, what identifies a virtual circuit to the WAN switch?
LMI
CPE
PVC
DLCI

10 A user in a large office calls tech support to complain that the PC no longer connects to the Internet or to any
network resources, but seems otherwise normal. The help desk technician asks the caller to talk to nearby users
to see if other machines are affected. After a few minutes, the caller reports that several immediate neighbors
have the same problem, but those seated further away do not. Assuming that the description is accurate, what
should be checked next?
power outlet to the PC that is used by the caller
workgroup switch in the telecommunications room
cable between any network outlet and the telecommunications room
cable between the PC that is used by the caller and the network outlet it connects to
cable between the PC that is used by a neighbor and the network outlet the neighbor PC it connects to

11 A new WIC is installed in an available router slot. At what point during the router startup process does the route
test the card for hardware problems?
after the configuration from NVRAM is loaded into RAM
after the configuration from NVRAM is loaded into ROM
when the bootstrap program is loaded into RAM
during the POST

12 What should be considered in the design of a wireless LAN on a corporate campus?


the vendor of all employee wireless NICs
the cables that are used for LAN connectivity
the number of wireless NICs required on enterprise servers
the messaging features that are used on employee cell phones
the location of the concrete pillars and walls between the offices

13 Which two technologies can provide data integrity in a VPN connection? (Choose two.)
ESP
DES
MD5
DH1
SHA-1
14 An HWIC-4ESW, four-port switch module needs to be installed in a Cisco 1841 router that currently has a WIC
2T module in slot 0. What should the network technician do first?
Install the hot-swappable option module.
Turn off the power to the router before installing the new module.
Remove the WIC-2T module so that the new module can be installed in slot 0.
Shut down all Fast Ethernet ports on the router until the switch module installation is complete.
Configure the Cisco IOS software to support an internal trunk link between the switch and router module.

15

Refer to the exhibit. Based on the show cdp neighbors detail command, which interface on Switch1 is
connected to Router1?
FastEthernet0/1
FastEthernet0/2
Serial0/0
Serial0/0/1

While configuring a router with EIGRP, a technician enters the EIGRP command:

Router(config-router)# variance 3

What is the effect of entering this command?

It It adjusts the cost of all EIGRP routes to 3.


en
ab
le
s
un
eq
ua
l
co
st
lo
ad
ba
la
nc
in
g.
It restricts the number of EIGRP feasible successor routes to 3.
It enables EIGRP equal cost load balancing over a maximum of 3 routes.

17 What value is an alternative representation of the IPv6 address 2005:AED0:0000:0000:020E:0000:FE00:1111?


2005:AED0::020E:0000:FE00:1
2005:AED0::20E:0:FE00:1111
2005:AED0:0:0:020E:0:FE:1
2005:AED::20E::FE00:1111

18

Refer to the exhibit. A network designer is validating an IP addressing scheme with a test network that is
configured with RIPv1. However, while the designer can ping between routers RA and RB, communications
between network A and network B cannot be established. What should be done to solve the problem?
Change the routing protocol.
Use the S0/0/0 interface on RB to connect to RA.
Configure both routers with the no auto-summary command.
Replace the IP addressing of network B with 172.16.254.0/24.

19 What type of system uses a PBX for call control and connection to the PSTN?
VPN
traditional telephony
VoIP
IP telephony
20 As part of network monitoring, a network administrator receives an alert that the CPU usage of the core router
reaches 90% several times a day. Which protocol is in use to monitor the network performance?
DNS
SNMP
SMTP
DHCP
TFTP

21 Using the show frame-relay pvc and debug frame-relay lmi commands to troubleshoot a Frame Relay
problem, a network administrator rules out issues at Layers 1 and 2. Further investigation reveals that the IP
address of the remote router does not appear in the Frame Relay table. What should the next step be in solving
the problem?
Configure the router using the frame-relay map ip command.
Disable Inverse ARP on the local router.
Verify that the remote router has Frame Relay encapsulation enabled.
Ensure that the LMI type is correct for the circuit.

22 During the boot process and assuming the default sequence, what is the second location where the router will
look for the IOS?
ROM
flash
NVRAM
TFTP server

23

Refer to the exhibit. What must be done before the new IOS image can be installed on the router?
New IOS File name: c2800nm-advipservicesk9-mz.124-15.T3.bin
Size: 51056640
Erase the current IOS .
Change the configuration register to 0x2142.
Execute a copy tftp flash in ROMMON mode.
Rename the file in flash, changing the extension to ".old".

24

Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of an
access layer switch and connects three PCs to test the configuration. The engineer attempts to ping from each PC
to the other connected PCs. Which three statements describe the expected results of pinging from one host to
another? (Choose three.)
Host 1 can ping Host 2.
Host 1 cannot ping Host 2.
Host 2 cannot ping Host 3.
Host 3 can ping Host 1.
Host 3 can ping Host 2.
Host 3 cannot ping Host 1.

25
Refer to the exhibit. All connections are working and CDP is enabled on all devices and interfaces. On which
device was the command issued?
R1
R2
Sw1
Sw2
Sw3

26 What is the result of implementing a Frame Relay service with a CIR value of zero?
Data will not cross the Frame Relay WAN.
All frames that enter the Frame Relay WAN will be marked as DE.
Only frames that exceed the local access rate will be marked as DE.
CIR is disabled, which allows all data traffic to pass through the Frame Relay WAN.

27
Refer to the exhibit. A networking company designer is reviewing a diagram of a customer network. What are
the two problems that need to be resolved in the topology that is shown? (Choose two.)
The firewall router and ISP connection represent a single point of failure.
If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable.
A power supply failure of the server block switch will cause the entire IP telephony system to fail.
Using Layer 3 switches to interconnect the server block servers to the IP phones introduces too much delay.
The IP phones need to be redundantly connected to the switches to prevent single points of failure at the
access layer.

28

Refer to the exhibit. What is the purpose of this configuration?


auditing the network traffic with NBAR
monitoring the network traffic with NetFlow
capturing network traffic to send to a syslog server
applying the named ACLs egress and ingress to the Ethernet interfaces

29 What makes the Cisco EasyVPN application a useful tool for VPN implementation?
It provides encryption algorithms unavailable in other systems.
It ensures that remote workers actually use the VPN for connectivity.
It simplifies the configuration tasks for the device that is used as the VPN server.
It allows a greater variety of network devices to be used for VPN connections.

30

Refer to the exhibit. The administrator wishes to specify that the 56 kb/s circuit will be a backup link that will
automatically be used in the event that the primary Frame Relay circuit goes down for traffic to the
172.16.75.0/24 network. Which command syntax will accomplish this?
RouterA(config)# ip route 172.16.75.0 255.255.255.0 192.16.35.76 200
RouterA(config)# ip route 172.16.75.0 255.255.255.0 192.16.35.76

A web-based retail company is considering updating its WAN connection with new technologies that are offered by
the ISP. What testing platform should be used by the network team of the company to validate the performance and
capacity of the new technology using real world data?

pilot prototype
emulation software
simulation software
32

Refer to the exhibit. A pre-sales system engineer receives a diagram of the current WAN from a customer.
EIGRP is the routing protocol that is used on the WAN. Based on the default operation of EIGRP, which
statement is true about the routing table on router RE?
There is a single route to the 172.18.20.0/24 LAN via the T1 connection.
There is a single route to the 172.18.20.0/24 LAN via the DSL connection.
EIGRP installs all three routes to the 172.18.20.0/24 LAN and load balances the traffic.
There is a single route to the 172.18.20.0/24 LAN via the 10 Mb Ethernet connection.

33 What are two advantages of using Layer 3 devices instead of Layer 2 switches at the distribution layer of a
hierarchical network? (Choose two.)
allows connectivity between different VLANs
provides reliable connectivity to the end user
reduces the number of required redundant links
results in fewer IP subnets to configure and manage
enables traffic filtering that is based on subnet addresses

34 A network administrator is asked to upgrade the enterprise network devices and to modify the addressing
scheme to support VLSM and route summarization. The current network infrastructure contains both Cisco and
non-Cisco routers. The plan is to replace old routers gradually with the latest Cisco routers. Which two routing
protocols can the administrator use to support both upgrading requirements? (Choose two.)
BGP
OSPF
RIPv1
RIPv2
EIGRP

35 Which component in a Frame Relay WAN would set the BECN bit in the Frame Relay header if congestion is
experienced?
source DTE device
Frame Relay switch
destination DTE device
router through which communication was first initiated

36

Refer to the exhibit. What does the JAX router do with traffic that is destined for a web server with an IP addres
of 128.107.10.24?
The traffic is sent out Serial 0/0/0.
The router sends the traffic out all interfaces other than the one it came in on.
A request is sent to neighboring routers for paths to the 128.107.0.0 network.
The packets are placed into a queue until a better route is discovered via RIP.

37 Which task would typically only require services that are located at the access layer of the hierarchical design
model?
placing a VoIP call to a business associate in another country
connecting to the corporate web server to update sales figures
using a VPN from home to send data to the main office server farm
responding to an e-mail from a co-worker in another department
printing a meeting agenda on a local departmental network printer

38

Refer to the exhibit. Before the encapsulation was changed to Frame Relay, the administrator verified physical
connectivity by successfully pinging the remote router. After the encapsulation was changed, the administrator
attempted to ping the remote router on the Frame Relay circuit but was not successful. A show frame-relay pvc
command was issued. What could be the problem?
The DLCI is incorrect.
The IP address is incorrect.
The interface needs to be re-enabled after the encapsulation is changed.
The network is not included in the routing table.

39 Which IOS component can be used for classification and protocol discovery of network traffic and applications
in use?
CDP
NBAR
ACL logging
Network Assistant

40

Refer to the exhibit. Access list 100 is applied inbound to interface serial 0/0/0 on the SOHO Router1. Which
traffic will be denied by the configuration?
DNS traffic from host A to the Internet
FTP traffic from host A to the Internet
ICMP traffic from the ISP to server 1
traffic from the ISP to the server on port 23

41
Refer to the exhibit. An extended ACL has been created to deny traffic from the 192.168.30.0/24 network to the
web server with IP address 209.165.201.30. According to Cisco best practices, where should the ACL be
applied?
R3 Fa0/0 inbound
R3 S0/0/1 outbound
R2 S0/0/1 inbound
ISP Fa0/0 outbound

42

Refer to the exhibit. Network A contains six network segments. With manual routing summarization and to
advertise only the networks that are shown, how many summary networks will RA advertise to RB?
1
2
3
4

43
Refer to the exhibit. To demonstrate the importance of using contiguous IP addressing in a hierarchical network
design, a network designer configures a prototype network with the use of a network simulator. Which EIGRP
configuration commands should the designer enter on router R1 to correctly advertise a single summary route to
router BR1 for the campus LAN?
44 What two factors can increase the amount of time that is required for a network to converge? (Choose two.)
network size
queuing strategy for data traffic
routing protocols that are used on the network
access control lists that are applied to LAN interfaces
network address translation at the network borders

45 Company XYZ needs a WAN connection between headquarters and branch offices that has a high level of
security. The connection must provide high bandwidth to support VoIP and transactional data with as little
overhead as possible. What is the best solution for WAN connectivity for company XYZ?
DSL
cable
cell relay

What best describes the function of QoS in data networks?

pr increases bandwidth on a link to ensure voice quality


io
rit
iz
es
da
ta
tr
af
fi
c
o
ve
r
all
ot
he
r
ty
pe
s
of
tr
af
fi
c
provides preferred service to specified network traffic
automatically assigns the highest priority to web and database traffic

47

Refer to the exhibit. PPP was successfully negotiated between the two routers. Which command set can be foun
on the local router to produce the results that are shown in the graphic?
hostname Sales
interface serial0/0
encapsulation ppp
ppp authentication chap
username Market password 5 jdhdh4737f7hssn
hostname Market
interface serial0/0
encapsulation ppp
ppp authentication chap
username sales password 5 jdhdh4737f7hssn
hostname Market
interface serial0/0
encapsulation ppp
ppp authentication pap
username sales password 5 jdhdh4737f7hssn
hostname Sales
interface serial0/0
encapsulation ppp
ppp authentication pap
username Market password 5 jdhdh4737f7hssn

48 What is meant by "tunneling" in the context of migrating from IPv4 to IPv6?


obtaining IPv6 addresses from an IPv4 DHCP server
allowing both protocol stacks to run on the same network device
encapsulating one protocol packet within another protocol
enabling direct communication between hosts that use different versions of the IP protocol

49
Refer to the exhibit. A customer has a problem with connectivity in the network. Based on the IP addressing
scheme, what is causing the problem?
The WAN link that connects R1 to R3 has an incorrect mask.
The WAN links need IP addresses from a different major network.
The WAN link that connects R1 to R2 overlaps with the R3 LAN.
The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM.

50 In what situation would the router display the ROMMON> prompt at the end of the boot process?
The boot process was interrupted before it completed.
The router could not find a suitable IOS to load into ROM.
The router could not find a running configuration file to load into RAM.
The router loaded an IOS but could not find a configuration file in NVRAM.

Вам также может понравиться