Вы находитесь на странице: 1из 18

Close Window

Assessment System 1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - DsmbISP Practice Final Exam - CCNA Discovery: Working at a Smallto-Medium Business or ISP (Version 4.1)

Time Remaining: 1

A small tire retailer requires a low-cost WAN connection to its headquarters in order to manage its inventory process customer sales in real time. Which WAN connection type is best suited to its needs? SONET T3 T1 DSL leased line

Refer to the exhibit. What fact can be determined from the exhibited output? PPP is enabled on this router. The bandwidth setting of the interfaces is consistent with a T1 connection. The serial0/0/0 interface is administratively down. The default encapsulation is set for the serial0/0/0 interface. Subnet mask 255.255.255.255 has been configured for the serial0/0/0 interface. 3 Which two protocols allow network devices to report their status and events to a centralized network management device? (Choose two.) Syslog Telnet HTTP HTTPS SNMP

Refer to the exhibit. A computer with the displayed IP settings is unable to access a server on the 192.168.2.0 network using the server IP address but can access hosts on the 192.168.1.0 network. What should the netwo administrator do to troubleshoot this problem? Issue the ping 192.168.1.1 command on the host to determine if the host can communicate with the defa gateway. Issue the ipconfig /all command to determine if a DNS server IP address was configured. Verify that the host has a link light. Check the cabling of the host. 5

Which transport layer protocol will allow segments to be exchanged between two hosts with low overhead an no mechanism for retransmission? IP FTP TCP UDP SMTP Which action would a network security administrator take under the principle of least privilege? Provide users with access to only necessary resources. Encrypt all data for transmission across unsecured networks. Restrict all users except administrators to the lowest privilege level. Require authentication for access to all resources including files and folders. When would TFTP in ROM monitor mode be used to restore a Cisco IOS image to a router? when a console connection is the only available connection to the router when the TFTP server software is incompatible with the router IOS version when the router is set to boot from flash, but the Cisco IOS image in flash is corrupt or has been erased when the current Cisco IOS on the router requires a feature upgrade Which statement describes a route that has been learned dynamically? It is automatically updated and maintained by routing protocols. It is unaffected by changes in the topology of the network. It has an administrative distance of 1.

It is identified by the prefix C in the routing table. 9 What is the function of the service password-encryption command in the Cisco IOS? encrypts passwords sent over serial interfaces validates encrypted passwords by the use of an authentication server encrypts passwords for transmission across insecure networks prevents passwords in configuration files from being easily read

10 Which question provides troubleshooting information about a problem at Layer 1 or Layer 2 of the OSI mode Can the server be reached through Telnet? Is there a firewall that is configured on the PC? Is there a link light on the network card? What addresses are configured in the TCP/IP settings? 11 A host has been properly cabled and configured with a unique hostname and valid IP address. Which two additional components should be configured to enable the host to access remote resources? (Choose two.) the subnet mask the MAC address the default gateway the loopback IP address the DHCP server IP address 12

Refer to the exhibit. If the show cdp neighbors command is issued on RTB, which devices will appear in the output if all devices use the Cisco IOS and have CDP enabled?

RTA, RTC RTA, RTC, Sw2 RTA, RTC, Sw1, Sw2, Sw3 RTA, RTC, Sw1, Sw2, Sw3, PC1, PC2 13 Which application can be delivered using UDP? FTP DNS HTTP SMTP

14 While troubleshooting a connectivity issue between two directly connected routers, the network administrato checks the encapsulation settings on the serial interfaces of both routers. Which layer of the OSI model is the administrator troubleshooting? application layer network layer data link layer physical layer 15 Which routing algorithm does EIGRP use to calculate the best path to a destination within a network? link-state DUAL Dijkstra shortest path first Showing 1 of 4 Close Window All contents copyright 1992-2012 Cisco Systems, Inc. Privacy Statement and Trademarks. <Prev Page: Next>

Close Window

Assessment System 1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - DsmbISP Practice Final Exam - CCNA Discovery: Working at a Smallto-Medium Business or ISP (Version 4.1)

Time Remaining: 16 What is the purpose of the debug ip rip command? shows the installed routing table allows RIP to advertise triggered updates displays routing update activity in real time shows the administrative distance of all routes 17 A Catalyst switch is used as a temporary replacement for another switch that needs to be repaired. About a minute after the switch has started, the SYST LED on the front of the switch transitions from blinking green amber. What is the meaning of the amber SYST LED? The switch has no configuration file in NVRAM. The switch has failed POST and must be sent for service. The switch is functioning properly. The switch is in half-duplex mode.

18 How many host addresses may be assigned on each subnetwork when using the 130.68.0.0 network address w a subnet mask of 255.255.248.0? 30 256 2046 2048 4094 4096 19

Refer to the exhibit. A user who is connected to RTA is trying to telnet to RTB, but the connection is failing. Based on the output of the show running-config command on router RTB, why is the Telnet session failing? Telnet has not been configured on the console line. The login command has not been issued on the console line. No password has been configured on the VTY lines. A session limit has not been configured for Telnet. 20 What is the function of the forward lookup DNS zone in the DNS name resolution process? It resolves fully qualified domain names into IP addresses. It stores the information about the domain namespace structure. It forwards zone information updates to the secondary server. It maintains a database of ARP entries for all servers. 21 An experienced network technician has decided to use a divide-and-conquer approach to troubleshooting a network problem. What is an advantage to this approach? works well for simple problems quickly resolves user-related issues easiest to use in a multi-vendor environment targets the problem layer more quickly than other methods do 22 What is one purpose of the TCP three-way handshake? sending echo requests from the source to the destination host to establish the presence of the destination determining the IP address of the destination host in preparation for data transfer requesting the destination to transfer a binary file to the source synchronizing sequence numbers between source and destination in preparation for data transfer

23 Which statement is true about FTP implementations? The protocol interpreter (PI) function engages once the data transfer process (DTP) function is complete. The DTP function is responsible for the login sequence.

FTP requires two connections, one for control and one for data. Both the PI and the DTP close automatically when the transfer is complete. 24 What routing protocol would be appropriate to use for exchanging routes between ISPs? RIPv2 BGP OSPF EIGRP 25 Which two statements are correct about the UDP protocol? (Choose two.) It utilizes a flow control mechanism. It uses windowing. It does not provide acknowledgment of receipt of data. It is a connectionless protocol. It guarantees the sequential arrival of data packets. 26 Wireless radio waves are associated with which layer of the OSI model? Layer 1 Layer 2 Layer 3 Layer 4 Layer 5 Layer 6 Layer 7 27 Which commands will configure a management interface on a LAN switch? Switch(config)# ip default-gateway 192.168.1.1 255.255.255.0 Switch(config)# interface vlan 1 Switch(config-if)# ip address 192.168.1.2 255.255.255.0 Switch(config)# interface fa0/1 Switch(config-if)# description Management Interface Switch(config-if)# ip address 192.168.1.254 255.255.255.0 Switch(config)# interface fa0/1 Switch(config-if)# switchport access vlan 1 28

Refer to the exhibit. There is no routing protocol configured on either router. Which command will create a default route on R1 to forward the traffic to R2? R1(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.1 R1(config)# ip route 0.0.0.0 0.0.0.0 192.168.0.2 R1(config)# ip route 0.0.0.0 0.0.0.0 192.168.0.1 R1(config)# ip route 0.0.0.0 0.0.0.0 S0/0/1

29 Which storage media type is most commonly selected if cost effectiveness, large capacity, and transportabilit are the key factors being considered during implementation of a backup scheme? digital tape solid-state storage optical media discs storage area networks network-attached storage 30

Refer to the exhibit. A ping 192.168.1.20 command is issued on workstation A to determine if workstation B can be reached. What two events will occur if this command is successful? (Choose two.) The router will reply to the echo request with a proxy ping response. Workstation A will send a UDP ping request message to workstation B. The router will send a TCP acknowledgment message to workstation A. Workstation B will send a UDP ping reply message to the router. Workstation A will send an ICMP echo request message to workstation B. Workstation B will send an ICMP echo reply message to workstation A. Showing 2 of 4 Close Window All contents copyright 1992-2012 Cisco Systems, Inc. Privacy Statement and Trademarks. <Prev Page: Next>

Close Window

Assessment System 1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - DsmbISP Practice Final Exam - CCNA Discovery: Working at a Smallto-Medium Business or ISP (Version 4.1)

Time Remaining: 31

Refer to the exhibit. A technician tries to telnet to a router with the IP address of 172.16.1.2. What does the message indicate about the Telnet session? The console password has not been set on the remote router. The VTY password has not been set on the remote router. The enable password has not been set on the remote router. The enable secret password has not been set on the remote router. The session has been opened and closed successfully by the remote router. 32

Refer to the exhibit. All cables are working and all devices have IP addresses. However, H1 cannot ping the server. What is the cause of the problem? The default gateway is incorrect on R1. The switch should be assigned an IP address. H1 and the server are on different subnetworks. H1 does not know the physical address of the server. 33 When does a router enter the setup mode? when the Cisco IOS is missing in flash when the configuration is missing in NVRAM when the setup command is run from the user mode when the boot system command is missing in the configuration 34

Refer to the exhibit. A network administrator is planning the wiring for a new installation and wants to conne three separate buildings that are 250 meters apart. Which type of cable should be used to connect the building STP UTP serial coaxial fiber optic 35

Refer to the exhibit. The network administrator uses the exhibited commands to configure R1 and R2. The administrator confirms Layer 1 connectivity between the two routers is functioning properly. However, R1 is unable to ping the serial interface of R2. What could be the reason for this problem? The subnet mask is incorrectly configured on both routers. A static route is not configured on both routers. Different encapsulations are configured on the two routers. The clock rate is not set on any of the router serial interfaces.

36 A switch with 10/100/1000 Gigabit Ethernet ports is configured for autonegotiation. It is connected to a devi with a 100 Mb/s port that is set to full-duplex. What speed and duplex setting will the switch use? 100 Mb/s and full-duplex 100 Mb/s and half-duplex 1000 Mb/s and full-duplex 1000 Mb/s and half-duplex 37 Which statement correctly describes the operation of DNS? It uses a local HOSTS file to resolve URLs to IP addresses for internal devices. It uses a distributed hierarchy of servers to resolve hostnames to IP addresses. It references a central file that maps hostnames to IP addresses for all Internet hosts. It uses a single layer of interconnected peer servers to manage hostname-to-IP-address mappings. 38 What is used by a routing protocol to determine the best path to include in the routing table? Convergence time Default distance Metric Type of router 39

Refer to the exhibit. A network administrator has just entered the interface configuration commands shown in the exhibit on a brand new router. To verify basic connectivity, a ping is issued from Host A to R1. The ping unsuccessful. Which two configuration steps should be performed to solve this problem? (Choose two.) Configure the appropriate line password to access the router. Configure the speed of the interface. Enable the interface administratively. Configure a dynamic routing protocol on the router. Configure the subnet mask on the router interface to 255.255.255.248. Modify the subnet mask on HostA to be the same as the Fa0/0 interface.

40

Refer to the exhibit. A network administrator has an extra router and wishes to use it as shown to passively monitor network traffic. Which IOS feature should be implemented on router EXTRA? ACLs CDP IDS IPS 41

Refer to the exhibit. Which combination of cables and symbols is correct?

A - crossover, B - straight-through, C - straight-through A - crossover, B - rollover, C - straight-through A - straight-through, B -crossover, C - straight-through A - straight-through, B -straight-through, C - straight-through A - straight-through, B - straight-through, C - crossover A - rollover, B - straight-through, C - straight-through 42 What is the maximum unrepeated distance set by industry standards for UTP cable? 10 meters 75 meters 100 meters 325 meters 43 What happens when a segment is encapsulated into a packet? Data is converted to bits for transmission. The destination port number is specified. A header with logical addresses is added. A session with a destination is established. 44 At which layer of the OSI model is the Ethernet family of technologies defined? Layer 1 Layer 2 Layer 3 Layer 4 Layer 5 Layer 6 Layer 7

45 Which statement correctly describes the difference between HTTP and HTTPS? The maximum number of simultaneous connections that a server can support for HTTPS is more than fo HTTP. HTTPS and HTTP use different client request-server response processes. HTTPS authenticates and encrypts the data being transferred between the client and the web server. HTTPS specifies the rules for passing data between the physical layer and the data link layer. Showing 3 of 4 Close Window All contents copyright 1992-2012 Cisco Systems, Inc. Privacy Statement and Trademarks. <Prev Page: Next>

Close Window

Assessment System 1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - DsmbISP Practice Final Exam - CCNA Discovery: Working at a Smallto-Medium Business or ISP (Version 4.1)

Time Remaining: 46

Refer to the exhibit. All hosts and router interfaces are configured correctly. Pings to the server from both H1 and H2 and pings between H1 and H2 are not successful. What is causing this problem? RIPv2 does not support VLSM. RIPv2 is misconfigured on router R1. RIPv2 is misconfigured on router R2. RIPv2 is misconfigured on router R3. RIPv2 does not support private IP addressing.

47 A computer is configured to receive an IP address dynamically. However, the computer cannot communicate with other hosts on the network. A network technician then determines that the computer has an IP address o 169.254.0.2/16. What is a possible cause for this problem? The DHCP server pool is exhausted. The TCP/IP stack on the local computer is corrupted. The operating system of the computer is unresponsive. The DNS server is not responding to discovery messages.

48 A network administrator is asked to design a system to allow simultaneous access to the Internet for 250 user The ISP can only supply five public IP addresses for this network. What technology can the administrator use accomplish this task? classful subnetting variable length subnet masks classless interdomain routing port-based Network Address Translation 49 Which two subnet masks could be used when subnetting a Class B IP address? (Choose two.) 255.255.255.240 255.255.192.0 255.255.0.0 255.192.0.0 240.0.0.0 255.0.0.0 50

Refer to the exhibit. Router R1 has been configured with the commands that are displayed. Which password be used to access the EXEC privileged mode of the router? password1 password2 password3 password4

Showing 4 of 4 Close Window

<Prev

Page:

Next>

All contents copyright 1992-2012 Cisco Systems, Inc. Privacy Statement and Trademarks.

Вам также может понравиться