Anda di halaman 1dari 25

Refer to the exhibit. An administrator installs a WIC-2T module into a Cisco 1841 router. Atte
the S0/0/0 interface are unsuccessful. As a first step in troubleshooting the failure, the administ
show version command. What is a possible reason for the failure?
The WIC was not physically installed properly.
The WIC was installed into slot 1 instead of slot 0.
The interface type and number are invalid on an 1841.
The configuration register is the wrong value for adding new modules.

..
..
Max Earned
Observable Description
Value Value
2 points for Option
correctness of 1
1 2 2
response 0 points for any
other option
Assessment Item:

Which command can be used to load a new Cisco IOS image on a router?
copy startup-config tftp:
copy tftp: startup-config
copy running-config tftp:
copy tftp: flash:
copy flash: tftp:
copy flash: startup-config

..
..

O
b
s
e
Earned
r Description Max Value
Value
v
a
b
le
2 points for Option 4
1 correctness of response
0 points for any other option
What is the function of a network modular block diagram?
It provides a high level view of all sites in an enterprise network.
It shows a simplified version of a network and diagrams major functions.
It lists the networking equipment and addressing schemes for each network segment.
It shows all the major pieces of networking equipment in a network and how they interconnect.

.. ..

O
b
s
e
Earned
r Description Max Value
Value
v
a
b
le
2 points for Option 2
1 correctness of response
0 points for any other option
A company has just transitioned from traditional telephony to an IP Telephony solution for their voice
requirements. What statement describes a characteristic of the new system?
connects through a PBX to the PSTN
replaces a digital system with an analog one
combines data and voice into a converged network
requires manual configuration for adding, moving or changing phones
enables web applications and phone directories to be available to every PC on the network

.. ..

O
b
s
e
Earned
r Description Max Value
Value
v
a
b
le
2 points for Option 3
1 correctness of response
0 points for any other option
Which IOS component can be used for classification and protocol discovery of network traffic and applications
in use?
CDP
NBAR
ACL logging
Network Assistant

.. ..

O
b
s
e
Earned
r Description Max Value
Value
v
a
b
le
2 points for Option 2
1 correctness of response
0 points for any other option
What is a function of software queuing?
filters traffic on the basis of administrator defined rules
stores received traffic and sends packets based on the order that the packets are received
sends packets on the basis of priorities that are manually set
transmits packets in a priority sequence that is based on source port

.. ..

O
b
s
e
Earned
r Description Max Value
Value
v
a
b
le
2 points for Option 3
1 correctness of response
0 points for any other option
The network designer recommends using RSTP in the design of a new data center. There are multiple redundant
Layer 2 switches and links contained in the new design. What is the benefit of using RSTP rather than STP in
this situation?
Redundant links are not blocked.
Routing tables converge more quickly.
Spanning Tree convergence times are reduced.
Fewer redundant links are required to maintain connectivity.

.. ..

O
b
s
e
Earned
r Description Max Value
Value
v
a
b
le
2 points for Option 3
1 correctness of response
0 points for any other option
Which task would typically only require services that are located at the access layer of the hierarchical design
model?
placing a VoIP call to a business associate in another country
connecting to the corporate web server to update sales figures
using a VPN from home to send data to the main office server farm
responding to an e-mail from a co-worker in another department
printing a meeting agenda on a local departmental network printer

.. ..

O
b
s
e
Earned
r Description Max Value
Value
v
a
b
le
2 points for Option 5
1 correctness of response
0 points for any other option
What makes the Cisco EasyVPN application a useful tool for VPN implementation?
It provides encryption algorithms unavailable in other systems.
It ensures that remote workers actually use the VPN for connectivity.
It simplifies the configuration tasks for the device that is used as the VPN server.
It allows a greater variety of network devices to be used for VPN connections.

.. ..

O
b
se
r Earned
Description Max Value
v Value
a
bl
e
2 points for Option 3
1 correctness of response
0 points for any other option
Which WLAN operational feature can be configured as non-broadcast in order to increase the security of an
enterprise WLAN for employees?
SSID
WEP keys
VLAN parameters
WPA encryption keys
VPN authentication information
.. ..

O
b
s
e
Earned
r Description Max Value
Value
v
a
b
le
2 points for Option 1
1 correctness of response
0 points for any other option
Who provides technical support and training after deploying a network solution on a large networking team?
account manager
network designer
pre-sales engineer
post-sales field engineer

.. ..

O
b
s
e
Earned
r Description Max Value
Value
v
a
b
le
2 points for Option 4
1 correctness of response
0 points for any other option
In order for the IT staff of a company to understand the basic operation of VPNs, which two features or
technologies must the network designer identify as training needs? (Choose two.)
IPv6 tunneling
QoS operation
tunneling protocols
VLAN configuration
encryption algorithms

.. ..
O
b
s
e
Earned
r Description Max Value
Value
v
a
b
le
Option 3 and Option 5 are correct.
1 correctness of response
1 point for each correct
What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a partial
mesh topology?
It adds scalability to the corporate network.
It provides fully redundant links to connecting modules.
It lowers the impact and risk of DoS attacks from the Internet.
It increases the manageability of the network devices in the core layer.

.. ..

O
b
se
r Earned
Description Max Value
v Value
a
bl
e
1 correctness of response 2 points for Option 2
Which statement describes the use of a network baseline?
It creates a high level logical network diagram.
It provides a point of reference for future network evaluations.
It allows precise identification of the original location of network equipment.
It should be established as soon as a problem is detected on the network.

.. ..

O Description Max Value Earned


b Value
se
r
v
a
bl
e
1 correctness of response 2 points for Option 2
A router has been removed from the network for maintenance. A new Cisco IOS software image has been
successfully downloaded to a server and copied into the flash of the router. What should be done before placing the
router back into service?
Back up the new image.
Copy the running configuration to NVRAM.
Delete the previous version of the Cisco IOS software from flash.
Restart the router and verify that the new image starts successfully.

.. ..

O
b
se
r Earned
Description Max Value
v Value
a
bl
e
1 correctness of response 2 points for Option 4
Which two pieces of information are needed before an IOS image may be loaded on a router from a TFTP
server? (Choose two.)
the IP address of the TFTP server
the current name of the IOS image on the router
the operating system of the TFTP server
the name of the configuration file in NVRAM
the name of the IOS image on the TFTP server
encapsulation of the router interface that is connected to the TFTP server

.. ..

O Description Max Value Earned


b Value
s
e
r
v
a
b
le
correctness of Option 1 and Option 5 are
1
response correct
If traditional phones are used when introducing VoIP to a network, what component would be required to
convert the analog voice from traditional telephone signals into IP packets?
Multipoint control unit
Power over Ethernet switches
a router that acts as a voice gateway
Cisco Unified Communications Manager

.. ..

O
b
se
r Earned
Description Max Value
v Value
a
bl
e
1 correctness of response 2 points for Option 3
A network administrator is integrating IPv6 into an IPv4 network by encapsulating one protocol packet within
another protocol. Which transition method is being used?
dual stack
tunneling
proxying and translation
NAT with Protocol Translator

.. ..

O
b
se
r Earned
Description Max Value
v Value
a
bl
e
1 correctness of response 2 points for Option 2
Which two values represent valid IPv6 addresses? (Choose two.)
::::1
FF01::1
0:0:0:0:0:0:0:1
2001:DB8::47::2A4
2031:0000:04AC:3400:FFE3:0

.. ..

O
b
s
e
Earned
r Description Max Value
Value
v
a
b
le
correctness of Option 2 and Option 3 are
1
response correct.

Refer to the exhibit. A customer has a problem with connectivity in the network. Based on the IP addressing
scheme, what is causing the problem?
The WAN link that connects R1 to R3 has an incorrect mask.
The WAN links need IP addresses from a different major network.
The WAN link that connects R1 to R2 overlaps with the R3 LAN.
The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM.

.. ..

O
b
se
r Earned
Description Max Value
v Value
a
bl
e
1 correctness of response 2 points for Option 3
A school district decides to use the 172.30.0.0/16 network for its LAN networks. The network administrator must
create an addressing scheme to support 500 users in the admin office, 200 at the high school, 60 at the elementary
school and 28 at the district office. Which VLSM addressing scheme will correctly address the network with
minimal waste?
172.30.0.0/20 admin
172.30.1.0/21 high school
172.30.1.8/22 elementary
172.30.1.12/26 district
172.30.0.0/22 admin
172.30.4.0/23 high school
172.30.5.0/24 elementary
172.30.6.0/26 district
172.30.0.0/23 admin
172.30.2.0/24 high school
172.30.3.0/26 elementary
172.30.3.64/27 district
172.30.0.0/23 admin
172.30.2.0/24 high school
172.30.3.0/25 elementary
172.30.3.127/26 district

.. ..

O Description Max Value Earned


b Value
se
r
v
a
bl
e
1 correctness of response 2 points for Option 3
Which three enhancements does IPv6 offer over IPv4? (Choose three.)
easier implementation and configuration
more effective IP security
integrated IP mobility support
simplified header information
fewer reserved IP addresses
eliminates the need to implement DHCP

.. ..
Max Earned
Observable Description
Value Value
correctness of Option 2, Option 3, and
1
response Option 4
This item references content from the following areas:

CCNA Discovery: Designing and Supporting Computer Networks

• 6.1.4 Using CIDR Routing and Summarization

Assessment Item:

Refer to the exhibit. A network administrator is validating the routing for the new network design. Whic
command should be used to configure the s0/0/0 interface of the SALES router to advertise the Sales
Department networks as one route?
SALES(config-if)# ip summary-address eigrp 100 172.16.0.0 255.255.0.0
SALES(config-if)# ip summary-address eigrp 100 172.16.8.0 255.255.240.0
SALES(config-if)# ip summary-address eigrp 100 172.16.16.0 255.255.240.0
SALES(config-if)# ip summary-address eigrp 100 172.16.31.0 255.255.248.0

..
..

O
b
se
r Earned
Description Max Value
v Value
a
bl
e
1 correctness of response 2 points for Option 3

Refer to the exhibit. The named ACL "Managers" already exists on the router. What will happen when the
network administrator issues the commands that are shown in the exhibit?
The commands overwrite the existing Managers ACL.
The commands are added at the end of the existing Managers ACL.
The commands are added at the beginning of the existing Managers ACL.
The network administrator receives an error that states that the ACL already exists.

.. ..

O
b
se
r Earned
Description Max Value
v Value
a
bl
e
1 correctness of response 2 points for Option 2
On a Monday morning the help desk at a large company receives an unusually high number of calls reporting no
connectivity to the Internet or to any other network resources. Otherwise the PCs are functioning normally. Help
desk technicians note that all the calls are from a single department, and all affected users are on the same floor of a
single building. Where should the help desk technicians suspect that the problem lies?
workgroup switch
PC power supplies
patch cords from PCs to network jacks
cabling from the network jack to the wiring closet

.. ..

O
b
se
r Earned
Description Max Value
v Value
a
bl
e
1 correctness of response 2 points for Option 1

Refer to the exhibit. A network administrator is configuring a new router to provide routing between VLANs. The
administrator removes the router from the box and connects the Fa0/0 interface to a trunking port on the switch.
After the configuration is applied to the router, as shown in the exhibit, the traffic between VLANs fails. What is
causing this to occur?
The R1 router needs a routing protocol configured.
The subinterfaces of the R1 router should have IP addresses applied.
The R1 router needs three additional Fast Ethernet interfaces installed.
The subinterfaces of the R1 router should be configured in the same VLAN.

.. ..

O
b
se
r Earned
Description Max Value
v Value
a
bl
e
1 correctness of response 2 points for Option 2

Refer to the exhibit. What does the TOR router do with traffic that is destined for a web server with an IP address of
172.18.10.24?
The router sends the traffic out Serial 0/0/0.
The router sends the traffic out all interfaces other than the one it came in on.
The router places the packets into a queue until a better route is discovered via RIP.
The router sends a request to neighboring routers for paths to the 172.18.10.0 network.

.. ..

O
b
se
r Earned
Description Max Value
v Value
a
bl
e
1 correctness of response 2 points for Option 1
Refer to the exhibit. A NetworkingCompany designer is reviewing a diagram of a customer network. What two risks
or issues can be identified in the topology that is shown? (Choose two.)
The firewall router and ISP connection represent a single point of failure.
A failure of the switch that connects the Cisco Call Manager to the network will cause the entire IP telephony
system to fail.
Using Layer 3 switches to interconnect the data center servers to the IP phones introduces too much delay.
The IP phones need to be redundantly connected to the switches to prevent single points of failure at the access
layer.
If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable.

.. ..

O
b
s
e
Earned
r Description Max Value
Value
v
a
b
le
1 correctness of response Option 1 and Option 2 are correct.
network designer must select a routing protocol for the network of a customer. The currently installed network
contains both Cisco and non-Cisco routers, and there is no budget to replace them. The designer plans on
implementing both VLSM and route summarization in the new network design. Which two protocols can provide
the necessary functionality for this LAN? (Choose two.)
RTP
RSTP
RIPv1
RIPv2
EIGRP
OSPF

.. ..

O
b
s
e
Earned
r Description Max Value
Value
v
a
b
le
1 correctness of response Option 4 and Option 6 are correct

Refer to the exhibit. Which set of commands will meet the security requirements that are shown?
.. ..

O
b
se
r Earned
Description Max Value
v Value
a
bl
e
1 correctness of response 2 points for Option 4
A company offers online ordering of its products. The web service is provided by a primary web server that
synchronizes with a backup server. A network designer recommends adding a load balancing unit and installing
additional web servers so that the online ordering traffic can be equally distributed among four web servers. What
network design risk is addressed with this recommendation?
limited bandwidth
possible bottleneck
single point of failure
large failure domains

.. ..

O
b
se
r Earned
Description Max Value
v Value
a
bl
e
1 correctness of response 2 points for Option 2
he main office of a NetworkingCompany customer currently connects to three branch offices via three separate
point-to-point T1 circuits. The customer network uses RIPv2 as the routing protocol within both the LAN and the
WAN. The account manager proposes a change to a Frame Relay network because the costs are lower. A single
local loop connection can be installed at the main office with three separate PVCs to connect the branch offices.
How can the main office edge router be configured to enable the customer to continue to use RIP as the WAN
routing protocol?
Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote routers.
To prevent the Frame Relay network from causing a routing loop, disable split horizon on the serial interface.
Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP address
to each one.
Configure the serial interface with a single interface DLCI number and create frame-relay map statements for
each remote site address.

.. ..

O
b
se
r Earned
Description Max Value
v Value
a
bl
e
1 correctness of response 2 points for Option 3
A network administrator has configured Frame Relay on a serial interface and issued the show interfaces serial
command. The output shows that the interface is up and the line protocol is up. However, pings to the remote router
across the link fail. What should the next step be to ensure that the IP address of the remote router appears in the
Frame Relay map table of the local router?
Configure the router using the no inverse-arp command.
Ensure that the LMI type is correct for the circuit.
Configure the router using the frame-relay map ip command.
Verify that the remote router has Frame Relay encapsulation enabled.

.. ..

O
b
se
r Earned
Description Max Value
v Value
a
bl
e
1 correctness of response 2 points for Option 3

Refer to the exhibit. A pre-sales systems engineer receives a diagram of the exhibited WAN implementation from a
customer. EIGRP is the routing protocol that is used on the WAN. None of the parameters for EIGRP metric
calculation have been modified in any router configurations. Which statement is true about the routing table on
router RM?
There is a single route to the 192.168.24.0/24 LAN using the T1 connection.
There is a single route to the 192.168.24.0/24 LAN using the DSL connection.
There is a single route to the 192.168.24.0/24 LAN using the Metro Ethernet connection.
EIGRP installs all three routes to the 192.168.24.0/24 LAN and load balances the traffic.

.. ..

O
bs
er
v Description Max Value Earned Value
a
bl
e
1 correctness of response 2 points for Option 3

Refer to the exhibit. What can the field engineer conclude about the EIGRP authentication between Router1 and
Router2?
Authentication will fail because only one key is configured.
Authentication will succeed and EIGRP updates can be exchanged.
Authentication will fail because the key chain names do not match.
Authentication will fail because the key chain names must match the router names.

.. ..

O Description Max Value Earned


b Value
se
r
v
a
bl
e
1 correctness of response 2 points for Option 2
hich two descriptions relate to a Frame Relay DLCI? (Choose two.)
guaranteed rate at which data travels on the packet-switched network
signalling standard between DTE and DCE
indicator of congestion on the network
locally significant circuit endpoint
one DLCI allowed per local loop
Layer 2 address

.. ..

O
b
s
e
Earned
r Description Max Value
Value
v
a
b
le
1 correctness of response Option 4 and Option 6 are correc
When implementing a security policy, which two actions should be included as part of the security checklist?
(Choose two.)
Disable all logging.
Enable Telnet on TCP port 23.
Use HTTP for web administration.
Set timeouts and ACLs on VTY lines.
Shut down any unused ports and interfaces.

.. ..

O Description Max Value Earned


b Value
se
r
v
a
bl
e
1 correctness of response Option 4 and Option 5 are correct.

Refer to the exhibit. A network administrator configures two routers to test the WAN connection. The serial
connection requires PPP encapsulation and authentication with CHAP. However, the connection cannot be
established. According to the partial output of the show running-config command, what is the cause of the
problem?
The password should be all lowercase.
The password should contain fewer than 8 characters.
The usernames must be the same as the sending router hostnames.
The usernames must be the same as the destination router hostnames.

.. ..

O
b
se
r Earned
Description Max Value
v Value
a
bl
e
1 correctness of response 2 points for Option 4
What are two disadvantages to using simulation software such as Packet Tracer to validate a network design?
(Choose two.)
unrealistic performance
little control over network operation
inability to create large or complex networks
inability to simulate all required network conditions
lack of flexibility to support different devices and connectivity options

.. ..

O
b
s
e
Earned
r Description Max Value
Value
v
a
b
le
1 correctness of response Option 1 and Option 4 are correct.

Refer to the exhibit. During a test of an EIGRP prototype network, a network administrator issues a show ip
protocols command. What two facts can be determined from the output? (Choose two.)
The administrative distance is 100.
This router has one adjacent neighbor.
There are 10 Cisco devices in this prototype network.
The auto-summary command was applied on this router.
EIGRP is using two values for the calculation of the composite metric.
EIGRP on this router will display up to four unequal cost routes to the same destination.

.. ..
Max Earned
Observable Description
Value Value
correctness of Option 2 and Option 5
1
response are correct.

Anda mungkin juga menyukai