Anda di halaman 1dari 21

1 Which two processes allow a smooth transition from IPv4 to IPv6? (Choose two.

) I PSec tunneling dual stack authentication anycast addressing header simplificatio n 2 If a router is unable to find a suitable IOS to load into RAM, in what mode does the boot process end? setup mode user mode rommon mode privileged mode Which tw o pieces of information are needed before an IOS image may be loaded on a router from a TFTP server? (Choose two.) the IP address of the TFTP server the current name of the IOS image on the router the operating system of the TFTP server the name of the configuration file in NVRAM the name of the IOS image on the TFTP s erver encapsulation of the router interface that is connected to the TFTP server 3 4 Refer to the exhibit. What can the field engineer conclude about the EIGRP authe ntication between RouterA and RouterB? Authentication will fail because only one key is configured. Authentication will fail because the key chain names do not match. Authentication will succeed and EIGRP updates can be exchanged. Authentic ation will fail because the key chain names must match the router names.

5 Refer to the exhibit. A networking company designer is reviewing a diagram of a customer network. What are the two problems that need to be resolved in the topo logy that is shown? (Choose two.) The firewall router and ISP connection represe nt a single point of failure. If one of the Layer 3 switches fails, the Cisco Ca ll Manager will be unreachable. A power supply failure of the server block switc h will cause the entire IP telephony system to fail. Using Layer 3 switches to i nterconnect the server block servers to the IP phones introduces too much delay. The IP phones need to be redundantly connected to the switches to prevent singl e points of failure at the access layer. 6 Refer to the exhibit. The named ACL "Managers" already exists on the router. Wha t will happen when the network administrator issues the commands that are shown in the exhibit? The commands overwrite the existing Managers ACL. The commands a re added at the end of the existing Managers ACL. The commands are added at the beginning of the existing Managers ACL. The network administrator receives an er ror that states that the ACL already exists. 7 A small bookstore would like to o ffer wireless connectivity for customers with laptops. Which wireless components or devices will provide connectivity to the Internet for the customers with the least possible cost to the bookstore? wireless LAN controllers

standalone access points wireless network cards for an ad hoc WLAN lightweight a ccess point and wireless LAN controller 8 When implementing an IP telephony solu tion, why should VLANs be used? to allow the use of a single IP gateway to separ ate voice from data traffic for ease of prioritization to allow the PBX to use V LAN IDs to filter both voice and data traffic to allow connectivity between trad itional phone devices and IP-based telephony devices While troubleshooting a Fra me Relay link, the network administrator executes the show ip interface brief co mmand on both sides of the PVC link. All interfaces show a configured IP address and that the line protocol is up. Further investigation reveals that the IP add ress of the remote router does not appear in the Frame Relay table. Which step w ould solve this problem? Change the LMI type on the local router. Verify that th e DLCI number is the same on both sides of the PVC. Configure the router using t he frame-relay map ip command. Verify that the remote router has Frame Relay enc apsulation enabled. 10 A WIC-1T module needs to be installed in a Cisco 1841 rou ter that currently has a WIC-2T module in slot 0. What should the network techni cian do first? Install the hot-swappable option module. Turn off the power to th e router before installing the new module. Remove the WIC-2T module so that the new module can be installed in slot 0. Shut down all Fast Ethernet ports on the router until the new WIC module installation is complete. Configure the Cisco IO S software to support an internal trunk link between the two WIC modules. 11 A c ustomer of a large multisite organization has asked a network engineer to compar e a new IPv4 addressing strategy with an IPv6 strategy for their new network imp lementation. Which tool is appropriate for testing and comparing both addressing schemes? NBAR Cisco SDM Network Assistant network simulation tool 12 Which two statements accurately describe the result of entering the command BRT(config-if) # frame-relay map ip 10.1.10.1 35 on a router? (Choose two.) The remote router u pdates the Frame Relay map table with DLCI 35 to reach the 10.1.10.0 network. In verse ARP is used to add an entry for 10.1.10.1 into the Frame Relay map table v ia the use of DLCI 35. DLCI 35 replaces the MAC address in the ARP table for ent ry 10.1.10.1. A Layer 2 address is statically mapped to a Layer 3 address. Route r BRT uses DLCI 35 to forward data to 10.1.10.1. 9

13 What best describes the function of QoS in data networks? prioritizes data tr affic over all other types of traffic increases bandwidth on a link to ensure vo ice quality provides preferred service to specified network traffic automaticall y assigns the highest priority to web and database traffic 14 What are two advan tages of using Layer 3 devices instead of Layer 2 switches at the distribution l ayer of a hierarchical network? (Choose two.) allows connectivity between differ ent VLANs provides reliable connectivity to the end user reduces the number of r equired redundant links results in fewer IP subnets to configure and manage enab les traffic filtering that is based on subnet addresses 15 During the boot proce ss and assuming the default sequence, what is the second location where the rout er will look for the IOS? ROM flash NVRAM TFTP server 16 What are two accurate descriptors of a DLCI? (Choose two.) Frame Relay Layer 2 address one DLCI allowed per local loop locally significant circuit endpoint s ignaling standard between DTE and DCE establishes the data transfer rate through a Frame Relay network 17 At which layer in hierarchical network design should A CLs be implemented? core layer access layer network layer distribution layer pre sentation layer 18 In order for the IT staff of a company to understand the basi c operation of VPNs, which two features or technologies must the network designe r identify as training needs? (Choose two.) IPv6 tunneling QoS operation tunneli ng protocols VLAN configuration

encryption algorithms 19 Refer to the exhibit. A customer has a problem with connectivity in the network. Based on the IP addressing scheme, what is causing the problem? The WAN link th at connects R1 to R3 has an incorrect mask. The WAN links need IP addresses from a different major network. The WAN link that connects R1 to R2 overlaps with th e R3 LAN. The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM. 20 A large company plans to add several servers and requires th at the servers be reachable directly from the Internet. Which action will help t he company accomplish this goal? Assign to each server a static internal IP addr ess that is mapped statically to a public IP address. Place all servers in their own Class C private subnet. Provide a private address to each server using DHCP . Assign addresses from a pool of public Class B addresses using DHCP. 21

Refer to the exhibit. A network associate is configuring a new router to provide routing between VLANs. The associate removes the router from the box and connec ts the Fa0/0 interface to a trunking port on the switch. After the configuration is applied to the router, the traffic between VLANs still fails. What is causin g this to occur? The router needs a routing protocol configured. The router need s additional Fast Ethernet interfaces installed. The subinterfaces of the router should have IP addresses applied. All the subinterfaces of the router should be configured in the same VLAN. The subinterfaces must be the same value as the VL AN ID that they are routing for. 22 The network infrastructure at the headquarte rs of an organization consists of Cisco network devices that are running RIPv1. As part of an upgrade project, a portion of the company backbone will be increas ed to 10 Gb/s and needs to support unequal cost load balancing between routers. The IP addressing scheme is also changing and needs to support VLSM and CIDR. Wh ich routing protocol should be selected for the network? BGP EIGRP OSPF RIPv2 23 The main office of a NetworkingCompany customer currently connects to three bra nch offices via three separate point-to-point T1 circuits. The customer network uses RIPv2 as the routing protocol within both the LAN and the WAN. The account manager proposes a change to a Frame Relay network because the costs are lower. A single local loop connection can be installed at the main office with three se parate PVCs to connect the branch offices. How can the main office edge router b e configured to enable the customer to continue to use RIP as the WAN routing pr otocol? Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote routers.

To prevent the Frame Relay network from causing a routing loop, disable split ho rizon on the serial interface. Create three separate point-to-point subinterface s on the serial interface and assign a different subnet IP address to each one. Configure the serial interface with a single interface DLCI number and create fr ame-relay map statements for each remote site address. 24 A network designer has chosen to specify the use of a dedicated firewall appliance at the perimeter of a large network. Why would the designer use a dedicated firewall rather than us ing the Cisco IOS firewall feature set on the existing router? Traffic filtering is needed on the internal LAN. Multiple levels of access to the network are nee ded. The DMZ requires packet filtering and port blocking. Heavy network traffic will be handled best by using a dedicated device. 25 On a Monday morning the hel p desk at a large company receives an unusually high number of calls reporting n o connectivity to the Internet or to any other network resources. Otherwise the PCs are functioning normally. Help desk technicians note that all the calls are from a single department, and all affected users are on the same floor of a sing le building. Where should the help desk technicians suspect that the problem lie s? workgroup switch PC power supplies patch cords from PCs to network jacks cabl ing from the network jack to the wiring closet 26 An administrator is adding voi ce and video service capabilities to an existing network. What design requiremen t is being satisfied by this situation? availability manageability security scal ability 27 What are two suggested best practices to implement when securing netw ork devices? (Choose two.) Configure VLAN 1 as the native VLAN. Disable unused p orts on switches. Enable SSH and disable Telnet. Consolidate guest traffic and i nternal employee traffic. Ensure that logs are stored locally on routers. 28

Refer to the exhibit. Following a test plan, the network systems engineer comple tes the configuration of an access layer switch and connects three PCs to test t he configuration. The engineer attempts to ping from each PC to the other connec ted PCs. Which three statements describe the expected results of pinging from on e host to another? (Choose three.) Host 1 can ping Host 2. Host 1 cannot ping Ho st 2. Host 2 cannot ping Host 3. Host 3 can ping Host 1. Host 3 can ping Host 2. Host 3 cannot ping Host 1. 29 Which task would typically only require services that are located at the access layer of the hierarchical design model? placing a VoIP call to a business associate in another country connecting to the corporat e web server to update sales figures using a VPN from home to send data to the m ain office server farm responding to an e-mail from a co-worker in another depar tment printing a meeting agenda on a local departmental network printer

30 Refer to the exhibit. The routers are configured with RIPv2 and utilize the defa ult configuration. When attempting to communicate with other networks, hosts fro m 172.31.1.0/24 are experiencing connectivity issues. What could be done to reso lve this issue? Change to a public IP address scheme. Ensure that automatic rout e summarization has been disabled on all routers in the network. Change the IP a ddress for the Router3 LAN to be 192.168.7.0/24. Change the subnet mask on the l ink between Router2 and Router3 to 255.255.255.0. 31 Refer to the exhibit. What does the TOR router do with traffic that is destined for a web server with an IP address of 172.18.10.24? The router sends the traffi c out Serial 0/0/0. The router sends the traffic out all interfaces other than t he one it came in on. The router places the packets into a queue until a better route is discovered via RIP. The router sends a request to neighboring routers f or paths to the 172.18.10.0 network. 32 A new WIC is installed in an available r outer slot. At what point during the router startup process does the router test the card for hardware problems? after the configuration from NVRAM is loaded in to RAM after the configuration from NVRAM is loaded into ROM when the bootstrap program is loaded into RAM during the POST 33 What can be broadcast over the wir eless network to help a user connect to the network and use wireless services? S SID WPA encryption keys

voice VLAN parameters IP address of the access point management VLAN parameters 34 What is a function that is associated with the access layer in a hierarchical ly designed network? performs routing and packet manipulation supplies redundanc y and failover protection provides a high-speed, low-latency backbone serves as a network connection point for IP telephony devices 35 Refer to the exhibit. An administrator installs a WIC-2T module into a Cisco 184 1 router. Attempts to configure the S0/0/0 interface are unsuccessful. As a firs t step in troubleshooting the failure, the administrator issues the show version command. What is a possible reason for the failure? The WIC was not physically installed properly. The WIC was installed into slot 1 instead of slot 0. The int erface type and number are invalid on an 1841. The configuration register is the wrong value for adding new modules. 36 Which IOS component can be used for clas sification and protocol discovery of network traffic and applications in use? CD P NBAR ACL logging Network Assistant

37 Refer to the exhibit. What is the spanning-tree role of all the enabled interfac es of SW11? Alternate Backup Designated Root 38 The network designer recommends using RSTP in the design of a new data center. There are multiple redundant Laye r 2 switches and links contained in the new design. What is the benefit of using RSTP rather than STP in this situation? Redundant links are not blocked. Routin g tables converge more quickly. Spanning Tree convergence times are reduced. Few er redundant links are required to maintain connectivity. 39 Which three charact eristics are associated with the core layer of the Cisco hierarchical network de sign? (Choose three.) packet filtering high availability monitoring of DMZ traff ic use of EtherChannel redundant components high-level policy enforcement 40 Wha t type of system connects to the PSTN and uses a PBX to route calls via analog o r digital lines? VPN VoIP IP telephony traditional telephony 41 Which statement best describes the VPN feature called split tunneling? It creates separate pathw ays for different VLANs.

It creates two tunnels, one for user traffic and one for management traffic such as CDP and SNMP. It allows user traffic that is destined for the corporate netw ork to travel across the VPN tunnel, while traffic destined for the Internet tra vels through the local LAN of the VPN client. It allows separate tunnels so that high priority traffic, such as voice and video, uses the higher bandwidth tunne l, while all other user traffic travels on the lower bandwidth tunnel. 42 Refer to the exhibit. A technician at the ISP site asks the network administrato r at the client site to change the CHAP password as part of the routing security maintenance. After the administrator makes the change and reboots the router, t he technician issues a show interfaces serial 0/0/0 command. According to the ou tput, what can be concluded about the serial connection between the client site and ISP site? The router at the client site is still in the process of rebooting . The administrator probably configured the wrong password. The administrator ha s not issued a no shut command on the serial interface. The administrator probab ly configured the wrong IP address for the serial interface.

43 Refer to the exhibit. The network administrator has used the Cisco Feature Navig ator to choose a Cisco IOS image to install on a router. Given the exhibited out put of the show version command, which statement is true about the capacity of t he router to use this Cisco IOS image? There is enough DRAM and flash. There is not enough DRAM and flash. There is enough DRAM but not enough flash. There is n ot enough DRAM but enough flash. 44 A network administrator is asked to upgrade the enterprise network devices and to modify the addressing scheme to support VL SM and route summarization. The current network infrastructure contains both Cis co and non-Cisco routers. The plan is to replace old routers gradually with the latest Cisco routers. Which two routing protocols can the administrator use to s upport both upgrading requirements? (Choose two.) BGP OSPF RIPv1 RIPv2 EIGRP

45 Refer to the exhibit. A networking engineer is characterizing an existing networ k for a new customer. The engineer issues a show running-config command on the R 1 router to gather configuration information. What is the engineer able to deter mine as a result of viewing the output of this command? The R1 router has two sp ecific routes to the main office LANs in the routing table. The default route fo r the R1 router points to the Edge1 router. The R1 router will load-balance traf fic to the main office LANs by using both DSL and Frame Relay. A connection thro ugh ISP-1 will be used to reach the main office LANs if the Frame Relay network is unavailable. 46 What is meant by "tunneling" in the context of migrating from IPv4 to IPv6? o btaining IPv6 addresses from an IPv4 DHCP server allowing both protocol stacks t o run on the same network device encapsulating one protocol packet within anothe r protocol enabling direct communication between hosts that use different versio ns of the IP protocol

47 Refer to the exhibit. A pre-sales systems engineer receives a diagram of the exh ibited WAN implementation from a customer. EIGRP is the routing protocol that is used on the WAN. None of the parameters for EIGRP metric calculation have been modified in any router configurations. Which statement is true about the routing table on router RM? There is a single route to the 192.168.24.0/24 LAN using th e T1 connection. There is a single route to the 192.168.24.0/24 LAN using the DS L connection. There is a single route to the 192.168.24.0/24 LAN using the Metro Ethernet connection. EIGRP installs all three routes to the 192.168.24.0/24 LAN and load balances the traffic. 48 Refer to the exhibit. What can be concluded from the output that is shown? MDF_R 1 has a MAC address of 2294:300F:0000. MDF_R1 is connected through FastEthernet0 /1 to C2960-24TT-L_IDF1. Device C2960-24TT-L_IDF1 is running Cisco IOS Software Release 12.2(25)SEE2.

MDF_R1 is installed in the main distribution facility on floor 24 of building L. 49 Which two values represent valid IPv6 addresses? (Choose two.) ::::1 FF01::1 0:0:0:0:0:0:0:1 2001:DB8::47::2A4 2031:0000:04AC:3400:FFE3:0 50 During a review of the proposed bill of materials, an account manager of the network solution co mpany realizes that the systems engineer included a switch with lower cost and r educed capabilities for the access layer than was originally specified by the ne twork designer. When questioned, the systems engineer responds that the switches specified by the designer cannot be purchased within the budget limitations of the customer. Which action should the account manager take? Inform the customer that the project budget must be increased. Inform the customer that the project cannot be completed given the unreasonable budget constraints. Communicate any r isks that are associated with the equipment substitution and obtain customer app roval to proceed. Because the customer is probably aware that the budget limitat ions will require lower cost, less capable equipment, the account manager should do nothing. 51 What are two advantages of using a simulation tool to test an IP addressing scheme? (Choose two.) Address configuration errors can be corrected using out-of-band connections. Placement of subnets and route summarization can be verified. An engineer can test physical security without leaving the office o r lab. The addressing scheme can be tested for scalability. The effects of combi ning new with existing infrastructure can be measured. It provides real-time mon itoring of a production network. 52 While configuring EIGRP on a router, the tec hnician enters this command: Router(config-router)# variance 8 What is the effec t of entering this command? It adjusts the cost of all EIGRP routes to 8. It ena bles unequal cost load balancing on the router. It restricts the number of EIGRP feasible successor routes to 8. It enables EIGRP equal cost load balancing over a maximum of 8 routes. It modifies the number of values used in the composite m etric calculation.

53 Refer to the exhibit. A new host needs to be connected to the switch and be assi gned to VLAN 3. Router R1 is attached to the switch via a trunk and is configure d as shown. What IP address should be assigned to this new host? 192.168.1.1/26 192.168.1.31/28 192.168.1.32/28 192.168.1.44/28 192.168.1.63/28 192.168.1.55/28 54 A network engineer is at a customer site. After resolving technical problems in the network, the engineer provides a training session for the support staff. Which job function best fits the activities of this network engineer? network de signer account manager pre-sales engineer post-sales field engineer 55 A network administrator has removed a router from the network for maintenance. A new Cisc o IOS software image has been successfully downloaded to a server and copied int o the flash of the router. What should the administrator do before placing the r outer back into service? Delete the previous version of the Cisco IOS software f rom flash. Copy the new IOS into NVRAM to create a backup copy. Restart the rout er and verify that the new image starts successfully. Verify the free space avai lable on the router to store the new IOS image.

56 Refer to the exhibit. An extended ACL has been created to deny traffic from the 192.168.35.0/24 network to the web server with IP address 209.165.201.15. Accord ing to Cisco best practices, where should the ACL be applied? RTB Fa0/0 inbound RTC S0/0/1 inbound RTD Fa0/0 outbound RTC S0/1/0 outbound 57 During prototype te sting, the network designer performs a test to determine the ability of the netw ork to store device configurations and statistics on local databases. Which desi gn goal is validated if the test is a success? security scalability Availability Manageability

58 Refer to the exhibit. Which EIGRP configuration commands should a network admini strator enter on router R1 to correctly advertise a single summary route to rout er MAIN for the campus LAN? 1st one

Anda mungkin juga menyukai