1 A user calls a help desk about being unable to connect to a web server. The technician asks the us
to issue a ping 127.0.0.1 command. What is the purpose of this command?
verify if the network cable is connected to the PC
verify if the TCP/IP stack is functioning on the PC
verify if the IP address is configured correctly on the PC
verify if the DNS server IP addresses are present on the PC
Refer to the exhibit. Which two IP addresses could be assigned to the hosts in the diagram? (Choo
two.)
192.168.65.31
192.168.65.32
192.168.65.35
192.168.65.60
192.168.65.63
192.168.65.64
Refer to the exhibit. A network administrator is troubleshooting the serial connection between R1 an
R2. There is no communication between R1 and R2. Based on the output of the show ip interface
briefcommand, what is the cause of the problem?
There is a misconfiguration of IP addresses.
There is a mismatch of encapsulation methods.
The no shutdown command has not been issued on R2.
The routing protocols are not compatible.
6 What is the primary function of a Level 1 support technician in an ISP help desk department with
multiple levels of customer support?
to install hardware replacements for the customer
to accompany an on-site technician to provide additional technical support
to diagnose and document the symptoms of hardware, software, and system problems
to design network enhancements that support the new technology requirements of the custome
7 In a structured cable system, which term describes the cable that connects the wall jack in the user
work area to the patch panel in the wiring closet?
patch cable
vertical cable
horizontal cable
backbone cable
8 A client complains to an ISP that the hosted web server seems slow and frequently cannot be reach
The technician suspects the special high performance server NIC might be the source of the problem
After checking with vendor support, it is verified that the NIC is causing framing errors and the firmw
needs to be upgraded. With which layer of the OSI model is this problem associated?
Layer 1
Layer 2
Layer 4
Layer 7
9 When a field technician visits a customer site and resolves the issue that was opened in a trouble
ticket, what should the technician do?
assess the network design of the customer site
survey users at the customer site for further needs
document the solution and obtain acceptance of the customer
discuss further problems that are identified during the visit and offer cost estimates
10 Different hosts connect to the same switch port at different times. If the switch port is configured wi
dynamic port security, how does it process the MAC addresses?
The addresses are manually assigned with the use of the switchport command.
The addresses are dynamically learned and stored in the address table.
The addresses are dynamically configured and saved in the running configuration.
The addresses are stored in the address table and added to the running configuration.
11
Refer to the exhibit. A PC has an IP address of 192.168.87.30 but is unable to contact a web serve
on the Internet. A network administrator is troubleshooting the DHCP configuration on a Cisco 1841
router. What is the possible error?
The IP address of the PC is outside the network range.
A domain name is required in the DHCP configuration.
The DHCP service has not been activated.
The default-router command needs to be included in the DHCP configuration.
The DHCP pool has not been applied to an active interface.
12 Which statement correctly describes the difference between HTTP and HTTPS?
The maximum number of simultaneous connections that a server can support for HTTPS is mo
than for HTTP.
HTTPS and HTTP use different client request-server response processes.
HTTPS authenticates and encrypts the data being transferred between the client and the web
server.
HTTPS specifies the rules for passing data between the physical layer and the data link layer.
13
Refer to the exhibit. While configuring the serial interface of a router, the network administrator see
the highlighted error message. What is the reason for this?
The serial interface is administratively down.
The serial interface is already configured with an IP address.
The network administrator has attempted to configure the serial interface with a broadcast
address.
The same IP address has been configured on another interface.
14 Which routing protocol depends on the DUAL algorithm to calculate the shortest path to a destinati
OSPF
EIGRP
RIP
BGP
15 Which service team in an ISP is responsible for determining if the new customer has hardware that
support the new WAN connection and if new WAN circuits need to be installed?
customer service
onsite installation
planning and provisioning
network operations center
16 Which WAN service provides point-to-point connections with a predefined communications path?
E1
T1
dialup
leased line
19 Which device will set the clock rate for a serial link of a customer router that is connected to an ISP
over a leased T1 line?
DTE
CMTS
DSLAM
CSU/DSU
20
Refer to the exhibit. R1 and R2 are configured with the commands that are displayed. All interfaces
are properly configured, but neither router is receiving routing updates. What two things can be don
to solve the problem? (Choose two.)
Configure the routing protocol on R1 for network 10.0.0.0.
Configure the routing protocol on R2 for network 10.0.0.0.
Configure the routing protocol on R1 for network 192.168.4.0.
Configure the routing protocol on R1 for network 192.168.2.0.
Configure the routing protocol on R2 for network 192.168.1.0.
Configure the routing protocol on R2 for network 192.168.3.0.
21
Refer to the exhibit. A network administrator is unable to ping H1 from the router and is checking th
cabling along the network. Which segment is incorrectly cabled?
Segment A
Segment B
Segment C
Segment D
22
Refer to the exhibit. The network administrator needs to configure the Fa0/0 interface of RTB so th
hosts from RTA can connect to the server that is attached to RTB. Which two commands will the
administrator use to accomplish this task? (Choose two.)
RTB# ip address 192.168.102.98 255.255.255.248
RTB(config-if)# ip address 192.168.102.99 255.255.255.252
RTB(config)# ip address 192.168.102.97 255.255.255.252
RTB(config)# no shutdown
RTB(config-if)# no shutdown
RTB(config-if)# ip address 192.168.102.97 255.255.255.252
23 Which two services are required to enable a computer to receive dynamic IP addresses and acces
the Internet using domain names? (Choose two.)
DNS
WINS
HTTP
DHCP
SMTP
24 How do port filtering and access lists help provide network security?
They prevent specified types of traffic from reaching specified network destinations.
They alert network administrators to various type of denial of service attacks as they occur.
They prevent viruses, worms, and Trojans from infecting host computers and servers.
They enable encryption and authentication of confidential data communications.
25 A network administrator is configuring a DTE serial interface on a 1841 router. The serial interface
installed in the first controller, second slot, first port, with an IP address from the 192.168.1.8 /30
network. Which set of commands correctly configures this interface?
Router(config)# interface serial 0/0/0
Router(config-if)# ip address 192.168.1.10 255.255.255.252
Router(config-if)# clock rate 64000
Router(config-if)# no shutdown
Router(config)# interface serial 0/1/1
Router(config-if)# ip address 192.168.1.10 255.255.255.252
Router(config-if)# clock rate 64000
Router(config-if)# no shutdown
Router(config)# interface serial 0/1/0
Router(config-if)# ip address 192.168.1.10 255.255.255.252
Router(config-if)# no shutdown
Router(config)# interface serial 1/2/1
Router(config-if)# ip address 192.168.1.10 255.255.255.252
Router(config-if)# no shutdown
26
Refer to the exhibit. The network administrator uses the command below to configure a default rou
on RTB:
A ping issued from PC3 is successful to RTB. However, echo request packets arrive at PC1 but the
echo replies do not make it back to PC3. What will fix this problem?
RTA must be configured to forward packets to the 192.168.2.0 network.
The ip route command needs to be edited so that the next hop address is 10.1.1.5.
The ip route command needs to be edited so that the 192.168.2.1 address is the next hop
address.
The ip route command should be removed from the RTB router configuration.
Another default route should be configured on RTA with a next hop address of 10.1.1.6.
27 Which routing protocol facilitates the exchange of routing information between different autonomou
systems?
OSPF
EIGRP
RIP
BGP
28 A network administrator has designed a Class B network with a 255.255.254.0 mask. Which two
statements are true for this network? (Choose two.)
There are 128 subnets.
There are 256 subnets.
There are 512 subnets.
There are 126 usable hosts per subnet.
There are 254 usable hosts per subnet.
There are 510 usable hosts per subnet.
29 A building has experienced a power outage. When the power returns, none of the devices on one f
can access the Internet. The network administrator checks the switch in the IDF that these devices
connected to and notes that the SYST LED on the front of the switch is amber.
31 An administrator wishes to protect a router by encrypting the console access password noaccess.
Which command should be used?
Router(config)# enable secret noaccess
Router(config)# enable password noaccess
Router(config-line)# password noaccess
Router(config)# service password-encryption
32
Refer to the exhibit. Which type of cables would be required to connect the network devices?
A crossover
B straight-through
C crossover
A straight-through
B crossover
C straight-through
A straight-through
B crossover
C crossover
A straight-through
B straight-through
C straight- through
A crossover
B crossover
C straight-through
35 A company functions from Monday to Friday each week. Their backup strategy calls for full backup
each Friday night, with incremental backups on all other weekday nights. If an administrator is aske
to restore a server hard drive to its Wednesday morning state, how many backups must be used?
1
2
3
4
36 The command copy tftp running-config has been entered on the router. What will this command
copy the configuration in RAM to a server
copy the configuration file from a server to RAM
copy the configuration file in NVRAM to RAM
copy the configuration file in NVRAM to a server
copy the configuration file from a server to NVRAM
38 A user reports being able to access the Internet but not being able to download e-mail from the ma
server at the ISP. What should the user check on the user workstation?
the POP3 and SMTP server settings in the e-mail application
the patch cable connections at the back of the workstation and at the wall plate
the DHCP settings in the operating system
the IP address, mask, and default gateway values
the NIC drivers
39 Which technology is used for WAN connections and delivers up to 1.544 Mb/s of symmetrical
bandwidth?
DSL
dialup
T1 line
T3 line
41
43 The IT department of a company implements a backup plan which includes a daily backup on Mond
through Saturday. Only files that were modified during each day are backed up. Which backup met
is being used?
full backup
normal backup
differential backup
incremental backup
44 While configuring PAT on a Cisco ISR, a network technician defines the IP address of the router
interface that connects to the ISP. This address will be the translated address for all Internet traffic
from inside hosts. What is this IP address called?
inside local address
inside global address
outside local address
outside global address
45 A user is unable to connect to the Internet. The network administrator decides to use the top-down
troubleshooting approach. Which action should the administrator perform first?
Run the tracert command to identify the faulty device.
Check the patch cable connection from the PC to the wall.
Enter an IP address in the address bar of the web browser to determine if DNS has failed.
Run the ipconfig command to verify the IP address, subnet mask, and gateway on the PC.
47 For the assignment of permissions to files and folders, what does the "principle of least privilege"
imply?
No user has more privileges than any other user.
Permissions to files are given based on seniority.
Users only have access to resources that are necessary for their jobs.
Users should be given no access to computer resources until they ask.
48 When customers use credit cards to make purchases at a small business, a modem is heard dialin
telephone number to transfer the transaction data to the central office. What type of WAN serial
connection is in use?
leased line
packet switched
circuit switched
point-to-point
49
Refer to the exhibit. What fact can be determined from the exhibited output?
PPP is enabled on this router.
The bandwidth setting of the interfaces is consistent with a T1 connection.
The serial0/0/0 interface is administratively down.
The default encapsulation is set for the serial0/0/0 interface.
Subnet mask 255.255.255.255 has been configured for the serial0/0/0 interface.
50 What is the effect of issuing the banner login #Unauthorized login prohibited# command on a
router?
It will display the message "Unauthorized login prohibited" before the router prompts for a user
name.
It replaces the banner motd command.
It causes the router to prompt for login credentials for any user who is attempting to connect to
router.
It causes the message "Unauthorized access prohibited" to display when a HyperTerminal
connection is idle.
51 A new Cisco IOS is installed on a router in the default location. After booting, the router enters
ROMMON mode. What is the reason for this?
The configuration is missing in NVRAM.
The configuration register value is set to 0x2102.
There is inadequate memory to load the Cisco IOS.
The boot system command has not been run.
52
Refer to the exhibit. Devices need to connect to the file server from remote networks. What method
should be used to provide the file server with an IP address to allow these connections?
static NAT
static PAT
dynamic NAT
dynamic PAT