Anda di halaman 1dari 18

1 Top of Form

Refer to the exhibit. The network administrator is validating a WAN connection design that supports authentication
between the two routers. Which statement is true about the effect of the current configuration?

The serial connection cannot be established.

The configuration does not meet the design objective.

The clock rate must be configured on both routers.

The serial connection will be established and meet the design objective.

Bottom of Form

2 Top of Form
A small tire retailer requires a low-cost WAN connection to its headquarters in order to manage its inventory and process customer
in real time. Which WAN connection type is best suited to its needs?

SONET

T3

T1

DSL

leased line

Bottom of Form

3 Top of Form
Refer to the exhibit. Once DHCP is configured on a router with the Cisco SDM entries that are exhibited, which three statements co
network technician expect to see in the running configuration of the router? (Choose three.)

ip dhcp pool INTERNAL

ip dhcp pool abc-widgets.inc

network 192.168.1.0 255.255.255.0

network 192.168.1.2 192.168.1.100 255.255.255.0

default-router 192.168.1.100

default-router 192.168.1.200

ip dhcp excluded-address 192.168.1.1

Bottom of Form

4 Top of Form
After an unsuccessful ping to the local router, the technician decides to investigate the router. The technician observes that the light
and fan on the router are not operational. In which layer of the OSI model is the problem most likely occurring?

Transport

Network

data link

Physical

Bottom of Form

5 Top of Form
What is the purpose of using the copy tftp flash command on a router?

to back up the current IOS image to a server

to restore the IOS image from a server

to back up the router configuration to a server

to restore the router configuration from flash

Bottom of Form

Top of Form

Refer to the exhibit. Router R1 has been configured with the commands that are displayed. Which fact can be
determined from the configuration?

All passwords are encrypted.

The privileged EXEC mode password is “password1.”

The router can support four Telnet sessions simultaneously.

The router can be accessed from the console without using any password.

Bottom of Form

7 Top of Form
Refer to the exhibit. Which subnet mask would accommodate the number of hosts indicated for all subnets if the
major network address was 192.168.25.0/24?

255.255.0.0

255.255.224.0

255.255.255.0

255.255.255.224

255.255.255.240

255.255.255.248

Bottom of Form

8 Top of Form
A network administrator is asked to design a system to allow simultaneous access to the Internet for 250 users. The ISP can
only supply five public IP addresses for this network. What technology can the administrator use to accomplish this task?

classful subnetting

variable length subnet masks

classless interdomain routing

port-based Network Address Translation

Bottom of Form

9 Top of Form

Refer to the exhibit. A network administrator has just entered the interface configuration commands shown in the exhibit on
a brand new router. To verify basic connectivity, a ping is issued from Host A to R1. The ping is unsuccessful. Which two
configuration steps should be performed to solve this problem? (Choose two.)

Configure the appropriate line password to access the router.

Configure the speed of the interface.

Enable the interface administratively.


Configure a dynamic routing protocol on the router.

Configure the subnet mask on the router interface to 255.255.255.248.

Modify the subnet mask on HostA to be the same as the Fa0/0 interface.

Bottom of Form

10 Top of Form

Refer to the exhibit. What method is most commonly employed by large ISPs, such as ISP1, ISP2, and ISP3, to exchang
e and maintain routing information?

static routes

IGP protocols

EGP protocols

directly connected routes

Bottom of Form

11 Top of Form
When should an ISP helpdesk technician start documentation during the customer troubleshooting process?

when the issue is resolved

when the technician answers the initial call from the customer who reports a problem

when it is necessary to create a work order so that the onsite technician can visit the customer site

when the technician cannot resolve the issue and the case needs to be escalated to the next level technician

Bottom of Form

12 Top of Form
Which routes are automatically added to the routing table on a neighbor router when routing protocols exchang
e information about directly connected networks?

dynamic routes

static routes

default routes

directly connected routes

Bottom of Form

13 Top of Form

Refer to the exhibit. Based on the DHCP configuration commands, what is the reason that a PC is receiving an
IP address but is unable to communicate outside of the local network?

The default gateway is misconfigured.

Excluded addresses must be configured.

The DNS server is on the incorrect network.

There are not enough addresses to support the 28 hosts that are required for this LAN.

Bottom of Form

14 Top of Form
What contributes to the fact that transmitting a file using TCP will take longer than transmitting the same file using UDP?

UDP does not need to add a header to a data packet.

UDP utilizes a more efficient error checking mechanism than TCP.

The UDP authentication process is faster than the process that is used by TCP.

The TCP verification process adds more transmissions during the file transfer.

Bottom of Form

15 Top of Form
Which two statements are correct about the UDP protocol? (Choose two.)

It utilizes a flow control mechanism.

It uses windowing.
It does not provide acknowledgment of receipt of data.

It is a connectionless protocol.

It guarantees the sequential arrival of data packets.

Bottom of Form

16 Top of Form
Which statement correctly describes the difference between HTTP and HTTPS?

The maximum number of simultaneous connections that a server can support for HTTPS is more than for HTTP.

HTTPS and HTTP use different client request-server response processes.

HTTPS authenticates and encrypts the data being transferred between the client and the web server.

HTTPS specifies the rules for passing data between the physical layer and the data link layer.

Bottom of Form

Top of Form
17 Which two statements are correct about the ICMP packet that is used by the ping command? (Choose two.)
It guarantees datagram delivery.

It verifies Layer 3 connectivity.

It acknowledges the receipt of TCP segments.

It determines where a packet is lost on the path from the source to the destination.

It measures the time that elapses between when the request packet is sent and the response packet is received.

Bottom of Form

18 Top of Form

Refer to the exhibit. A computer with the displayed IP settings is unable to access a server on the 192.168.2.0 network using
the server IP address but can access hosts on the 192.168.1.0 network. What should the network administrato
r do to troubleshoot this problem?
Issue the ping 192.168.1.1 command on the host to determine if the host can communicate with the default gateway.

Issue the ipconfig /all command to determine if a DNS server IP address was configured.

Verify that the host has a link light.

Check the cabling of the host.

Bottom of Form

19 Top of Form

Refer to the exhibit. Which cable path segments require the use of crossover cables?

A, D, F

B, C, E

B, D, E

A, C, F

Bottom of Form

20 Top of Form
When a user issues the command ping –a 64.102.240.242 in a command prompt window, which database will a DNS
server search for the matching record?

reverse lookup zones

forward lookup zones

domain name search zones

domain address search zones

Bottom of Form

21 Top of Form
Which networking service is used to provide name to IP address mapping?
DNS

FTP

NAT

DHCP

Bottom of Form

22 Top of Form
A network technician begins troubleshooting by checking the status of the light on the network interface card on the web server.
Which troubleshooting method is the technician using?

top-down

bottom-up

divide-and-conquer

from hardware to software

Bottom of Form

23 Top of Form
Which protocol defines the types of messages that a client uses to request a web page and the messages a server uses to
respond to those requests?

FTP

TCP

HTTP

HTML

Bottom of Form

24 Top of Form
Which two commands ensure that any password that permits access to the privileged EXEC mode is not shown in plain text
when the configuration files are displayed? (Choose two.)

Router(config)# enable secret cisco

Router(config)# enable cisco

Router(config)# encryption-password all

Router(config)# enable login encrypted

Router(config)# enable password encryption

Router(config)# service password-encryption


Bottom of Form

25 Top of Form
A network engineer is planning a new horizontal cable installation in an office building. What advantage would UTP cable
have over fiber optic cable for this installation?

lower installation costs

better protection from EMI

higher transmission speeds

longer unrepeated distance between endpoints

Bottom of Form

26 Top of Form
What is the function of the forward lookup DNS zone in the DNS name resolution process?

It resolves fully qualified domain names into IP addresses.

It stores the information about the domain namespace structure.

It forwards zone information updates to the secondary server.

It maintains a database of ARP entries for all servers.

Bottom of Form

27 Top of Form

Refer to the exhibit. The interfaces on R1 and R2 have been properly configured with the IP addresses as shown.
No dynamic routing protocols have been configured. The network administrator has entered the commands that are
shown in the exhibit.

Which two additional routes need to be configured to enable host A to access the Internet? (Choose two.)

a default route on R1 using exit interface S0/0/0


a default route on R1 using exit interface S0/0/1

a default route on R1 using exit IP address 198.133.219.1

a static route on R2 for network 192.168.1.0 using exit interface S0/0/0

a static route on R2 for network 198.133.219.1 using exit interface S0/0/0

a static route on R2 for network 10.1.1.0 using exit interface S0/0/0

Bottom of Form

28 Top of Form
An experienced network technician has decided to use a divide-and-conquer approach to troubleshooting a network
problem. What is an advantage to this approach?

works well for simple problems

quickly resolves user-related issues

easiest to use in a multi-vendor environment

targets the problem layer more quickly than other methods do

Bottom of Form

29 Top of Form
A Catalyst switch is used as a temporary replacement for another switch that needs to be repaired. About a minute after the
switch has started, the SYST LED on the front of the switch transitions from blinking green to amber. What is the meaning of
the amber SYST LED?

The switch has no configuration file in NVRAM.

The switch has failed POST and must be sent for service.

The switch is functioning properly.

The switch is in half-duplex mode.

Bottom of Form

30 Top of Form
What is a characteristic of the EIGRP routing protocol?

It has a hop count limitation that makes it suitable only for small, simple networks that consist of fewer than 15 hops.

It does not include subnet mask information in routing updates.

It builds the topology table based on all of the advertisements from its neighbors.

It maintains a full database of distant routers and the methods by which they interconnect.

Bottom of Form
Top of Form

All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.
Top of Form

16 Top of Form
Which statement correctly describes the difference between HTTP and HTTPS?

The maximum number of simultaneous connections that a server can support for HTTPS is more than for HTTP.

HTTPS and HTTP use different client request-server response processes.

HTTPS authenticates and encrypts the data being transferred between the client and the web server.

HTTPS specifies the rules for passing data between the physical layer and the data link layer.

Bottom of Form

17 Top of Form
Which two statements are correct about the ICMP packet that is used by the ping command? (Choose two.)

It guarantees datagram delivery.

It verifies Layer 3 connectivity.

It acknowledges the receipt of TCP segments.

It determines where a packet is lost on the path from the source to the destination.

It measures the time that elapses between when the request packet is sent and the response packet is received.

Bottom of Form

18 Top of Form

Refer to the exhibit. A computer with the displayed IP settings is unable to access a server on the 192.168.2.0 network using
the server IP address but can access hosts on the 192.168.1.0 network. What should the network administrator do to
troubleshoot this problem?

Issue the ping 192.168.1.1 command on the host to determine if the host can communicate with the default gateway.

Issue the ipconfig /all command to determine if a DNS server IP address was configured.
Verify that the host has a link light.

Check the cabling of the host.

Bottom of Form

19 Top of Form

Refer to the exhibit. Which cable path segments require the use of crossover cables?

A, D, F

B, C, E

B, D, E

A, C, F

Bottom of Form

20 Top of Form
When a user issues the command ping –a 64.102.240.242 in a command prompt window, which database will a DNS
server search for the matching record?

reverse lookup zones

forward lookup zones

domain name search zones

domain address search zones

Bottom of Form

21 Top of Form
Which networking service is used to provide name to IP address mapping?

DNS

FTP
NAT

DHCP

Bottom of Form

22 Top of Form
A network technician begins troubleshooting by checking the status of the light on the network interface card on the web server.
Which troubleshooting method is the technician using?

top-down

bottom-up

divide-and-conquer

from hardware to software

Bottom of Form

23 Top of Form
Which protocol defines the types of messages that a client uses to request a web page and the messages a server uses to
respond to those requests?

FTP

TCP

HTTP

HTML

Bottom of Form

24 Top of Form
Which two commands ensure that any password that permits access to the privileged EXEC mode is not shown in plain
text when the configuration files are displayed? (Choose two.)

Router(config)# enable secret cisco

Router(config)# enable cisco

Router(config)# encryption-password all

Router(config)# enable login encrypted

Router(config)# enable password encryption

Router(config)# service password-encryption

Bottom of Form

25 Top of Form
A network engineer is planning a new horizontal cable installation in an office building. What advantage would UTP
cable have over fiber optic cable for this installation?
lower installation costs

better protection from EMI

higher transmission speeds

longer unrepeated distance between endpoints

Bottom of Form

26 Top of Form
What is the function of the forward lookup DNS zone in the DNS name resolution process?

It resolves fully qualified domain names into IP addresses.

It stores the information about the domain namespace structure.

It forwards zone information updates to the secondary server.

It maintains a database of ARP entries for all servers.

Bottom of Form

27 Top of Form

Refer to the exhibit. The interfaces on R1 and R2 have been properly configured with the IP addresses as shown
. No dynamic routing protocols have been configured. The network administrator has entered the commands that
are shown in the exhibit.

Which two additional routes need to be configured to enable host A to access the Internet? (Choose two.)

a default route on R1 using exit interface S0/0/0

a default route on R1 using exit interface S0/0/1

a default route on R1 using exit IP address 198.133.219.1


a static route on R2 for network 192.168.1.0 using exit interface S0/0/0

a static route on R2 for network 198.133.219.1 using exit interface S0/0/0

a static route on R2 for network 10.1.1.0 using exit interface S0/0/0

Bottom of Form

28 Top of Form
An experienced network technician has decided to use a divide-and-conquer approach to troubleshooting a network problem.
What is an advantage to this approach?

works well for simple problems

quickly resolves user-related issues

easiest to use in a multi-vendor environment

targets the problem layer more quickly than other methods do

Bottom of Form

29 Top of Form
A Catalyst switch is used as a temporary replacement for another switch that needs to be repaired. About a minute after the
switch has started, the SYST LED on the front of the switch transitions from blinking green to amber. What is the meaning
of the amber SYST LED?

The switch has no configuration file in NVRAM.

The switch has failed POST and must be sent for service.

The switch is functioning properly.

The switch is in half-duplex mode.

Bottom of Form

30 Top of Form
What is a characteristic of the EIGRP routing protocol?

It has a hop count limitation that makes it suitable only for small, simple networks that consist of fewer than 15 hops.

It does not include subnet mask information in routing updates.

It builds the topology table based on all of the advertisements from its neighbors.

It maintains a full database of distant routers and the methods by which they interconnect.

Bottom of Form

46 Top of Form
What should be the first step in a structured cable project?

Locate all sources of EMI.


Obtain an accurate floor plan.

Identify the network backbone.

Design efficient cable management systems.

Bottom of Form

47 Top of Form
Which scenario may require the use of a crossover UTP cable?

connecting a host to a hub

connecting a host to a switch

connecting a router to a switch

connecting a switch to another switch

Bottom of Form

48 Top of Form
What is a characteristic of Syslog?
It requires users to prove their identity with the use of a username and password before users can access network
resources.

It listens to network traffic and sends an alert to a management station to track which applications are used and the
length of time for which they are used.

It enables devices to send information to a daemon that runs on a management station.

It provides users the rights to access specific resources and perform specific tasks.

Bottom of Form

49 Top of Form
Which WAN connection provides a dedicated circuit with fixed bandwidth available at all times?

point-to-point

circuit-switched

packet-switched

cable

Bottom of Form

50 Top of Form
What needs to be configured on a router to ensure that when the router receives a packet with an unknown destination,
the router will forward it to the next hop?

a default route

a directly connected route


a dynamically updated route

a static route to the destination network

Bottom of Form

Top of Form

4
Showing 4 of 4 <Prev Next>
Page:
Bottom of Form

Close Window

All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.
Top of Form
4

Bottom of Form
Bottom of Form
Bottom of Form
Bottom of Form

Anda mungkin juga menyukai