Refer to the exhibit. The network administrator is validating a WAN connection design that supports authentication
between the two routers. Which statement is true about the effect of the current configuration?
The serial connection will be established and meet the design objective.
Bottom of Form
2 Top of Form
A small tire retailer requires a low-cost WAN connection to its headquarters in order to manage its inventory and process customer
in real time. Which WAN connection type is best suited to its needs?
SONET
T3
T1
DSL
leased line
Bottom of Form
3 Top of Form
Refer to the exhibit. Once DHCP is configured on a router with the Cisco SDM entries that are exhibited, which three statements co
network technician expect to see in the running configuration of the router? (Choose three.)
default-router 192.168.1.100
default-router 192.168.1.200
Bottom of Form
4 Top of Form
After an unsuccessful ping to the local router, the technician decides to investigate the router. The technician observes that the light
and fan on the router are not operational. In which layer of the OSI model is the problem most likely occurring?
Transport
Network
data link
Physical
Bottom of Form
5 Top of Form
What is the purpose of using the copy tftp flash command on a router?
Bottom of Form
Top of Form
Refer to the exhibit. Router R1 has been configured with the commands that are displayed. Which fact can be
determined from the configuration?
The router can be accessed from the console without using any password.
Bottom of Form
7 Top of Form
Refer to the exhibit. Which subnet mask would accommodate the number of hosts indicated for all subnets if the
major network address was 192.168.25.0/24?
255.255.0.0
255.255.224.0
255.255.255.0
255.255.255.224
255.255.255.240
255.255.255.248
Bottom of Form
8 Top of Form
A network administrator is asked to design a system to allow simultaneous access to the Internet for 250 users. The ISP can
only supply five public IP addresses for this network. What technology can the administrator use to accomplish this task?
classful subnetting
Bottom of Form
9 Top of Form
Refer to the exhibit. A network administrator has just entered the interface configuration commands shown in the exhibit on
a brand new router. To verify basic connectivity, a ping is issued from Host A to R1. The ping is unsuccessful. Which two
configuration steps should be performed to solve this problem? (Choose two.)
Modify the subnet mask on HostA to be the same as the Fa0/0 interface.
Bottom of Form
10 Top of Form
Refer to the exhibit. What method is most commonly employed by large ISPs, such as ISP1, ISP2, and ISP3, to exchang
e and maintain routing information?
static routes
IGP protocols
EGP protocols
Bottom of Form
11 Top of Form
When should an ISP helpdesk technician start documentation during the customer troubleshooting process?
when the technician answers the initial call from the customer who reports a problem
when it is necessary to create a work order so that the onsite technician can visit the customer site
when the technician cannot resolve the issue and the case needs to be escalated to the next level technician
Bottom of Form
12 Top of Form
Which routes are automatically added to the routing table on a neighbor router when routing protocols exchang
e information about directly connected networks?
dynamic routes
static routes
default routes
Bottom of Form
13 Top of Form
Refer to the exhibit. Based on the DHCP configuration commands, what is the reason that a PC is receiving an
IP address but is unable to communicate outside of the local network?
There are not enough addresses to support the 28 hosts that are required for this LAN.
Bottom of Form
14 Top of Form
What contributes to the fact that transmitting a file using TCP will take longer than transmitting the same file using UDP?
The UDP authentication process is faster than the process that is used by TCP.
The TCP verification process adds more transmissions during the file transfer.
Bottom of Form
15 Top of Form
Which two statements are correct about the UDP protocol? (Choose two.)
It uses windowing.
It does not provide acknowledgment of receipt of data.
It is a connectionless protocol.
Bottom of Form
16 Top of Form
Which statement correctly describes the difference between HTTP and HTTPS?
The maximum number of simultaneous connections that a server can support for HTTPS is more than for HTTP.
HTTPS authenticates and encrypts the data being transferred between the client and the web server.
HTTPS specifies the rules for passing data between the physical layer and the data link layer.
Bottom of Form
Top of Form
17 Which two statements are correct about the ICMP packet that is used by the ping command? (Choose two.)
It guarantees datagram delivery.
It determines where a packet is lost on the path from the source to the destination.
It measures the time that elapses between when the request packet is sent and the response packet is received.
Bottom of Form
18 Top of Form
Refer to the exhibit. A computer with the displayed IP settings is unable to access a server on the 192.168.2.0 network using
the server IP address but can access hosts on the 192.168.1.0 network. What should the network administrato
r do to troubleshoot this problem?
Issue the ping 192.168.1.1 command on the host to determine if the host can communicate with the default gateway.
Issue the ipconfig /all command to determine if a DNS server IP address was configured.
Bottom of Form
19 Top of Form
Refer to the exhibit. Which cable path segments require the use of crossover cables?
A, D, F
B, C, E
B, D, E
A, C, F
Bottom of Form
20 Top of Form
When a user issues the command ping –a 64.102.240.242 in a command prompt window, which database will a DNS
server search for the matching record?
Bottom of Form
21 Top of Form
Which networking service is used to provide name to IP address mapping?
DNS
FTP
NAT
DHCP
Bottom of Form
22 Top of Form
A network technician begins troubleshooting by checking the status of the light on the network interface card on the web server.
Which troubleshooting method is the technician using?
top-down
bottom-up
divide-and-conquer
Bottom of Form
23 Top of Form
Which protocol defines the types of messages that a client uses to request a web page and the messages a server uses to
respond to those requests?
FTP
TCP
HTTP
HTML
Bottom of Form
24 Top of Form
Which two commands ensure that any password that permits access to the privileged EXEC mode is not shown in plain text
when the configuration files are displayed? (Choose two.)
25 Top of Form
A network engineer is planning a new horizontal cable installation in an office building. What advantage would UTP cable
have over fiber optic cable for this installation?
Bottom of Form
26 Top of Form
What is the function of the forward lookup DNS zone in the DNS name resolution process?
Bottom of Form
27 Top of Form
Refer to the exhibit. The interfaces on R1 and R2 have been properly configured with the IP addresses as shown.
No dynamic routing protocols have been configured. The network administrator has entered the commands that are
shown in the exhibit.
Which two additional routes need to be configured to enable host A to access the Internet? (Choose two.)
Bottom of Form
28 Top of Form
An experienced network technician has decided to use a divide-and-conquer approach to troubleshooting a network
problem. What is an advantage to this approach?
Bottom of Form
29 Top of Form
A Catalyst switch is used as a temporary replacement for another switch that needs to be repaired. About a minute after the
switch has started, the SYST LED on the front of the switch transitions from blinking green to amber. What is the meaning of
the amber SYST LED?
The switch has failed POST and must be sent for service.
Bottom of Form
30 Top of Form
What is a characteristic of the EIGRP routing protocol?
It has a hop count limitation that makes it suitable only for small, simple networks that consist of fewer than 15 hops.
It builds the topology table based on all of the advertisements from its neighbors.
It maintains a full database of distant routers and the methods by which they interconnect.
Bottom of Form
Top of Form
All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.
Top of Form
16 Top of Form
Which statement correctly describes the difference between HTTP and HTTPS?
The maximum number of simultaneous connections that a server can support for HTTPS is more than for HTTP.
HTTPS authenticates and encrypts the data being transferred between the client and the web server.
HTTPS specifies the rules for passing data between the physical layer and the data link layer.
Bottom of Form
17 Top of Form
Which two statements are correct about the ICMP packet that is used by the ping command? (Choose two.)
It determines where a packet is lost on the path from the source to the destination.
It measures the time that elapses between when the request packet is sent and the response packet is received.
Bottom of Form
18 Top of Form
Refer to the exhibit. A computer with the displayed IP settings is unable to access a server on the 192.168.2.0 network using
the server IP address but can access hosts on the 192.168.1.0 network. What should the network administrator do to
troubleshoot this problem?
Issue the ping 192.168.1.1 command on the host to determine if the host can communicate with the default gateway.
Issue the ipconfig /all command to determine if a DNS server IP address was configured.
Verify that the host has a link light.
Bottom of Form
19 Top of Form
Refer to the exhibit. Which cable path segments require the use of crossover cables?
A, D, F
B, C, E
B, D, E
A, C, F
Bottom of Form
20 Top of Form
When a user issues the command ping –a 64.102.240.242 in a command prompt window, which database will a DNS
server search for the matching record?
Bottom of Form
21 Top of Form
Which networking service is used to provide name to IP address mapping?
DNS
FTP
NAT
DHCP
Bottom of Form
22 Top of Form
A network technician begins troubleshooting by checking the status of the light on the network interface card on the web server.
Which troubleshooting method is the technician using?
top-down
bottom-up
divide-and-conquer
Bottom of Form
23 Top of Form
Which protocol defines the types of messages that a client uses to request a web page and the messages a server uses to
respond to those requests?
FTP
TCP
HTTP
HTML
Bottom of Form
24 Top of Form
Which two commands ensure that any password that permits access to the privileged EXEC mode is not shown in plain
text when the configuration files are displayed? (Choose two.)
Bottom of Form
25 Top of Form
A network engineer is planning a new horizontal cable installation in an office building. What advantage would UTP
cable have over fiber optic cable for this installation?
lower installation costs
Bottom of Form
26 Top of Form
What is the function of the forward lookup DNS zone in the DNS name resolution process?
Bottom of Form
27 Top of Form
Refer to the exhibit. The interfaces on R1 and R2 have been properly configured with the IP addresses as shown
. No dynamic routing protocols have been configured. The network administrator has entered the commands that
are shown in the exhibit.
Which two additional routes need to be configured to enable host A to access the Internet? (Choose two.)
Bottom of Form
28 Top of Form
An experienced network technician has decided to use a divide-and-conquer approach to troubleshooting a network problem.
What is an advantage to this approach?
Bottom of Form
29 Top of Form
A Catalyst switch is used as a temporary replacement for another switch that needs to be repaired. About a minute after the
switch has started, the SYST LED on the front of the switch transitions from blinking green to amber. What is the meaning
of the amber SYST LED?
The switch has failed POST and must be sent for service.
Bottom of Form
30 Top of Form
What is a characteristic of the EIGRP routing protocol?
It has a hop count limitation that makes it suitable only for small, simple networks that consist of fewer than 15 hops.
It builds the topology table based on all of the advertisements from its neighbors.
It maintains a full database of distant routers and the methods by which they interconnect.
Bottom of Form
46 Top of Form
What should be the first step in a structured cable project?
Bottom of Form
47 Top of Form
Which scenario may require the use of a crossover UTP cable?
Bottom of Form
48 Top of Form
What is a characteristic of Syslog?
It requires users to prove their identity with the use of a username and password before users can access network
resources.
It listens to network traffic and sends an alert to a management station to track which applications are used and the
length of time for which they are used.
It provides users the rights to access specific resources and perform specific tasks.
Bottom of Form
49 Top of Form
Which WAN connection provides a dedicated circuit with fixed bandwidth available at all times?
point-to-point
circuit-switched
packet-switched
cable
Bottom of Form
50 Top of Form
What needs to be configured on a router to ensure that when the router receives a packet with an unknown destination,
the router will forward it to the next hop?
a default route
Bottom of Form
Top of Form
4
Showing 4 of 4 <Prev Next>
Page:
Bottom of Form
Close Window
All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.
Top of Form
4
Bottom of Form
Bottom of Form
Bottom of Form
Bottom of Form