Escolar Documentos
Profissional Documentos
Cultura Documentos
c
FE80::1324:ABCD
2001:2345:AB12:1935::FEFF
2001:1234:0000:9CA::0876/64
1234:ABCD:5678:EF00:9234:AA22:5527:FC35
2 While configuring a router using RIPng and dual -stack technology with IPv4 and
IPv6, the administrator receives an error message when inputting IPv4 routes. What
could cause the error message?
3 Which statement is true about an interface that is configured with the IPv6 address
command?
4 What will be the result of adding the command ip dhcp excluded -address 172.16.4.1
172.16.4.5 to the configuration of a local router that has been configured as a DHCP
server?
Traffic that is destined for 172.16.4.1 and 172.16.4.5 will be dropped by the router.
Traffic will not be routed from clients with addresses between 172.16.4.1 and
172.16.4.5.
The DHCP server function of the router will not issue the addresses between
172.16.4.1 and 172.16.4.5.
The router will ignore all traffic that comes from the DHCP servers with addresses
172.16.4.1 and 172.16.4.5.
6 What does an access control list determine when used with NAT on a Cisco router?
7 A system administrator must provide Internet connectivity for ten hosts in a small
remote office. The ISP has assigned two public IP addresses to this remote office.
How can the system administrator configure the router to provide Internet access to
all ten users at the same time?
8 What three statements describe the roles of devices in a WAN? (Choose three.)
9 At what physical location does the responsibility for a WAN connection change
from the service provider to the user?
DMZ
local loop
CSU/DSU
demarcation point
10
Refer to the exhibit. Which statement is true about the WAN switch device?
It uses a multiport internetworking device to switch traffic such as Frame Relay, ATM
or X.25 over the WAN.
It provides internetworking and WAN access interface ports that are used to connect
to the service provider network.
It provides termination for the digital signal and ensures connection integrity
through error correction and line monitoring.
It converts the digital signals produced by a computer into voice frequencies that can
be transmitted over the analog lines of the public telephone network.
11
Refer to the exhibit. A network administrator is using two routers to test a WAN
connection . What can be concluded based on the output of the show running -config
commands?
queuing strategy
serial cable type
interface IP address
encapsulation method
Observable Description Max Value
1 correctness of response 2 points for Option 2
0 points for any other option 2
14 Which three items are LCP options that can be configured for PPP? (Choose
three.)
CHAP
Stacker
IPCP
CDPCP
Multilink
15 At what point in the PPP connection process does the authentication phase occur?
Refer to the exhibit. Why are the routers unable to establish a PPP session?
17
Refer to the exhibit. What would be the result of entering the exhibited configuration
on a Frame Relay router?
18
Refer to the exhibit. What is placed in the address field in the header of a frame that
will travel from the DC office of ABC Company to the Orlando office?
19 A company uses a PVC with a committed information rate (CIR) of 128 kb/s and a
committed burst information rate (CBIR) of 64 kb/s. The link is used to periodically
send updates at a rate of 144 kb/s. What will happen to the update traffic?
The traffic will be sent, but the company will be charged a penalty.
The traffic will be sent using the additional CBIR and will be guaranteed delivery.
The traffic will be dropped at the CO for exceeding the committed information rate.
The traffic will be sent, but the burst traffic will be marked for discard if congestion is
encountered.
20 Which two functions are provided by the Local Management Interface (LMI) that
is used in Frame Relay networks? (Choose two.)
flow control
error notification
congestion notification
the mapping of DLCIs to network addresses
the sending of keepalive packets to verify operation of the PVC
21
Refer to the exhibit. You are a network administrator who has been tasked with
completing the Frame Relay topology that interconnects two remote sites. How
should the point-to-point subinterfaces be configured on HQ to complete the
topology?
22
Refer to the exhibit. Branch A has a Cisco router. Branch B has a non-Cisco router set
for IETF encapsulation. After the commands shown are entered, R2 and R3 fail to
establish the PVC. The R2 LMI is Cisco, and the R3 LMI is ANSI. The LMI is
successfully established at both locations. Why is the PVC failing?
23
Neighboring routers should use DLCI 177 to reach the Branch r outer.
DLCI 177 will be used to identify all broadcasts that are sent out the Branch router.
The Branch router has the address 192.168.3.1 configured for the S0/0/0 interface.
To reach 192.168.3.1, the Branch router will use the virtual circuit that is identified by
DLCI 177.
Observable Description Max Value
1 correctness of response 2 points for Option 4
0 points for any other option 2
24
Refer to the exhibit. Which statement is true about the status of the Frame Relay
connection?
Wi-Fi
WiMAX
satellite
Metro Ethernet
27
Refer to the exhibit. A packet is being sent from Host A to Host B through the VPN
tunnel between R1 and R3. When the packet first arrives at R3, what are the source
and destination IP addresses of the packet?
31 What will be the result of the enable secret command when added at the global
configuration mode on the router?
It will use MD5 encryption to protect the privileged EXEC level access.
It will use type 7 encryption and will encrypt only the privileged EXEC level
passwords.
It will use type 7 encryption to prevent all passwords that are displayed on the screen
from being readable.
It will use MD5 encryption to protect the passwords that are only used in the PAP and
CHAP authentication process.
32
Refer to the exhibit. A network administrator is trying to backup the IOS software on
R1 to the TFTP server. He receives the error message that is shown in the exhibit, and
cannot ping the TFTP server from R1. What action can help to isolate this problem?
33 A network technician accidentally deleted the IOS image from flash and rebooted
the router. Which two options can be used to restore the IOS image? (Choose two.)
34
Refer to the exhibit. The network administrator creates a standard access control list
to prohibit traffic from the 192.168.1.0/24 network from reaching the 192.168.2.0/24
network while still permitting Internet access for all networks. On which router
interface and in which direction should it be applied?
36
Refer to the exhibit. Which two statements correctly describe how Router1 processes
an FTP request that enters interface S0/0/0 and is destined for an FTP server at IP
address 192.168.1.5? (Choose two.)
37
Refer to the exhibit. An ACL numbered 101 already exists on this router. What
happens if the network administrator issues the commands that are shown in the
exhibit?
38
Refer to the exhibit. What is the effect of the extended ACL when applied inbound on
the S0/0/0 interface on R2?
All IP traffic will be permitted during the specified days and time range.
Both IP and Telnet traffic will be permitted during the specified days and time range.
Only Telnet traffic destined for 172.16.10.0/24 will be permitted during the specified
days and time range.
Telnet traffic will be permitted only during the specified days and time range. All
other network traffic will be permitted any time.
39 Which wildcard mask would specify all IP addresses from 192.168.8.0 through
192.168.15.255?
0.0.0.7
0.0.7.255
0.0.8.255
0.0.15.255
0.0.255.255
40
Refer to the exhibit. The SSH connections between the remote user and the server are
failing. The correct configuration of NAT has been verified. What is the most like ly
cause of the problem?
41 A network administrator added two switches and a new VLAN over the past
weekend. How can the administrator determine if the additions and changes
improved performance and availability on the company intranet?
Perform a baseline test and compare the current values to values that were obtained
in previous weeks.
Interview departmental secretaries and determine if they think load time for web
pages is improved.
Compare the hit counts on the company web server for the current week to the values
that were recorded from previous weeks.
Performance on the intranet can be determined by monitoring load times of company
web pages from remote sites.
42 A company has its headquarters office in Dallas and five branch offices located in
New York, Chicago, Los Angeles, Seattle, and Atlanta. WAN links are used for
communications among offices in six sites. In planning the WAN links, the network
designer is given two requirements: (1) minimize cost and (2) provide a certain level
of WAN link reliability with redundant links. Which topology should the network
designer recommend?
star
full mesh
hierarchical
partial mesh
43
Refer to the exhibit. Router1 and Router2 each support separate areas of a data
center, and are connected via a crossover cable. Resources attached to Router1 are
unable to connect to resources attached to Router2. What is the likely cause?
application
transport
network
data link
45
Refer to the exhibit. A network technician has been called in to resolve a problem
with this network segment. The symptoms include a loss of connectivity throughout
the network segment, high link utilization, and syslog messages that indicate constant
MAC address relearning. What is the likely cause of these symptoms?
cable fault
faulty NIC card
IP addressing error
spanning tree problem
NAT configuration error
46
Refer to the exhibit. The corporate network that is shown has been assigned network
172.16.128.0/19 for use at branch office LANs. VLSM is not being used. Which subnet
mask will allow the most efficient utilization of IP addresses?
/21
/22
/23
/24
/25
/26
47
Refer to the exhibit. Which VLAN will carry untagged traffic on FastEthernet 0/1?
VLAN 1
VLAN 2
VLAN 11
VLAN 12
VLAN 30
VLAN 999
48
Refer to the exhibit. In the partial router configuration that is shown, what is the
purpose of access list BLOCK_XYZ?
49
Refer to the exhibit. Routers R1 and R2 are both configured for single area OSPF.
Users who are connected to switch S1 are unable to access database applications that
run on servers that are connected to S2. The network engineer is working remotely
and only has the information that is shown in the ex hibit to direct initial
troubleshooting efforts. Based on the exhibit, which OSI layer is the most appropriate
to start with for a divide-and-conquer approach?
network layer
application layer
data-link layer
physical layer
50
Refer to the exhibit. An administrator has added the exhibited commands to routers
A and B, but no routing updates are exchanged between the two routers. Based on the
information that is given, what is the likely cause of the problem?