Escolar Documentos
Profissional Documentos
Cultura Documentos
net
a small ISP with a single Internet connection through a larger ISP
18
debug ip rip
show ip route
show ip interface
show ip protocols
19
Why is fast convergence desirable in networks that use dynamic routing
protocols?
Routers will not allow packets to be forwarded until the network has
converged.*********
Hosts are unable to access their gateway until the network has converged.
Routers may make incorrect forwarding decisions until the network has
converged.
Routers will not allow configuration changes to be made until the network has
converged.
20
They are identified in the routing table with the prefix S*****
shutdown.
21
Which two statements or sets of statements describe differences between link-
state and distance vector routing protocols? (Choose two.)
Link-state routing protocols routinely use more bandwidth for updates than do
distance vector routing protocols.
Distance vector routing protocols update all routers at one time. Link-state
routing protocols update one router at a time.
Link-state routers only know about directly connected routers. Distance vector
routers know about every router in the network.***
Link-state routing protocols update when a change is made. A network using
distance vector routing protocols only updates at a specific interval.*****
Distance vector routing protocols have limited information about the entire
network. Link state routing protocols know about all routers in the network.
22
BGP*****
EIGRP
OSPF
Cisco-Training.net
RIP
23
Hosts on two separate subnets cannot communicate. The network administrator
suspects a missing route in one of the routing tables. Which three commands can
Ping****
show arp
Traceroute***
show ip route***
show interface
24
What term refers to a group of networks that uses the same internal routing
Internet
intranet
autonomous system****
42
A network technician is using a network management station to gather data
about the performance of devices and links within the ISP. Which application
layer protocol makes this possible?
SNMP
FTP
DHCP
SMTP
43
computers
to assign TCP port numbers to hosts as part of the data transfer process
to resolve human-readable domain names to numeric IP addresses
to replace the static HOSTS file with a more practical dynamic system
44
A hacker attempts to reach confidential information that is stored on a server
inside the corporate network. A network security solution inspects the entire
packet, determines that it is a threat, and blocks the packet from entering the
inside network. Which security measure protected the network?
an IDS
an IPS
a host-based firewall
Anti-X software
Cisco-Training.net
45
How many host addresses may be assigned on each subnetwork when using the
130.68.0.0 network address with a subnet mask of 255.255.248.0?
30
256
2046
47
A small tire retailer requires a low-cost WAN connection to its headquarters in
order to manage its inventory and process customer sales in real time. Which
WAN connection type is best suited to its needs?
Sonet
T3
dialup
DSL
leased line
Cisco-Training.net
48
The command copy tftp running-config has been entered on the router. What
will this command do?
49
Refer to the exhibit. The network administrator needs to configure the Fa0/0
interface of RTB so that hosts from RTA can connect to the server that is
attached to RTB. Which two commands will the administrator use to accomplish
this task? (Choose two.)
RTB(config)# no shutdown
RTB(config-if)# no shutdown
RTB(config-if)# ip address 192.168.102.97 255.255.255.252
50
Refer to the exhibit. A NOC technician at an ISP enters the command shown.
What are two reasons to use this command? (Choose two.)