Escolar Documentos
Profissional Documentos
Cultura Documentos
Take Assessment - EWAN Final Exam - CCNA Exploration: Accessing the a customer router. What will be the result of this process?
WAN (Version 4.0)
Traffic is only accepted from and forwarded to SDM-trusted Cisco routers.
1 Which three guidelines would help contribute to creating a strong
password policy? (Choose three.) Security testing is performed and the results are saved as a text file stored
in NVRAM.
Once a good password is created, do not change it.
All traffic that enters the router is quarantined and checked for viruses
***Deliberately misspell words when creating passwords. before being forwarded.
***Create passwords that are at least 8 characters in length. ***The router is tested for any potential security problems and all
recommended security-related configuration changes will be automatically
***Use combinations of upper case, lower case, and special characters. applied.
Use long words found in the dictionary to make passwords that are easy to checksum
remember.
digital certificates
2 Refer to the exhibit. Based on the output as shown, which two ***encapsulation
statements correctly define how the router will treat Telnet traffic that
comes into interface FastEthernet 0/1? (Choose two). ***encryption
Telnet to 172.16.0.0/24 is permitted. 5 Refer to the exhibit. A network administrator is tasked with completing
the Frame Relay topology that interconnects two remote sites. How should
***Telnet to 172.16.10.0/24 is permitted. the point-to-point subinterfaces be configured on HQ to complete the
topology?
Telnet to 172.16.20.0/24 is permitted.
frame-relay interface-dlci 103 on Serial 0/0/0.1
frame-relay interface-dlci 203 on Serial 0/0/0.2
***frame-relay interface-dlci 301 on Serial 0/0/0.1
frame-relay interface-dlci 302 on Serial 0/0/0.2 ***Each network protocol has a corresponding NCP.
frame-relay map ip 192.168.1.1 103 broadcast on Serial 0/0/0.1 NCP establishes the initial link between PPP devices.
frame-relay map ip 192.168.2.2 203 broadcast on Serial 0/0/0.2
NCP tests the link to ensure that the link quality is sufficient.
frame-relay map ip 192.168.1.1 301 broadcast on Serial 0/0/0.1
frame-relay map ip 192.168.2.2 302 broadcast on Serial 0/0/0.2
6 An administrator is configuring a dual stack router with IPv6 and IPv4 9 Refer to the exhibit. This serial interface is not functioning correctly.
using RIPng. The administrator receives an error message when trying to Based on the output shown, what is the most likely cause?
enter the IPv4 routes into RIPng. What is the cause of the problem?
improper LMI type
When IPv4 and IPv6 are configured on the same interface, all IPv4
addresses are over-written in favor of the newer technology. interface reset
Incorrect IPv4 addresses are entered on the router interfaces. ***PPP negotiation failure
7 Refer to the exhibit. All devices are configured as shown in the exhibit. 10 What is the result when the command permit tcp 10.25.132.0 0.0.0.255
PC1 is unable to ping the default gateway. What is the cause of the any eq smtp is added to a named access control list and applied on the
problem? inbound interface of a router?
The default gateway is in the wrong subnet. TCP traffic with a destination to the 10.25.132.0/24 is permitted.
STP has blocked the port that PC1 is connected to. Only Telnet traffic is permitted to the 10.24.132.0/24 network
***Port Fa0/2 on S2 is assigned to the wrong VLAN. Ttraffic from 10.25.132.0/24 is permitted to anywhere on using any port.
S2 has the wrong IP address assigned to the VLAN30 interface. ***Traffic using port 25 from the 10.25.132.0/24 is permitted to all
destinations.
12 Which Layer 2 access method separates traffic into time slots and is 15 Which statement accurately describes a role that is played in
specified by DOCSIS for use with cable high speed Internet service? establishing a WAN connection?
***TDMA ISDN and ATM are circuit-switched technologies that are used to establish
on demand a path through the service provider network.
FDMA
***Data link layer protocols like PPP and HDLC define how data is
CDMA encapsulated for transmission across a WAN link.
13 Which additional functionality is available on an interface when the Frame Relay switches are normally considered to be customer premises
encapsulation is changed from HDLC to PPP? equipment (CPE) and are maintained by local administrators.
flow control
16 The Cisco IOS on a particular Cisco router has been corrupted. When
error control the router boots into the ROMMON mode, what is one resource that the
network technician needs to use in order to restore the Cisco IOS?
***authentication
an authenticated username
synchronous communication
a TFTP server
14 During the initial configuration of a router, the administrator enters the a serial connection to the Internet
command no service config. How will the router behave as a a result of this
the secret password of the router
The network is shared using a logical bus topology.
***access to a backup IOS software image that is stored in DRAM on the
router ***Bandwidth is dependent on the number of concurrent users.
17 Refer to the exhibit. What happens if the network administrator issues Transfer rates are dependent on the length of the local loop.
the commands shown when an ACL called Managers already exists on the
router?
20 Refer to the exhibit. EIGRP has been configured as a routing protocol on
The commands overwrite the existing Managers ACL. the network. Users on the 192.168.1.0/24 network should have full access
to the web server that is connected to 192.168.3.0/24 but should not be
***The commands are added at the end of the existing Managers ACL. allowed to telnet to router R3. Verifying the configuration, the network
administrator realizes that users on network 192.168.1.0/24 can
The network administrator receives an error stating that the ACL already successfully telnet to the router. What should be done to remedy the
exists. problem?
The commands will create a duplicate Managers ACL containing only the ***The ACL 101 statements 10 and 20 should be reversed.
new commands being entered.
The ACL 101 should be applied on R3 VTY lines 0 4 in the inbound
direction.
18 What can a network administrator do to recover from a lost router
password? The ACL 101 should be applied on R3 VTY lines 0 4 in the outbound
direction.
use the copy tftp: flash: command
The ACL 101 should be applied on R3 Serial0/0/1 interface in the outbound
boot the router to bootROM mode and enter the b command to load the direction.
IOS manually
The ACL 101 statement 10 should be changed to: permit ip 192.168.1.0
telnet from another router and issue the show running-config command to 0.0.0.255 any
view the password
***boot the router to ROM monitor mode and configure the router to
ignore the startup configuration when it initializes 21 What will be the result of the enable secret command when added at
the global configuration mode on the router?
19 Which statement is true of DSL? ***It will use MD5 encryption to protect the privileged EXEC level access.
It is typically deployed in a mesh topology. It will use type 7 encryption and will encrypt only the privileged EXEC level
passwords.
PAP
It will use type 7 encryption to prevent all passwords that are displayed on
the screen from being readable. CHAP
It will use MD5 encryption to protect the passwords that are only used in
the PAP and CHAP authentication process. 24 Which statement is true about wildcard masks?
22 Refer to the exhibit. EIGRP has been configured as a routing protocol on A wildcard mask performs the same function as a subnet mask.
the network. Users on the 192.168.1.0/24 network should be able to
establish a TFTP connection to the file server on the 192.168.3.0/24 A wildcard mask of 0.0.0.0 means the address should match exactly.
network for file backup. The users complain that they do not have the
required access. What is the possible cause of the problem? A wildcard mask uses a "1" to identify IP address bits that must be
checked.
TFTP uses UDP as a transport protocol. UDP is not allowed by the ACL 120.
TFTP uses SMTP as a transport protocol. SMTP is blocked by statement 10 25 Refer to the exhibit. Partial results of the show ip access-list and show ip
in the ACL 120. interface Fa0/1 commands for router R3 are shown. There are no other
ACLs in effect. Host A is unable to telnet to host B. Which two actions will
TFTP uses TCP as a transport protocol. TCP is blocked by statement 20 in correct the problem but still restrict other traffic between the two
the ACL 120. networks? (Choose two.)
***TFTP uses ICMP as a transport protocol. ICMP is blocked by statement Apply the ACL in the inbound direction on Fa0/0 interface.
30 in the ACL 120.
***Apply the ACL in the outbound direction on Fa0/0 interface.
***PPP
26 Refer to the exhibit. Which statement correctly describes how Router1
***SLIP processes an FTP request packet that enters interface S0/0/0, and is
destined for an FTP server at IP address 172.16.1.5?
The router matches the incoming packet to the statement that is created
by access-list 201 permit ip any any command and allows the packet into Refer to the exhibit. Router1 is not able to communicate with its peer that
the router. is connected to this interface. Based on the output as shown, what is the
most likely cause?
The router reaches the end of ACL 101 without matching a condition and
drops the packet because there is no statement that was created by interface reset
access-list 101 permit ip any any command.
***unplugged cable
***The router matches the incoming packet to the statement that was
created by the access-list 101 permit ip any 172.16.1.0 0.0.0.255 improper LMI type
command, ignores the remaining statements in ACL 101, and allows the
packet into the router. PPP negotiation failure
The router matches the incoming packet to the statement that was
created by the access-list 201 deny icmp 172.16.1.0 0.0.0.255 any
command, continues comparing the packet to the remaining statements in 29
ACL 201 to ensure that no subsequent statements allow FTP, and then the
router drops the packet.
30
28 What function does LCP perform in the establishment of a PPP session?
***LCP brings the network layer protocols up and down. Contents in NVRAM will be ignored.
33
An administrator learns of an e-mail that has been received by a number of
users in the company. This e-mail appears to come from the office of the
administrator. The e-mail asks the users to confirm their account and
password information. Which type of security threat does this e-mail
31 represent?
An administrator issues the command confreg 0x2142 at the rommon 1>
prompt. What is the effect when this router is rebooted? cracking
34 125
Refer to the exhibit. The corporate network that is shown has been 36
assigned network 172.16.128.0/19 for use at branch office LANs. VLSM is
not being used. Which subnet mask will allow the most efficient utilization
of IP addresses?
Refer to the exhibit. Which data transmission technology is being
***/21 represented?
/22 ***TDM
/23 PPP
/24 HDLC
/25 SLIP
/26
37
35
The 192.168.3.17 address has not been excluded from the 192Network
pool. 40
At what physical location does the responsibilty for a WAN connection
change from the user to the service provider?
***multiprotocol support
***conduct a performance test and compare with the baseline that was ***which addresses are to be translated
established previously.
The West side of town is downloading larger packets. Only results from the software package should be tested as the network is
designed to accommodate the proposed software platform.
***The service provider is closer to the location on the East side.
Scheduling will be easy if the network and software teams work
More clients share a connection to the DSLAM on the West side. independently.
***It will be difficult to isolate the problem if two teams are implementing
changes independently.
43
Results from changes will be easier to reconcile and document if each
team works in isolation.
Refer to the exhibit. Branch A has a non-Cisco router that is using IETF
encapsulation and Branch B has a Cisco router. After the commands that
are shown are entered, R1 and R2 fail to establish the PVC. The R2 LMI is 45
Cisco, and the R1 LMI is ANSI. The LMI is successfully established at both
locations. Why is the PVC failing?
The PVC to R1 must be point-to-point. Refer to the exhibit. R1 is performing NAT overload for the 10.1.1.0/24
inside network. Host A has sent a packet to the web server. What is the
LMI types must match on each end of a PVC. destination IP address of the return packet from the web server?
The frame relay PVCs cannot be established between Cisco and non-Cisco 10.1.1.2:1234
routers.
172.30.20.1:1234
***The IETF parameter is missing from the frame-relay map ip 10.10.10.1
201 command. ***172.30.20.1:3333
192.168.1.2:80
44
A recently patched application server is experiencing response time
problems. The network on which the application server is located has been
experiencing occasional outages that the network team believes may be
related to recent routing changes. Network and application teams have
48
A light manufacturing company wishes to replace its DSL service with a
non-line-of-sight broadband wireless solution that offers comparable
speeds. Which solution should the customer choose?
Wi-Fi
satellite
46 ***WiMAX
What is a characteristic feature of a worm?
Metro Ethernet
***exploits a known vulnerability
BE
47
When configuring a Frame Relay connection, what is the purpose of CIR
Inverse ARP?
***FECN
to assign a DLCI to a remote peer
CBIR
to disable peer requests from determining local Layer 3 addresses
CBIR
51
Refer to the exhibit. What is placed in the address field in the header of a
frame that will travel from the San Jose router to the DC router?
DLCI 103
***DLCI 301
172.16.1.18
172.16.1.19
52
What are three attributes of a security policy? (Choose three.)