Você está na página 1de 10

1 What is used by a routing protocol to determine the best path to

include in the routing table?


Convergence time
Default distance
**Metric
Type of router

2 Which transport layer protocol will allow segments to be exchang


ed between two hosts with low overhead and no mechanism for retransmission?
IP
FTP
TCP
**UDP
SMTP

3 What is the maximum unrepeated distance set by industry standard


s for UTP cable?
10 meters
75 meters
**100 meters
325 meters

4 What is the default encapsulation for serial interfaces on Cisco


routers?
**PPP
SLIP
HDLC
Frame Relay

5 Which statement is true about the reverse lookup DNS zone?


It is most commonly experienced when users are surfing the Internet.
It is the backup for the forward lookup zone.
It dynamically updates the resource records.
**It resolves an IP address to a fully qualified domain name.

6 A building has experienced a power outage. When the power return


s, none of the devices on one floor can access the Internet. The network adminis
trator checks the switch in the IDF that these devices are connected to and note
s that the SYST LED on the front of the switch is amber.
What is a possible cause of this problem?
The switch is functioning properly.
**The switch has failed POST.
The switch configuration file was not saved to NVRAM.
The connection between the switch and the server did not autonegotiate s
peed and duplex properly.
7 What is the default encapsulation for serial interfaces on Cisco
routers?
The DNS server will use more WAN bandwidth.
The DNS server will only answer recursive queries.
The DNS server will be authoritative for only one zone.
The DNS server will resolve most queries more quickly.
8 A network technician wants to restore a backup copy of the saved
configuration file on a router from a TFTP server. After restoring the file fro
m the TFTP server, the technician reloads the router and finds that it still has
the old configuration file instead of the restored file. What could have caused
this?
The technician entered the command delete flash: before reloading the ro
uter.
The technician entered the command boot system rom before reloading the
router.
The technician entered the command erase startup-config before reloading
the router.
**The technician failed to enter the command copy running-config startup
-config before reloading the router.
9
Refer to the exhibit. What does the ^ symbol indicate?
It marks the end of an error message and an insert point for a new comma
nd.
It marks the beginning of an error message and an insert point for a new
command.
It marks a point in the command string where there is an incorrect or un
recognized character.
It marks a point in the command string where a parameter has to be enter
ed to complete the command configuration.

10 Which encapsulation method supports automatic IP address assignm


ent via the option IP Negotiated, when SDM is used to configure WAN connections
on a router?
**PPP
HDLC
Ethernet
Frame Relay
11 How do port filtering and access lists help provide network secu
rity?
**They prevent specified types of traffic from reaching specified networ
k destinations.
They alert network administrators to various type of denial of service a
ttacks as they occur.
They prevent viruses, worms, and Trojans from infecting host computers a
nd servers.
They enable encryption and authentication of confidential data communica
tions.
12 For the OSI model and protocols, what best describes the process
of encoding?
acknowledging packet delivery at the destination host
breaking a message down into smaller segments and adding a header to the
segments
inserting the source and destination address into a packet to route it t
hrough the network
**ensuring that a message is placed in a format that can be understood b
y the application that is running on the destination host

13
Refer to the exhibit. Which combination of cables and symbols is correct?
A - crossover, B - straight-through, C - straight-through
A - crossover, B - rollover, C - straight-through
**A - straight-through, B -crossover, C - straight-through
A - straight-through, B -straight-through, C - straight-through
A - straight-through, B - straight-through, C - crossover
A - rollover, B - straight-through, C - straight-through
14 Which combination of network address and subnet mask allows 62 h
osts to be connected in a single subnet?
Network address 10.1.1.4 Subnet mask 255.255.255.240
Network address 10.1.1.0 Subnet mask 255.255.255.252
**Network address 10.1.1.0 Subnet mask 255.255.255.192
Network address 10.1.1.4 Subnet mask 255.255.255.248
15 To manage a Cisco switch using Telnet, where would the managemen
t IP address be configured on the switch?
**VLAN 1 interface
first vty port
first trunk port
console port
FastEthernet 0/1 interface

16
Which cable type is used to interconnect the FastEthernet interfaces of two rout
ers?
straight-through
**crossover
console
rollover
17
What is a feature of PAT?
It maps IP addresses to URLs.
It displays private IP addresses to public networks.
It sends acknowledgments of received packets.
**It allows multiple hosts on a single LAN to share globally unique IP a
ddresses.
18

Refer to the exhibit. Which subnet mask would accommodate the number of hosts sh
own for each subnetwork with the least amount of IP addresses wasted?
255.255.0.0
255.255.255.192
**255.255.255.224
255.255.255.240
255.255.255.248
19
Which three statements are true of an incremental backup? (Choose three.)
A restore requires the last full backup.
An incremental backup makes performing full backups unnecessary .
An incremental backup saves all changed files since the last full backup
.
**An incremental backup saves only files changed since last incremental
backup.
**A restore requires all incremental backups since the last full backup.
**An incremental backup takes longer to backup the same amount of data c
ompared to performing a full or differential backup.
20
What are three features of the TCP protocol? (Choose three.)
**It provides retransmission of data packets if they are lost during tra
nsmission.
It is a connectionless protocol.
**It uses a three-way handshake between the sending and receiving system
s to establish each conversation.
**It specifies how messages are reassembled at the destination host.
It requires only 8 bytes of overhead.
It breaks the data packet into datagrams.
21

Refer to the exhibit. The network administrator of the building in the graphic n
eeds to choose the type of cable best suited to add ServerB to the network. Whic
h cable type is the best choice?
STP
UTP
coaxial
**fiber optic
22

Refer to the exhibit. Which statement correctly identifies the OSI layer and pos
sible reason that Serial 0/0/0 is down?
Layer 1 - cable is not plugged in correctly
Layer 1 - no shutdown command not entered
Layer 2 - clock rate not set
Layer 2 - incorrect encapsulation is configured on the WAN link
Layer 3 - incorrect IP addresses was configured on the interface
Layer 3 - network statement is missing from the routing protocol configu
ration
23
A company functions from Monday to Friday each week. Their backup strategy calls
for full backups each Friday night, with differential backups on all other week
day nights. If an administrator is asked to restore a server hard drive to its W
ednesday morning state, how many backups must be used?
1
**2
3
4
24
Which type of WAN connection uses a circuit-switched network?
**ISDN
Frame Relay
DSL
Cable
25

Refer to the exhibit. A ping 192.168.1.20 command is issued on workstation A to


determine if workstation B can be reached. What two events will occur if this co
mmand is successful? (Choose two.)
The router will reply to the echo request with a proxy ping response.
Workstation A will send a UDP ping request message to workstation B.
The router will send a TCP acknowledgment message to workstation A.
Workstation B will send a UDP ping reply message to the router.
**Workstation A will send an ICMP echo request message to workstation B.
**Workstation B will send an ICMP echo reply message to workstation A.
26
To protect the data of its customers, an ISP applies the security principle of l
east privilege within its organization and network. What is the principle of lea
st privilege?
Encrypt only mission-critical data.
**Give employees access only to the resources that they need.
Restrict file and folder access to system administrators only.
Use the smallest possible number of servers to share files and folders.
27

Refer to the exhibit. What does the highlighted value 120 represent?
the number of hops between the router and network 10.0.5.0
**the administrative distance of the routing protocol
the UDP port number that is used for forwarding traffic
the bandwidth that is allocated to the serial interface
28
A user is able to ping IP addresses but is unable to ping hosts by domain name.
What should be checked at the workstation of the user?
the device driver configuration of NIC
the LED status of the NIC
**the DNS configuration
the firewall settings
29

Refer to the exhibit. Router Left is unable to ping router Right. The show inter
faces serial 0/0/0 command indicates that the interface is up but the line proto
col is down on both routers. Which action could be taken to establish connectivi
ty between the two routers?
Configure S0/0/1 instead of S0/0/0 on router Right.
Enter the encapsulation hdlc command on router Right.
Contact the service provider to report that the circuit is down.
Contact the service provider to enable PPP on the WAN circuit.
Enter the no encapsulation ppp command on router Left S0/0/0.
30
A small company has contracted with its ISP for web hosting. Which two items wou
ld be included in the SLA for this service? (Choose two.)
performance
web server cost
**service availability
operating system on the web server
web server model and configuration
31

Refer to the exhibit. Users at the branch office complain that they cannot downl
oad files from the FTP server that is located at the company headquarters (HQ).
Which three troubleshooting steps would be appropriate, in the order from first
step to the last, if a technician troubleshoots the problem by using the divide-
and-conquer method?
steps 1, 3, and 6
steps 1, 4, and 6
steps 2, 3, and 7
steps 4, 5, and 6
32

Refer to the exhibit. A new branch office has been added to the corporate networ
k and a new router is to be installed to allow branch office users to access the
database server at headquarters. How should the serial 0/0/0 interface of the n
ew branch office router be configured to connect to the headquarters router?
branch_23(config-if)# ip address 192.168.5.19 255.255.255.240
branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation hdlc
branch_23(config-if)# ip address 192.168.5.25 255.255.255.240
branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation ppp
branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation ppp
branch_23(config-if)# ip address 192.168.5.33 255.255.255.240
branch_23(config-if)# encapsulation ppp
**branch_23(config-if)# ip address 192.168.5.21 255.255.255.240
branch_23(config-if)# no shutdown
33
A user reports being unable to access the Internet. The help desk technician emp
loys a bottom-up approach to troubleshooting. The technician first has the user
check the patch cable connection from the PC to the wall, and then has the user
verify that the NIC has a green link light. What will the technician have the us
er do next?
Enter an IP address into the WWW browser address bar to see if DNS is at
fault.
Use traceroute to identify the device along the path to the ISP that may
be at fault.
**Verify the IP address, subnet, and gateway settings using ipconfig on
the PC.
Connect to the user home router to check firewall settings for blocked T
CP ports.
34
Refer to the exhibit. A new router has been configured for the first time with t
he commands that are displayed. Which two facts can be determined about the inte
rface of this router? (Choose two.)
It will act as a DCE device.
It is administratively down.
It will operate at a speed of 6.4 Mb/s.
It is the first interface on slot 0 of controller 1.
Because MOTD is not configured, the interface will not work.

35
A network engineer has been asked to design a new structured cable system. What
should be the first step in the project?
**Obtain an accurate floor plan.
Identify all potential sources of EMI.
Sketch the proposed network design.
Determine the locations of all network devices.
36
The show ip route command was executed on one of the routers shown in the graphi
c and the following output was displayed:
C 192.168.4.0/24 is directly connected, Serial0/0
R 192.168.5.0/24 [120/1] via 192.168.4.2, 00:00:19, Serial0/0
R 192.168.1.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1
R 192.168.2.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1
C 192.168.3.0/24 is directly connected, Serial0/1
From which router was this command executed?
A
**B
C
D

37
The command copy tftp running-config has been entered on the router. What will t
his command do?
copy the configuration in RAM to a server
**copy the configuration file from a server to RAM
copy the configuration file in NVRAM to RAM
copy the configuration file in NVRAM to a server
copy the configuration file from a server to NVRAM
38
Refer to the exhibit. Host H1 is sending a datagram to host H2 across the Intern
et. NAT will be configured on RTRC. Which address is considered the inside local
address?
10.1.1.1
10.1.1.6
209.165.201.2
209.165.201.17
209.165.200.226
39
Refer to the exhibit. Devices need to connect to the file server from remote net
works. What method should be used to provide the file server with an IP address
to allow these connections?
static NAT
static PAT
dynamic NAT
**dynamic PAT
40
What is the purpose of the routing process?
to encapsulate data that is used to communicate across a network
**to select the paths that are used to direct traffic to destination net
works
to convert a URL name into an IP address
to provide secure Internet file transfer
to forward traffic on the basis of MAC addresses
41
What is the effect of issuing the hostname RouterA command on a router?
A description will be configured on the router interfaces identifying th
em as belonging to RouterA.
The router will attempt to establish a connection to the host with the n
ame RouterA.
The router will map an IP address to the domain name RouterA.
*The router prompt will change from Router(config)# to RouterA(config)#
42
Which service team in an ISP is responsible for determining if the new customer
has hardware that will support the new WAN connection and if new WAN circuits ne
ed to be installed?
customer service
onsite installation
**planning and provisioning
network operations center

43
In the relationship between an ISP and a customer, what is the purpose of an SLA
?
It shows bandwidth utilization over time.
**It documents expectations and obligations of both parties.
It helps technicians locate sources of service interruptions.
It provides performance baselines for network troubleshooting.
44
In a structured cable system, which term describes the cable that connects the w
all jack in the user work area to the patch panel in the wiring closet?
patch cable
vertical cable
**horizontal cable
backbone cable
45
When would TFTP in ROM monitor mode be used to restore a Cisco IOS image to a ro
uter?
when a console connection is the only available connection to the router
when the TFTP server software is incompatible with the router IOS versio
n
**when the router is set to boot from flash, but the Cisco IOS image in
flash is corrupt or has been erased
when the current Cisco IOS on the router requires a feature upgrade

46

Refer to the exhibit. Which two statements describe the data conversation shown?
(Choose two.)
**The data conversation was started by the HTTP application process runn
ing on the client.
The data conversation is identified by TCP port 80 on the client.
The user started the data conversation by sending an e-mail.
The IP address of the Internet server is 192.168.17.43.
**The Internet server will send data to port 8547 on the client.
47
Which protocol allows secure in-band management so that a network administrator
can monitor and configure network devices without fear of any passwords being co
mpromised?
**SSH
HTTP
SNMP
Telnet
48

Refer to the exhibit. A network administrator is troubleshooting the serial conn


ection between R1 and R2. There is no communication between R1 and R2. Based on
the output of the show ip interface brief command, what is the cause of the prob
lem?
**There is a misconfiguration of IP addresses.
There is a mismatch of encapsulation methods.
The no shutdown command should be issued on R2.
The routing protocols are not compatible.
49
Which question provides troubleshooting information about a problem at Layer 1 o
r Layer 2 of the OSI model?
Can the server be reached through Telnet?
Is there a firewall that is configured on the PC?
**Is there a link light on the network card?
What addresses are configured in the TCP/IP settings?
50
What is a characteristic of a scalable network?
100% uptime
redundant links
**easy expansion
multiple backup devices
51
What is a characteristic of UDP?
It is a reliable transport protocol.
It requires the source host to resend packets that are not acknowledged.
**It adds a minimal amount of overhead to the data to be transmitted.
It is a connection-oriented protocol.

52

Refer to the exhibit. What effect will the commands have when entered on R2?
The cisco1 file will be copied to NVRAM.
The commands will not work because a password has not been set on the TF
TP server.
The running configuration will be copied from R2 to the TFTP server.
The cisco1 file will be copied from the TFTP server to the running confi
guration of R2.

Você também pode gostar