Você está na página 1de 2

1). What are two purposes of DNS? (Choose two.

)
- to resolve human-readable domain names to numeric IP addresses - to replace the static HOSTS file with a more practical dynamic system 4). How does TCP ensure the reliable transfer of data? - TCP uses the SYN-ACK portion of the three-way handshake to ensure that all data has been received. 5). A new router is connected to an existing network. Which two tasks must be completed on the new router to include it in the dynamic routing process? (Choose two.) - Assign an appropriate IP address and subnet mask to the serial interface. - Update the ip host configuration information with the device name and new interface IP address. 6). When customers use credit cards to make purchases at a small business, a modem is heard dialing a telephone number to transfer the transaction data to the central office. What type of WAN serial connection is in use? - circuit switched 7). A hacker attempts to reach confidential information that is stored on a server inside the corporate network. A network security solution inspects the entire packet, determines that it is a threat, and blocks the packet from entering the inside network. Which security measure protected the network? - an IPS 8). A network administrator is configuring a DTE serial interface on a 1841 router. The serial interface is installed in the first controller, second slot, first port, with an IP address from the 192.168.1.8 /30 network. Which set of commands correctly configures this interface? - Router(config)# interface serial 0/1/1 Router(config-if)# ip address 192.168.1.10 255.255.255.252 Router(config-if)# clock rate 64000 Router(config-if)# no shutdown 9). A company is developing an Internet store for its website. Which protocol should be used to transfer credit card information from customers to the company web server? - HTTPS 12). What are three characteristics of the TCP protocol? (Choose three.) - is responsible for breaking messages into segments and reassembling them at their destination - creates a virtual session between end-user applications - forces the retransmission of unacknowledged packets 13). A user is attempting to do an http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.) - DNS server HTTP server 14). A network administrator is asked to design a system to allow simultaneous access to the Internet for 250 users. The ISP can only supply five public IP addresses for this network. What technology can the administrator use to accomplish this task? - port-based Network Address Translation 15). A client at a workstation with IP address 192.168.1.201/24 connects to a web server with IP address 192.168.1.254/24. Which two statements describe the transmission of a request for a web page as it is sent from the web browser to the web server? (Choose two.) - The source socket is 192.168.1.201:80. -The destination socket is 192.168.1.254:80. 18). A network technician is using a network management station to gather data about the performance of devices and links within the ISP. Which application layer protocol makes this possible? - SNMP 19) How does a switch interface that uses sticky port security handle MAC addresses? - They are configured dynamically and are saved in the running configuration.

23). Which two commands ensure that any password that permits access to the privileged EXEC mode is not shown in plain text when the configuration files are displayed? (Choose two.) - Router(config)# enable secret cisco - Router(config)# service password-encryption 24). Why are port numbers included in the TCP header of a segment? - to enable a receiving host to forward the data to the appropriate application 25). Which two subnet masks could be used when subnetting a Class B IP address? (Choose two.) -255.255.192.0 -255.255.0.0 26). Which two statements are true about the use of the debug ip rip command on a Cisco router? (Choose two.) - The debug ip rip command can be issued at the user EXEC configuration mode. - The debug ip rip command displays RIP routing activity in real time. 27). Which mode does a router enter when no configuration file is located in NVRAM? - global configuration 28). A customer reports connectivity problems to an ISP technician. Upon questioning the customer, the technician discovers that all network applications are functioning except for FTP. What should the technician suspect is the problem? - misconfigured firewall 34). A Catalyst switch is used as a temporary replacement for another switch that needs to be repaired. About a minute after the switch has started, the SYST LED on the front of the switch transitions from blinking green to amber. What is the meaning of the amber SYST LED? - The switch has failed POST and must be sent for service. 37). Which type of address is 192.168.17.111/28? - broadcast address 39). Which two protocols allow network devices to report their status and events to a centralized network management device? (Choose two.) -syslong - SNMP 40). How do port filtering and access lists help provide network security? - They prevent specified types of traffic from reaching specified network destinations. 42). How many host addresses may be assigned on each subnetwork when using the 130.68.0.0 network address with a subnet mask of 255.255.248.0? - 2046 43). A user reports being unable to access the Internet. The help desk technician employs a bottom-up approach to troubleshooting. The technician first has the user check the patch cable connection from the PC to the wall, and then has the user verify that the NIC has a green link light. What will the technician have the user do next? - Verify the IP address, subnet, and gateway settings using ipconfig on the PC. 45). What is used by a routing protocol to determine the best path to include in the routing table? - Metric 47). Which two processes enable a router to determine paths to destination networks? (Choose two.) - manual configuration of routes - updates from other routers

Você também pode gostar