Huruf D Pictures, Images and Photos

Sabtu, 26 Maret 2011

final ccna4-3

1. A small bookstore would like to offer wireless connectivity for customers with laptops. Which wireless components or devices will provide connectivity to the customers with the least possible cost to the bookstore?
*standalone access points
wireless LAN controllers
standalone lightweight access points
lightweight access point and wireless LAN controller

2. What can be broadcast over the wireless network to help a user connect to the network and use wireless services?
*SSID
WEP keys
VLAN parameters
WPA encryption keys
VPN authentication information

3. A company has an IT staff that is not highly trained. What two features or technologies must the network designer identify as training needs in order for the staff to understand the basic operation of VPNs? (Choose two.)
access control lists
*encryption algorithms
Frame Relay configuration
QoS operation
*tunneling protocols
VLAN configuration

4. A large company plans to add several servers and requires that the servers be reachable directly from the Internet. Which action will help the company accomplish this goal?
*Assign to each server a static internal IP address that is mapped statically to a public IP address.
Place all servers in their own Class C private subnet.
Provide a private address to each server using DHCP.
Assign addresses from a pool of public Class B addresses using DHCP.

5. Which technical requirement is satisfied when providing QoS for delay sensitive applications?
*availability
manageability
scalability
security

6. During a review of the proposed bill of materials, an account manager of the network solution company realizes that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than was originally specified by the network designer. When questioned, the systems engineer responds that the switches specified by the designer cannot be purchased within the budget limitations of the customer. Which action should the account manager take?
Inform the customer that the project budget must be increased.
Inform the customer that the project cannot be completed given the unreasonable budget constraints.
*Communicate any risks that are associated with the equipment substitution and obtain customer approval to proceed.
Because the customer is probably aware that the budget limitations will require lower cost, less capable equipment, the account manager should do nothing.

7. Which protocol is enabled by default to dynamically discover and eliminate Layer 2 loops that are created by redundant links between switches?
CDP
DTP
*STP
VTP

8. Which statement describes the use of a network baseline?
It creates a high level logical network diagram.
*It provides a point of reference for future network evaluations.
It allows precise identification of the original location of network equipment.
It should be established as soon as a problem is detected on the network.

9. Refer to the exhibit. The network administrator wishes to use the Cisco Feature Navigator to choose a Cisco IOS image to install on a router that will allow VoIP functionality. Based on the output of the show version command, which statement accurately describes the ability of the router to run the Cisco IOS image selected?
*There is enough DRAM and flash.
There is enough DRAM but not enough flash.
There is not enough DRAM but there is enough flash.
There is not enough DRAM and flash.

10. What information does an administrator require before saving the running configuration from a router to a TFTP server?
router IP address and the name of the configuration file in NVRAM
TFTP server IP address and the size of the configuration file in RAM
*TFTP server IP address and the name of the configuration file that will be saved
router IP address, size of the file and name of the configuration file on the TFTP server
TFTP server IP address, the router IP address, and the router interface through which the file will be loaded

11. If a router is unable to find a suitable IOS to load into RAM, in what mode does the boot process end?
setup mode
user mode
*rommon mode
privileged mode

12. Which command can be used to load a new Cisco IOS image on a router?
copy startup-config tftp:
copy tftp: startup-config
copy running-config tftp:
*copy tftp: flash:
copy flash: tftp:
copy flash: startup-config

13. A WIC-1T module needs to be installed in a Cisco 1841 router that currently has a WIC-2T module in slot 0. What should the network technician do first?
Install the hot-swappable option module.
*Turn off the power to the router before installing the new module.
Remove the WIC-2T module so that the new module can be installed in slot 0.
Shut down all Fast Ethernet ports on the router until the new WIC module installation is complete.
Configure the Cisco IOS software to support an internal trunk link between the two WIC modules.

14. Refer to the exhibit. An administrator installs a WIC-2T module into a Cisco 1841 router. Attempts to configure the S0/0/0 interface are unsuccessful. As a first step in troubleshooting the failure, the administrator issues the show version command. What is a possible reason for the failure?
*The WIC was not physically installed properly.
The WIC was installed into slot 1 instead of slot 0.
The interface type and number are invalid on an 1841.
The configuration register is the wrong value for adding new modules.

15. Which IOS component can be used to classify and monitor network traffic?
CDP
*NBAR
CiscoWorks
Network Assistant

16. Refer to the exhibit. Which type of application communication model best describes this network?
*client-client
client-server farm
client-enterprise edge
client-enterprise server

17. What is a characteristic of FTP traffic flows?
low-volume traffic
predictable bandwidth usage
*large packet sizes for transfers
low throughput with high response-time requirements

18. What is a function of software queuing?
filters traffic on the basis of administrator defined rules
stores received traffic and sends packets based on the order that the packets are received
*sends packets on the basis of priorities that are manually set
transmits packets in a priority sequence that is based on source port

19. In a converged network, which two types of traffic would be categorized as real-time traffic? (Choose two.)
e-mail
file transfer
web browsing
*videoconferencing
*voice over IP
video on demand

20. When implementing an IP telephony solution, why should VLANs be used?
to allow the use of a single IP gateway
*to separate voice from data traffic for ease of prioritization
to allow the PBX to use VLAN IDs to filter both voice and data traffic
to allow connectivity between traditional phone devices and IP-based telephony devices

21. A school district decides to use the 172.30.0.0/16 network for its LAN networks. The network administrator must create an addressing scheme to support 500 users in the admin office, 200 at the high school, 60 at the elementary school and 28 at the district office. Which VLSM addressing scheme will correctly address the network with minimal waste?
172.30.0.0/20 admin
172.30.1.0/21 high school
172.30.1.8/22 elementary
172.30.1.12/26 district
172.30.0.0/22 admin
172.30.4.0/23 high school
172.30.5.0/24 elementary
172.30.6.0/26 district
172.30.0.0/23 admin
172.30.2.0/24 high school
172.30.3.0/26 elementary
172.30.3.64/27 district
*172.30.0.0/23 admin
172.30.2.0/24 high school
172.30.3.0/25 elementary
172.30.3.127/26 district

22. Refer to the exhibit. The routers are configured with RIPv2 with default configurations. When attempting to communicate with other networks, hosts from 172.16.2.0/24 are experiencing connectivity issues. What could be done to resolve this issue?
Change to a public IP address scheme.
*Disable automatic route summarization.
Change the IP network address on R3 Fa0/0 to 172.16.1.128 /26.
Change the subnet mask on the link between R2 and R3 to 255.255.255.0.

23. Refer to the exhibit. A network administrator is validating the routing for the new network design. Which command should be used to configure the s0/0/0 interface of the SALES router to advertise the Sales Department networks as one route?
SALES(config-if)# ip summary-address eigrp 100 172.16.0.0 255.255.0.0
SALES(config-if)# ip summary-address eigrp 100 172.16.8.0 255.255.240.0
*SALES(config-if)# ip summary-address eigrp 100 172.16.16.0 255.255.240.0
SALES(config-if)# ip summary-address eigrp 100 172.16.31.0 255.255.248.0

24. Refer to the exhibit. Which summarized route would be advertised by R1 to R2?
*10.0.0.0/13
10.4.0.0/14
10.5.0.0/13
10.6.0.0/14


25. Which two values represent valid IPv6 addresses? (Choose two.)
::::1
*FF01::1
*0:0:0:0:0:0:0:1
2001:DB8::47::2A4
2031:0000:04AC:3400:FFE3:0

26. A network administrator is integrating IPv6 into an IPv4 network by encapsulating one protocol packet within another protocol. Which transition method is being used?
dual stack
*tunneling
proxying and translation
NAT with Protocol Translator

27. A network administrator is configuring a router interface with the command R1(config-if)# ipv6 address 2001:DB8:C18:1::/64 eui-64. If the MAC address of this Ethernet interface is 01-1C-70-CF-B4-30, what is the host identifier for this interface under EUI-64 format?
11C:7000:00CF:B430
11C:70FE:FECF:B430
*11C:70FF:FECF:B430
11C:70FF:FFCF:B430

28. Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of an access layer switch and connects three PCs to test the configuration. The engineer attempts to ping from each PC to the other connected PCs. Which three statements describe the expected results of pinging from one host to another? (Choose three.)
Host1 can ping Host2.
*Host1 cannot ping Host2.
*Host1 can ping Host3.
Host1 cannot ping Host3.
Host2 can ping Host3.
*Host2 cannot ping Host3.

29. Refer to the exhibit. A network associate is configuring a new router to provide routing between VLANs. The associate removes the router from the box and connects the Fa0/0 interface to a trunking port on the switch. After the configuration is applied to the router, the traffic between VLANs still fails. What is causing this to occur?
The NWRnStick router needs a routing protocol configured.
The NWRnStick router needs additional Fast Ethernet interfaces installed.
*The subinterfaces of the NWRnStick router should have IP addresses applied.
All the subinterfaces of the NWRnStick router should be configured in the same VLAN.

30. When designing a prototype network for a new server farm, a network designer chooses to use redundant links to connect to the rest of the network. Which business goal will be addressed by this choice?
security
scalability
*availability
manageability

31. Refer to the exhibit. A company decides to install a new data center to improve the services available on the network. EIGRP is chosen as a routing protocol. VLAN 100 is the management VLAN. After a prototype network is built, the staff executes basic connectivity tests. The results show very slow convergence after a network failure. Which step should be taken by the engineers to improve the network performance?
Eliminate all trunk links in the network.
*Configure per-VLAN rapid spanning tree.
Configure VLAN 1 as a management VLAN.
At the distribution layer, replace EIGRP with RIPv2.

32. Refer to the exhibit. EIGRP has been configured as a routing protocol in the network. Users who are connected on LAN_1 and LAN_2 can ping their default gateways. Users on LAN_1 complain that they are unable to access the resources on the file server that is connected to LAN_2. A technician issues the show ip interface brief command on R1 to verify the status of the interfaces. What information will help the technician troubleshoot the issue?
*Interface S0/0/1 line protocol is down.
Interface Vlan1 is administratively down.
Interface Fa0/1 is missing an IP address.
Interface S0/0/0 is configured with an incorrect IP address.

33. Refer to the exhibit. During a test of an EIGRP prototype network, a network administrator issues a show ip protocols command. What two facts can be determined from the output? (Choose two.)
The administrative distance is 100.
*This router has one adjacent neighbor.
There are 10 Cisco devices in this prototype network.
The auto-summary command was applied on this router.
*EIGRP is using two values for the calculation of the composite metric.
EIGRP on this router will display up to four unequal cost routes to the same destination.

34. Refer to the exhibit. A NetworkingCompany designer is reviewing a diagram of a customer network. What two risks or issues can be identified in the topology that is shown? (Choose two.)
*The firewall router and ISP connection represent a single point of failure.
*A failure of the switch that connects the Cisco Call Manager to the network will cause the entire IP telephony system to fail.
Using Layer 3 switches to interconnect the data center servers to the IP phones introduces too much delay.
The IP phones need to be redundantly connected to the switches to prevent single points of failure at the access layer.
If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable.

35. On a Monday morning the help desk at a large company receives an unusually high number of calls reporting no connectivity to the Internet or to any other network resources. Otherwise the PCs are functioning normally. Help desk technicians note that all the calls are from a single department, and all affected users are on the same floor of a single building. Where should the help desk technicians suspect that the problem lies?
*workgroup switch
PC power supplies
patch cords from PCs to network jacks
cabling from the network jack to the wiring closet

36. Refer to the exhibit. The named ACL "Managers" already exists on the router. What will happen when the network administrator issues the commands that are shown in the exhibit?
The commands overwrite the existing Managers ACL.
*The commands are added at the end of the existing Managers ACL.
The commands are added at the beginning of the existing Managers ACL.
The network administrator receives an error that states that the ACL already exists.

37. Refer to the exhibit. Which ACL statements, if properly placed, will prevent host 10.10.10.1 from accessing the 172.16.2.0/24 network but will permit the rest of the 10.10.10.0/24 network?
access-list 10 permit 172.16.2.0 0.0.0.255
access-list 10 deny 10.10.10.1 0.0.0.0
access-list 10 deny 10.10.10.1 0.0.0.0
access-list 10 permit 172.16.2.0 0.0.0.255
*access-list 101 deny ip 10.10.10.1 0.0.0.0 172.16.2.0 0.0.0.255
access-list 101 permit ip 10.10.10.0 0.0.0.255 172.16.2.0 0.0.0.255
access-list 101 permit ip 10.10.10.0 0.0.0.255 172.16.2.0 0.0.0.255
access-list 101 deny ip 10.10.10.1 0.0.0.0 172.16.2.0 0.0.0.255
access-list 10 deny 10.10.10.1 0.0.0.0

38. Refer to the exhibit. An extended ACL has been created to deny traffic from host 192.168.20.254 to the web server with IP address 209.165.201.30. However, host 192.168.20.254 is allowed access to all resources on network 192.168.30.0/24. According to Cisco best practices, where should the ACL be applied?
ISP Fa0/0 inbound
ISP Fa0/0 outbound
ISP S0/0/0 inbound
*R2 Fa0/0 inbound
R2 Fa0/0 outbound
R2 S0/1/0 outbound

39. A company is concerned with protecting internal e-commerce servers against external attacks. An application layer firewall is installed at the network edge and a host-based IDS system is installed on the internal LAN. What should be done to ensure a fast response and minimum server downtime in the event of an external attack?
* Replace the host-based IDS with an IPS.
Place the e-commerce servers in a DMZ.
Install a logging server to monitor all attacks.
Replace the application layer firewall with a stateful one.

40. A bank is planning to add a secure, authenticated WAN connection to a rural branch office. The connection must provide bandwidth of up to 10 Mb/s with QoS supporting VoIP. Which WAN connection type should the network designer recommend?
DSL
ISDN
*leased line
Frame Relay

41. While configuring EIGRP on a router, the technician enters this command:

Router(config-router)# variance 8
What is the effect of entering this command?
It adjusts the cost of all EIGRP routes to 8.
*It enables unequal cost load balancing on the router.
It restricts the number of EIGRP feasible successor routes to 8.
It enables EIGRP equal cost load balancing over a maximum of 8 routes.
It modifies the number of values used in the composite metric calculation.

42. A designer is creating a test plan to validate a WAN design that is based on Frame Relay technology. Which network device can be used in the prototype network to serve as a Frame Relay switch?
DSLAM
CSU/DSU
Cisco 2950 switch
*Cisco router with appropriate IOS

43. Refer to the exhibit. A pre-sales systems engineer receives a diagram of the exhibited WAN implementation from a customer. EIGRP is the routing protocol that is used on the WAN. None of the parameters for EIGRP metric calculation have been modified in any router configurations. Which statement is true about the routing table on router RM?
There is a single route to the 192.168.24.0/24 LAN using the T1 connection.
There is a single route to the 192.168.24.0/24 LAN using the DSL connection.
*There is a single route to the 192.168.24.0/24 LAN using the Metro Ethernet connection.
EIGRP installs all three routes to the 192.168.24.0/24 LAN and load balances the traffic.

44. When implementing a security policy, which two actions should be included as part of the security checklist? (Choose two.)
Disable all logging.
Enable Telnet on TCP port 23.
Use HTTP for web administration.
*Set timeouts and ACLs on VTY lines.
*Shut down any unused ports and interfaces.

45. A network administrator has configured Frame Relay on a serial interface and issued the show interfaces serial command. The output shows that the interface is up and the line protocol is up. However, pings to the remote router across the link fail. What should the next step be to ensure that the IP address of the remote router appears in the Frame Relay map table of the local router?
Configure the router using the no inverse-arp command.
Ensure that the LMI type is correct for the circuit.
*Configure the router using the frame-relay map ip command.
Verify that the remote router has Frame Relay encapsulation enabled.

46. Refer to the exhibit. A NetworkingCompany engineer is characterizing an existing network for a new customer. The engineer issues a show running-config command on the branch router to gather configuration information. What is the engineer able to determine as a result of viewing the output of this command?
The branch office router has two routes to the main office LANs in the routing table.
The default route for the branch office traffic is the serial link to the Edge2 router.
*A connection through ISP-A will be used to reach the main office LANs if the Frame Relay network is unavailable.
By using both the DSL and the Frame Relay connection, the branch office router will load balance traffic that is destined for the main office LANs.


47. Refer to the exhibit. What can be determined about the operation of DLCI 101?
It is shut down.
Traffic flows in only one direction.
Packet size is limited to 2000 bytes.
*The Frame Relay network is experiencing congestion.
All packets moving across the link are marked as discard eligible.

48. A company establishes a Frame Relay connection between corporate headquarters and a branch office. The CIR for the connection is set at 4 Mb/s. Which statement is true about this WAN connection?
The company will not be able to send data faster than 4 Mb/s.
*If the company sends data faster than 4 Mb/s, some of the data frames will be flagged with a DE bit.
If the company sends data faster than 4 Mb/s, the TSP will change the CIR to zero.
When the company sends data faster than 4 Mb/s, the Frame Relay switch will set the BECN bit to 1 on the frames that are headed to the company.


49. The main office of a NetworkingCompany customer currently connects to three branch offices via three separate point-to-point T1 circuits. The customer network uses RIPv2 as the routing protocol within both the LAN and the WAN. The account manager proposes a change to a Frame Relay network because the costs are lower. A single local loop connection can be installed at the main office with three separate PVCs to connect the branch offices. How can the main office edge router be configured to enable the customer to continue to use RIP as the WAN routing protocol?
Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote routers.
To prevent the Frame Relay network from causing a routing loop, disable split horizon on the serial interface.
*Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP address to each one.
Configure the serial interface with a single interface DLCI number and create frame-relay map statements for each remote site address.


50. What type of Frame Relay subinterface must be used to connect remote sites without having to disable split horizon?
multipoint
multiaccess
*point-to-point
nonbroadcast multiaccess

final ccna4-2

1. What is a function that is associated with the access layer in a hierarchically designed network?
    performs routing and packet manipulation
    supplies redundancy and failover protection
    provides a high-speed, low-latency backbone
    *serves as a network connection point for IP telephony devices

2. What can be broadcast over the wireless network to help a user connect to the network and use wireless services?
    *SSID
    WEP keys
    VLAN parameters
    WPA encryption keys
    VPN authentication information

3. What is the advantage of choosing EasyVPN for a new VPN implementation?
    to provide encryption algorithms unavailable in other systems
    to ensure that remote workers actually use the VPN for connectivity
    to allow a greater variety of network devices to be used for VPN connections
    *to simplify the configuration tasks for the device that is used as the VPN server

4. A company has help desk staff that is not highly trained in VPNs. What two features or technologies must the network designer identify as training needs in order for the help desk to support secure remote access for teleworkers? (Choose two.)
    QoS operation
    VLAN configuration
    *tunneling protocols
    IPv6 and IPv4 dual stack
    *encryption algorithms
    Frame Relay configuration

5. Which statement best describes the VPN feature called split tunneling?
    It creates separate pathways for different VLANs.
    It creates two tunnels, one for user traffic and one for management traffic such as CDP and SNMP.
    *It allows user traffic that is destined for the corporate network to travel across the VPN tunnel, while traffic destined for the Internet travels through the local LAN of the VPN client.
    It allows separate tunnels so that high priority traffic, such as voice and video, uses the higher bandwidth tunnel, while all other user traffic travels on the lower bandwidth tunnel.

6. The network infrastructure at the headquarters of an organization consists of Cisco network devices that are running RIPv1. As part of an upgrade project, a portion of the company backbone will be increased to 10 Gb/s and needs to support unequal cost load balancing between routers. The IP addressing scheme is also changing and needs to support VLSM and CIDR. Which routing protocol should be selected for the network?
    BGP
    *EIGRP
    OSPF
    RIPv2

7. A NetworkingCompany engineer is on a support call resolving technical problems for a client network. After the issue is resolved, the engineer also provides a training session for the network support staff. What role is the engineer filling on the networking company team?
    *post-sales field engineer
    pre-sales engineer
    network designer
    account manager

8. Refer to the exhibit. What can be concluded from the output that is shown?
    MDF_R1 has a MAC address of 2294:300F:0000.
    *MDF_R1 is connected through FastEthernet0/1 to C2960-24TT-L_IDF1.
    Device C2960-24TT-L_IDF1 is running Cisco IOS Software Release 12.2(25)SEE2.
    MDF_R1 is installed in the main distribution facility on floor 24 of building L.

9. Refer to the exhibit. In the Cisco IOS filename that is shown, what is signified by the underlined portion?
    version
    platform
    *file format
    feature set 

10. A network administrator has removed a router from the network for maintenance. A new Cisco IOS software image has been successfully downloaded to a server and copied into the flash of the router. What should the administrator do before placing the router back into service?
    Delete the previous version of the Cisco IOS software from flash.
    Copy the new IOS into NVRAM to create a backup copy.
    *Restart the router and verify that the new image starts successfully.
    Verify the free space available on the router to store the new IOS image.

11. What information does an administrator require before saving the running configuration from a router to a TFTP server?
    router IP address and the name of the configuration file in NVRAM
    TFTP server IP address and the size of the configuration file in RAM
    *TFTP server IP address and the name of the configuration file that will be saved
    router IP address, size of the file and name of the configuration file on the TFTP server
    TFTP server IP address, the router IP address, and the router interface through which the file will be loaded

12. A network administrator needs to transfer an IOS image to a router using a TFTP server. What should be verified prior to beginning the transfer process?
    The TFTP server must connect to the router via a serial connection.
    *Connectivity between the TFTP server and the router should have been established.
    The TFTP server and the router must be on different networks for the transfer.
    The TFTP server software must be the same version as the Cisco IOS software.

13. A network technician needs to install a four-port switch module in an operational Cisco 1841 router that has an available HWIC slot. What should the technician do first?
    *Turn off the power to the router before installing the new module.
    Install the hot-swappable four-port switch module directly into slot 1 of the 1841.
    Move the existing WIC-2T module to slot 1 and install the four-port module in slot 0.
    Shut down all Fast Ethernet ports on the router until the switch module installation is complete.

14. Refer to the exhibit. An administrator installs a WIC-2T module into a Cisco 1841 router. Attempts to configure the S0/0/0 interface are unsuccessful. As a first step in troubleshooting the failure, the administrator issues the show version command. What is a possible reason for the failure?
    *The WIC was not physically installed properly.
    The WIC was installed into slot 1 instead of slot 0.
    The interface type and number are invalid on an 1841.
    The configuration register is the wrong value for adding new modules.

15. Refer to the exhibit. Which type of application communication model best describes this network?
    *client-client
    client-server farm
    client-enterprise edge
    client-enterprise server

16. If traditional phones are used when introducing VoIP to a network, what component would be required to convert the analog voice from traditional telephone signals into IP packets?
    Multipoint control unit
    Power over Ethernet switches
    *a router that acts as a voice gateway
    Cisco Unified Communications Manager 

17. Which characteristic should be considered by a network designer when implementing a VoIP solution?
    VoIP traffic is generally classified as low priority.
    VoIP centrally routes calls in the same manner as a traditional PBX.
    VoIP traffic is highly reliable because of retransmission of dropped packets.
    *VoIP can make use of QoS features to help reduce interruptions in communication.

18. What supports the ability of streaming video to be sent to a group of viewers simultaneously without congesting the entire network?
    traffic queues
    *multicast
    multiple Layer 4 sessions
    high priority from QoS

19. Which feature relies on prioritization of network traffic and is used to ensure successful delivery of real-time services?
    security
    reliability
    redundancy
    *quality of service

20. When implementing an IP telephony solution, why should VLANs be used?
    to allow the use of a single IP gateway
    *to separate voice from data traffic for ease of prioritization
    to allow the PBX to use VLAN IDs to filter both voice and data traffic
    to allow connectivity between traditional phone devices and IP-based telephony devices

21. Refer to the exhibit. What problem is associated with the the addressing scheme of the network?
    The WAN links need IP addresses from a different major network.
    The R1 LAN is incorrect because subnet zero cannot be used with VLSM.
    The WAN link IP address that connects R1 to R3 has an incorrect mask.
    *The R1 to R3 and R1 to R2 WAN links have IP addresses that overlap.
    The WAN IP address that connects R1 to R2 overlaps with the R3 LAN IP addresses.

22. A customer of a large multisite organization has asked a network engineer to compare a new IPv4 addressing strategy with an IPv6 strategy for their new network implementation. Which tool is appropriate for testing and comparing both addressing schemes?
    NBAR
    Cisco SDM
    Network Assistant
    *network simulation tool

23. A network administrator wants to configure a router that is running EIGRP so that it will advertise a route that will summarize the networks that are shown. Which network will summarize only these networks?

    192.168.12.0/24
    192.168.13.0/24
    192.168.14.0/24
    192.168.15.0/24
    192.168.0.0/16
    192.168.0.0/20
    192.168.8.0/21
    *192.168.12.0/22
    192.168.16.0/22

24.     A school district decides to use the 172.30.0.0/16 network for its LAN networks. The network administrator must create an addressing scheme to support 500 users in the admin office, 200 at the high school, 60 at the elementary school and 28 at the district office. Which VLSM addressing scheme will correctly address the network with minimal waste?
    172.30.0.0/20 admin
    172.30.1.0/21 high school
    172.30.1.8/22 elementary
    172.30.1.12/26 district
    172.30.0.0/22 admin
    172.30.4.0/23 high school
    172.30.5.0/24 elementary
    172.30.6.0/26 district
    172.30.0.0/23 admin
    *172.30.2.0/24 high school
    172.30.3.0/26 elementary
    172.30.3.64/27 district
    172.30.0.0/23 admin
    172.30.2.0/24 high school
    172.30.3.0/25 elementary
    172.30.3.127/26 district

25. Refer to the exhibit. All router interfaces are up and RIP version 2 is configured as the routing protocol. The users in networks 172.16.8.0 /24 and 172.16.9.0/24 are not able to reach users in the 172.16.16.0/24 network. The network administrator examines the routing tables and finds that even though all directly connected networks have been entered in the RIP configuration, not all routes are present. What is the most likely cause of this problem?
    *Autosummarization is enabled on all routers.
    The split-horizon rule is disabled on all routers.
    RIP version 2 does not support classless routing.
    RIP version 1 should have been used instead of version 2.
    The 10.10.4.0 networks should be replaced with 192.168.4.0 networks.

26. Which two processes allow a smooth transition from IPv4 to IPv6? (Choose two.)
    IPSec
    *tunneling
    *dual stack
    authentication
    anycast addressing
    header simplification

27. Which two values represent valid IPv6 addresses? (Choose two.)
    ::::1
    *FF01::1
    *0:0:0:0:0:0:0:1
    2001:DB8::47::2A4
    2031:0000:04AC:3400:FFE3:0

28. A network administrator of a middle-sized company is asked to upgrade the routing protocol of the network to support VLSM and route summarization. The current company network contains both Cisco and non-Cisco routers. Which routing protocol should be used for the upgrade?
    BGP
    RIPv1
    *RIPv2
    EIGRP

29. During prototype testing, a LAN switch fails. As the switch re-initializes using the default parameters, a port that has a PC attached transitions to the forwarding state within one second. What protocol would support this feature?
    STP
    RIP
    BGP
    VTP
    *RSTP

30. Refer to the exhibit. Based on the output, which statement is correct?    Switch2 is the root bridge.
    Traffic will use Fa0/1 as an alternative link if Gi0/1 is busy.
    All traffic with a destination on another switch will exit via Gi0/1.
    *The port cost on Gi0/1 has been changed from its default settings.

31. When designing a prototype network for a new server farm, a network designer chooses to use redundant links to connect to the rest of the network. Which business goal will be addressed by this choice?
    security
    scalability
    *availability
    manageability

32. Refer to the exhibit. To provide better customer service, the network management decides to implement a new server farm, which is located in a data center. Which two technology implementations will address the requirements for strict security policies to prevent unauthorized access to the server farm? (Choose two.)
    *Install firewalls and IDS capabilities on the network.
    Apply ACLs to permit only inbound TCP traffic to the servers.
    *Apply filters that permit traffic only to required ports on the servers.
    Configure a flexible IP addressing structure that allocates a single subnet per VLAN.
    Configure a fast-converging routing protocol with authentication at the core layer.
    Create a management VLAN and provide access to the data center devices through Telnet.
    Interface Fa0/1 on Switch2 has no role in the operation of spanning tree.

33. A wireless survey has been conducted before the deployment of a wireless network. What would be the benefit of the survey?
    provides initial configuration of the access points
    determines the channel settings of the access points
    determines the security settings on the access points
    *finds the optimal number and placement of access points

34. Refer to the exhibit. What does the TOR router do with traffic that is destined for a web server with an IP address of 172.18.10.24?
    *The router sends the traffic out Serial 0/0/0.
    The router sends the traffic out all interfaces other than the one it came in on.
    The router places the packets into a queue until a better route is discovered via RIP.
    The router sends a request to neighboring routers for paths to the 172.18.10.0 network.

35. A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. The technician asks the caller to talk to nearby users to see if other machines are affected. The caller reports that several immediate neighbors in the same department have a similar problem and that they cannot ping each other. Those who are seated in other departments have connectivity. What should the technician check as the first step in troubleshooting the issue?
    the power outlet to the PC that is used by the caller.
    the trunks between switches in the wiring closet.
    *the status of the departmental workgroup switch in the wiring closet.
    the cable that connects the PC of the caller to the network jack.
    the cable connection between a PC and a network outlet that is used by a neighbor.

36. A company would like to ensure that the failure of a single access switch does not disrupt service to the mail servers located in the data center. What can be done to ensure maximum connectivity to the mail servers?
    Enable CDP to ensure all neighboring devices are known.
    Create a separate RSTP specifically for the mail servers.
    Configure a routing protocol so that paths to all Layer 3 devices are cached.
    *Install redundant access links between the servers and the access layer switches.

37. Refer to the exhibit. An extended ACL has been created to deny traffic from the 192.168.35.0/24 network to the web server with IP address 209.165.201.15. According to Cisco best practices, where should the ACL be applied?
    *RTB Fa0/0 inbound
    RTC S0/0/1 inbound
    RTD Fa0/0 outbound
    RTC S0/1/0 outbound

38. Refer to the exhibit. The named ACL "Managers" already exists on the router. What will happen when the network administrator issues the commands that are shown in the exhibit?
    The commands overwrite the existing Managers ACL.
    *The commands are added at the end of the existing Managers ACL.
    The commands are added at the beginning of the existing Managers ACL.
    The network administrator receives an error that states that the ACL already exists.

39. A company is concerned with protecting internal e-commerce servers against external attacks. An application layer firewall is installed at the network edge and a host-based IDS system is installed on the internal LAN. What should be done to ensure a fast response and minimum server downtime in the event of an external attack?
    *Replace the host-based IDS with an IPS.
    Place the e-commerce servers in a DMZ.
    Install a logging server to monitor all attacks.
    Replace the application layer firewall with a stateful one.

40. Which two security best practices are recommended for a router deployed as a WAN endpoint? (Choose two.)
    *Turn off unnecessary services.
    Enable HTTP for web administration.
    Configure easy to remember passwords.
    *Apply timeouts on VTY, AUX, and console ports.
    Enable Telnet access to allow for remote management.

41. Company XYZ requires a WAN solution that provides flexible bandwidth options and supports one physical interface at the head office that would provide simultaneous connectivity to various remote sites. The distance from each site should not make the solution more expensive. Which WAN technology meets the requirements of the company?
    DSL
    cable
    *Frame Relay
    T1 leased line

42. A technician adds the command Router(config-router)# variance 5 to a router using EIGRP as the routing protocol. What is the result of entering this command?
    *enables unequal cost load balancing
    adjusts the metric of all EIGRP routes to 5
    restricts the number of EIGRP feasible successor routes to 5
    activates the use of all K values in the composite metric calculation
    enables EIGRP equal cost load balancing over a maximum of 5 routes

43. Refer to the exhibit. A pre-sales system engineer receives a diagram of the current WAN from a customer. EIGRP is the routing protocol used on the WAN. Based on the default operation of EIGRP, which statement is true about the routing table on router R1?
    There is a single route to the 192.168.16.0/24 LAN using the T1 connection.
    There is a single route to the 192.168.16.0/24 LAN using the DSL connection.
    *There is a single route to the 192.168.16.0/24 LAN using the Metro Ethernet connection.
    EIGRP installs all three routes to the 192.168.16.0/24 LAN and load balances the traffic.

44. Which feature of network design and configuration would be considered a weakness?
    *Choosing a flat network model.
    Choosing to implement an IPS instead of IDS.
    Choosing to disable Telnet and allow only SSH connections for remote access to the core routers.
    Choosing not to broadcast the SSID for wireless access points. 

45. Refer to the exhibit. What can the field engineer conclude about the EIGRP authentication between Router1 and Router2?
    Authentication will fail because only one key is configured.
    *Authentication will succeed and EIGRP updates can be exchanged.
    Authentication will fail because the key chain names do not match.
    Authentication will fail because the key chain names must match the router names.

46. Refer to the exhibit. A networking engineer is characterizing an existing network for a new customer. The engineer issues a show running-config command on the R1 router to gather configuration information. What is the engineer able to determine as a result of viewing the output of this command?
    The R1 router has two specific routes to the main office LANs in the routing table.
    The default route for the R1 router points to the Edge1 router.
    The R1 router will load-balance traffic to the main office LANs by using both DSL and Frame Relay.
    *A connection through ISP-1 will be used to reach the main office LANs if the Frame Relay network is unavailable.


47. A network administrator has configured Frame Relay on a serial interface and issued the show interfaces serial command. The output shows that the interface is up and the line protocol is up. However, pings to the remote router across the link fail. What should the next step be to ensure that the IP address of the remote router appears in the Frame Relay map table of the local router?
    Configure the router using the no inverse-arp command.
    Ensure that the LMI type is correct for the circuit.
    *Configure the router using the frame-relay map ip command.
    Verify that the remote router has Frame Relay encapsulation enabled.

48. What are two accurate descriptors of a DLCI? (Choose two.)
    *Frame Relay Layer 2 address
    one DLCI allowed per local loop
    *locally significant circuit endpoint
    signaling standard between DTE and DCE
    establishes the data transfer rate through a Frame Relay network

49. The main office of a NetworkingCompany customer currently connects to three branch offices via three separate point-to-point T1 circuits. The customer network uses RIPv2 as the routing protocol within both the LAN and the WAN. The account manager proposes a change to a Frame Relay network because the costs are lower. A single local loop connection can be installed at the main office with three separate PVCs to connect the branch offices. How can the main office edge router be configured to enable the customer to continue to use RIP as the WAN routing protocol?
    Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote routers.
    To prevent the Frame Relay network from causing a routing loop, disable split horizon on the serial interface.
    *Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP address to each one.
    Configure the serial interface with a single interface DLCI number and create frame-relay map statements for each remote site address.
   

Sabtu, 19 Maret 2011

FormC-3a IT Ess:PC Version4.1 Final 1-10

Which two general precautions should be taken before replacing any non-hot-swappable laptop component? (Choose two.)
*Disconnect the power cord.
Keep any component in a plastic bag until installation.
*Remove any batteries.
Use carpets in cool areas.
Wear rubber-soled shoes to work with the computer.

What is a benefit of using the USB or FireWire ports to connect peripherals to a laptop?
*The peripherals can be plugged in and out without turning the laptop off.
Data transfer is more controlled than using the parallel or serial ports.
The peripherals do not need drivers to communicate with the OS.
Connections are much more reliable.

A user is reporting that a new external hard drive is defective. The laptop will allow access to the drive at times, and then will report that the drive cannot be found. Upon an initial examination of the laptop, it is discovered that the user has ten USB devices connected to the laptop.
What is the best quick solution to this problem?
*Remove all the peripherals except the hard drive and observe the results.
Move the laptop to another location and observe the results.
Replace the power adapter and observe the results.
Replace the USB hub and observe the results.
Flash the BIOS on the laptop and observe the results.

What characterizes spoofing?
*Making data appear to come from a source other than the actual source.
Sending abnormally large amounts of data to a remote server to prevent user access to the server services.
Intercepting or inserting false information in traffic between two hosts.
Sending bulk e-mail to individuals, lists, or domains intending to prevent users from accessing e-mail.

A technician wants to create a new partition on a new additional hard drive. Which tool should be used?
Scandisk
*Disk Management
Chkdsk
Defrag
Device Manager

Which two items are considered proper cleaning tools? (Choose two.)
*compressed air
antistatic mat
*soft cloth
antistatic wrist strap
flat-head screwdriver

Which Windows tool should be run before upgrading the operating system?
Convert
Fdisk
Msconfig
*Ntbackup

When installing the Windows XP operating system, a technician is given a choice of file systems to use. If security is a requirement, which file system should be chosen?
FAT32
HPFS
NFS
*NTFS

Which type of scanner generally has high costs but produces top-quality images?
all-in-one
*drum
handheld
flatbed

Which two quick solutions are commonly recommended when a technician is troubleshooting a laptop? (Choose two.)
*Reboot the laptop.
Reinstall the operating system.
*Disconnect the peripherals.
Have the customer verify the problem.
Call a level-2 technician.

Which protocol dynamically assigns IP addresses to network devices?
*DHCP
DNS
ICMP
RARP
TCP

Which type of cable standard uses a 9-pin connector and supports data rates in excess of 800 Mbps?
DB-9
DB-25
IEEE 1284
IEEE 1394a
*IEEE 1394b

A network administrator is troubleshooting a server that keeps crashing. While monitoring traffic to the server, the administrator notices repeated, larger than normal pings to the server. What is the name of this type of attack?
multi-ping attack
phishing
ping bomb
*ping of death
spoofing
zombie attack

When calculating the total cost of ownership of a printer it is necessary to consider the cost of the consumables. Which two consumables are associated with an inkjet printer? (Choose two.)
drum
*ink cartridge
ink ribbon
*paper
toner

Which two memory types are installed using Dual Inline Memory Module (DIMM) slots? (Choose two.)
cache memory
*DDR SDRAM
FPM DRAM
*SDRAM
SRAM

What approach should a technician take when receiving a call from a stressed customer?
Ask the customer to telephone back when the customer is feeling less stressed.
Ask the customer to hold, and then wait five minutes for the customer to calm down.
*Try to establish a rapport with the customer.
Transfer the customer to a level-two technician who will ask the customer to explain the problem again.

A customer needs to purchase a new power supply for a computer. What must be considered when selecting an appropriate power supply?
The power supply converts DC to AC.
*The power supply has sufficient wattage to support all components inside the computer.
The power supply provides at least 800 V.
The power supply must have both a P-8 and P-9 connector.

A technician needs to purchase a new video adapter for a computer. Which factors should be considered when selecting the adapter?
type of hard drive installed
amount of memory installed
*expansion slot type
case form factor

A computer technician needs to test the COM ports on some new computers. Which diagnostic tool can help achieve this task properly?
digital port reader
*loopback adapter
port scanner
network analyzer

The company ABC reports that unauthorized communication from outside the network has caused serious problems in the finance department. Which software tool will help prevent this situation from occurring again in the future?
antivirus program
*firewall
network analyzer
spyware program

After Windows XP has been installed, which program would a technician use to select the programs that will run at startup?
ntldr
regedit
*msconfig
Task Manager

Which environmental factor helps ensure optimal performance for laptops?
The humidity level should always be below 20 percent.
*Temperature should be preferentially between 45 to 90 degrees Fahrenheit (7 to 32 degrees Celsius) to avoid overheating.
In dusty conditions, laptop vents should be partially covered to prevent the internal components from getting dirty.
Laptops should be cleaned every month or the internal components will be damaged.

A printer has a paper jam. An impatient user has sent multiple print jobs of the same document to this printer. What can be done to remove these print jobs?
*Cancel the jobs in the printer queue.
Select landscape or portrait image layout.
Set the printed image to colors or to grayscale.
Adjust the settings to match the colors on the screen to the colors on the printed sheet.

Which are three steps in the laser printing process? (Choose three.)
*fusing
*writing
skewing
spraying
*transferring
sublimating

A technician has installed and configured an external projector on a laptop. What is the final task the technician must perform for the image to be displayed through the projector?
*Press the function key sequence to activate the image on the projector.
Disconnect the laptop from AC power.
Reboot the laptop into dual monitor mode.
Turn audio and video off on the laptop and on for the projector.

Which port is used only for input?
*PS/2
component
speaker
DVI
parallel

An employee is receiving e-mail from unknown banks asking for username and password information. Which type of security attack is the employee experiencing?
adware
*phishing
Trojan horse
virus
worm

A newly purchased scanner is not functioning as efficiently as expected. Which step should a technician take to improve performance?
Download drivers and utilities from a user forum on the Internet.
*Download drivers and utilities from the manufacturer web site.
Reinstall the software that came with the scanner.
Buy a different scanner.

A customer who owns a business that creates high-quality color graphic images wants a new printer. The customer already has an ink-jet printer. Which type of printer would be a good recommendation?
dot-matrix
*solid-ink
daisy-wheel
thermal

A network administrator has finished migrating from a peer-to-peer network to a new client-server network configuration. What are two advantages of the new configuration? (Choose two.)
The total cost of the new solution is considerably lower.
*Data is more secure in the event of hardware failures.
Individual users are in control of their own computers and network resources.
*Data resources and access are centrally controlled.
Personnel costs are lower because a dedicated network administrator is no longer necessary.

What must be done before a technician cleans a very dirty LCD screen on a laptop?
Place the laptop in standby mode.
Remove the screen from the laptop.
*Remove the battery.
Enable the autoclean setting in the BIOS.

A technician notices that a data floppy disk is in the floppy disk drive of a computer when it is powered on. Which error message could this potentially cause?
device / service failed to start
floppy disk corrupted
*invalid system disk
corrupted driver

The driver for a network interface card has been updated on a Windows XP computer. All network access has been lost. Which steps in the Windows XP Classic View should be followed to roll back the network interface card driver?
*Choose Start > Settings > Control Panel. Double-click System. Click the Hardware tab. Choose Device Manager. Double-click the NIC adapter. Click the Driver tab. Click the Roll Back Driver button.
Choose Start > Settings > Control Panel. Double-click Network Connections. Right-click the NIC. Choose Properties > Uninstall.
Choose Start > Settings > Control Panel. Double-click System. Click the Hardware tab. Choose Device Manager. Choose Action > Uninstall.
Choose Start > Settings > Control Panel. Double-click Add or Remove Programs. Click Change.

A technician is asked to wire a network that supports CSMA/CD. Which architecture and physical topology should the technician use for supporting this access control method?
*Ethernet and Star
FDDI and Ring
Token Ring and Double Ring
Wireless and Ring

A network technician receives an error that there is insufficient physical disk space on an external drive to hold a file from a Windows XP computer. What is a possible cause for the problem?
The technician lacks the file attribute rights to the file to copy it to the external drive.
*The external drive is formatted with a FAT 32 file system and the file is too large for that file system.
The file is a system file and will cause the operating system to fail if it is moved.
The technician needs to add the file to the Master File System before trying to move the file.

All default Windows XP tools and utilities are installed on a computer. The technician discovered that a few other Windows components are still needed. Which procedure can accomplish this task?
Press Ctrl-Alt-Del. Choose Task Manager > Performance > Add/Remove Windows Components
Open the Windows XP CD. Locate the Windows Components folder. Right click on Component. Choose Install.
Right click on the Desk Top. Choose Properties > Settings > Add/Remove Windows Components
*Choose Start > Control Panel > Add Remove Programs > Add/Remove Windows Components

Why does the cable from the power supply to the motherboard have different colored wires?
A single wire could not carry enough current.
There is one wire for each motherboard component.
*Each wire carries a different voltage.
The motherboard slot requires the number of wires that are represented by the different colors.

A home computer user is trying to customize the power management on a computer using Windows XP. However, the custom configuration is unsuccessful. What task must be completed to enable power management to be configured?
ACPI power management must be enabled in the BIOS using Administrative Tools in the Windows Control Panel.
APM power management mode must be configured in the BIOS before ACPI can be used to enable power management.
APM power management mode must be configured in the BIOS so that Windows XP can be used to enable power management.
*ACPI power management mode must be enabled in the BIOS before Windows XP can be used to configure power management.

A home computer owner has a PC system that runs Windows XP. For security reasons the owner has been using a limited local user account for a number of years. The owner wishes to install a new piece of software, but the user account does not have the necessary permissions. Which type of account does the owner need to use to install the new software?
server
*administrator
root
unlimited

A technician installed a network adapter in a computer and wants to test network connectivity. The ping command can only receive a response from local workstations. What could be causing the problem?
The NIC driver is out of date.
The operating system is not compatible with the remote sites.
The TCP/IP protocol stack is not loaded.
*The default gateway is not set.

What are the four layers in the TCP/IP reference model?
HTTP, TCP, IP, Ethernet
TCP, IP, Ethernet, IEEE
*application, transport, internet, network access
application, presentation, session, transport
physical, data link, network, transport

What deficiency is associated with RAID 0 compared with RAID 1?
RAID 0 is more expensive to implement.
RAID 0 requires at least one additional hard drive.
*RAID 0 does not provide any protection for the data that is located on a hard drive.
RAID 0 requires a minimum of two hard drives and two controllers.



Refer to the exhibit. A Cisco Networking Academy instructor is trying to print a flash graphic from the curriculum. The print job has gone into the print queue as shown. Based on the output, what should be the next step in solving this problem?
Check the printer for status messages.
Restart the computer.
Upgrade the printer driver.
Reinstall the printer driver.
*Check the printer cabling and power.

A directly-attached printer has always failed to work. Print jobs and the printer test page fail to print, but the printer self-test page prints OK. If the cabling is installed correctly, what is most likely the problem?
a dry print cartridge
*an incorrect printer driver
an outdated system BIOS
a missing Windows service pack

Which measures can help control RFI effects?
Ensure the humidity and temperature levels are set as low as possible.
Ensure the number of wireless NICs exceeds the number of wireless phones.
*Ensure the wireless network is on a different frequency than the offending source.
Ensure each wireless NIC is configured to operate at different frequencies from all other wireless NICs.

Which firewall port number or number combination must be open in order to remotely access a network device using SSH?
20/21
*22
23
25
80

Which feature allows a technician to manage power settings through a Microsoft Windows control panel?
setting two motherboard pins using a jumper
*enabling ACPI through system BIOS settings
using a combination of the Fn key and another keystroke
sliding the selective power switch to the on position on the power supply




Refer to the exhibit. A technician is troubleshooting a problem where a teacher is unable to connect a laptop to a wireless network. The wireless NIC is enabled and the wireless network configuration settings are correct. Which key would be used in conjunction with the Fn key to enable the wireless connection?
F5
F6
*F7
F8

What is the purpose of Windows Vista 64-bit Kernel Patch Protection?
*It prevents third party drivers from modifying the operating system kernel.
It permits the 64-bit operating system to patch the operating system at a much higher rate.
It prevents the use of additional operating system kernels from being added to Vista.
It allows the use of unsigned drivers to be used within the 64-bit Vista operating system.
It prevents the use of 32-bit drivers with the 64-bit Visa operating system.

Which two file systems are available for selection during installation of Windows XP? (Choose two.)
FAT16
*FAT32
HPFS
*NTFS
CDFS

Sabtu, 12 Maret 2011

final ccna4-1

CCNA 4-1

1. What can be broadcast over the wireless network to help a user connect to the network and use wireless services?
* SSID
WEP keys
VLAN parameters
WPA encryption keys
VPN authentication information

2. The network designer recommends using RSTP in the design of a new data center. There are multiple redundant Layer 2 switches and links contained in the new design. What is the benefit of using RSTP rather than STP in this situation?
Redundant links are not blocked.
Routing tables converge more quickly.
* Spanning Tree convergence times are reduced.
Fewer redundant links are required to maintain connectivity.

3. A NetworkingCompany engineer is on a support call resolving technical problems for a client network. After the issue is resolved, the engineer also provides a training session for the network support staff. What role is the engineer filling on the networking company team?
* post-sales field engineer
pre-sales engineer
network designer
account manager

4. What is a function that is associated with the access layer in a hierarchically designed network?
performs routing and packet manipulation
supplies redundancy and failover protection
provides a high-speed, low-latency backbone
* serves as a network connection point for IP telephony devices

5. A company has help desk staff that is not highly trained in VPNs. What two features or technologies must the network designer identify as training needs in order for the help desk to support secure remote access for teleworkers? (Choose two.)
QoS operation
VLAN configuration
* tunneling protocols
IPv6 and IPv4 dual stack
* encryption algorithms
Frame Relay configuration

6. A network designer has chosen to specify the use of a dedicated firewall appliance at the perimeter of a large network. Why would the designer use a dedicated firewall rather than using the Cisco IOS firewall feature set on the existing router?
Traffic filtering is needed on the internal LAN.
Multiple levels of access to the network are needed.
The DMZ requires packet filtering and port blocking.
* Heavy network traffic will be handled best by using a dedicated device.

7. What type of ACL permits outbound traffic, but permits inbound traffic only if it is a response to the traffic that is initiated from inside the network?
dynamic
* reflexive
standard
extended
time-based

8. The network infrastructure at the headquarters of an organization consists of Cisco network devices that are running RIPv1. As part of an upgrade project, a portion of the company backbone will be increased to 10 Gb/s and needs to support unequal cost load balancing between routers. The IP addressing scheme is also changing and needs to support VLSM and CIDR. Which routing protocol should be selected for the network?
BGP
*EIGRP
OSPF
RIPv2

9. At the distribution layer of a hierarchical network, what are two advantages of using Layer 3 devices instead of Layer 2 switches? (Choose two.)
provides reliable connectivity to end users
creates fewer IP subnets to configure and manage
reduces the number of redundant links required
* provides connectivity between different VLANs
* enables traffic filtering based on subnet addresses

10. A company uses the Frame Relay network to establish a VPN connection between headquarters and the branch office. The company wants to add a backup link in case the Frame Relay connection fails. The backup link will use the business DSL connection through another ISP. How should the router be configured to include the backup link?
Create a static route with the administrative distance of 1.
*Create a floating static route.
Add a new route to the routing protocol configuration.
Create a second default route for the backup path.

11. A WIC-1T module needs to be installed in a Cisco 1841 router that currently has a WIC-2T module in slot 0. What should the network technician do first?
Install the hot-swappable option module.
* Turn off the power to the router before installing the new module.
Remove the WIC-2T module so that the new module can be installed in slot 0.
Shut down all Fast Ethernet ports on the router until the new WIC module installation is complete.
Configure the Cisco IOS software to support an internal trunk link between the two WIC modules.

12. Which two pieces of information are needed before an IOS image may be loaded on a router from a TFTP server? (Choose two.)
* the IP address of the TFTP server
the current name of the IOS image on the router
the operating system of the TFTP server
the name of the configuration file in NVRAM
* the name of the IOS image on the TFTP server
encapsulation of the router interface that is connected to the TFTP server

13. As part of network monitoring, a network administrator receives an alert that the CPU usage of the core router reaches 90% several times a day. Which protocol is in use to monitor the network performance?
DNS
* SNMP
SMTP
DHCP
TFTP

14. If a router is unable to find a suitable IOS to load into RAM, in what mode does the boot process end?
setup mode
user mode
* rommon mode
privileged mode

15. Refer to the exhibit. What is an accurate description of the first neighbor that is displayed in the output?
24 port 2950 switch with a non-default native VLAN
*24 port 2950 switch that is connected to Fa0/0 on Router1
24 port 2950 switch that is assigned to the administrator-defined VTP domain
24 port 2950 switch with interface GigabitEthernet0/1 that is operating at 1000 Mb/s

16. How should a network engineer determine if a router module is hot-swappable?
Insert the module with the power on, then check to see if the associated LED is lit.
* Check the router and interface module data sheets on CCO to determine hot-swappability.
Insert the module with the power on, then issue the show running-config command to verify that all new interfaces are recognized.
Power off the router, insert the module, then verify new interfaces using the show running-config command after powering up.

17. Refer to the exhibit. The network administrator has used the Cisco Feature Navigator to choose a Cisco IOS image to install on a router. Given the exhibited output of the show version command, which statement is true about the capacity of the router to use this Cisco IOS image?
There is enough DRAM and flash.
There is not enough DRAM and flash.
There is enough DRAM but not enough flash.
* There is not enough DRAM but enough flash.

18. What functionality does NBAR provide to network technicians?
provides data which can be used to create a network diagram
allows for monitoring and managing network devices
*allows for classification and monitoring of network traffic
displays the IOS versions and IP addresses on neighboring devices

19. In a converged network, which two types of traffic would be categorized as real-time traffic? (Choose two.)
e-mail
file transfer
web browsing
* videoconferencing
* voice over IP
video on demand

20. What is a characteristic of FTP traffic flows?
low-volume traffic
predictable bandwidth usage
*large packet sizes for transfers
low throughput with high response-time requirements

21. What supports the ability of streaming video to be sent to a group of viewers simultaneously without congesting the entire network?
traffic queues
* multicast
multiple Layer 4 sessions
high priority from QoS

22. Refer to the exhibit. The routers are configured with RIPv2 with default configurations. When attempting to communicate with other networks, hosts from 172.16.2.0/24 are experiencing connectivity issues. What could be done to resolve this issue?
Change to a public IP address scheme.
* Disable automatic route summarization.
Change the IP network address on R3 Fa0/0 to 172.16.1.128 /26.
Change the subnet mask on the link between R2 and R3 to 255.255.255.0.

23. A network engineer is prototyping a new IP addressing and summarization strategy for a new network that will be integrated into the existing infrastructure. Which method is appropriate for testing the addressing scheme?
using the production network of the customer
using actual network equipment in a lab
using the Cisco Network Assistant
* using a network simulation tool

24. Refer to the exhibit. A customer has a problem with connectivity in the network. Based on the IP addressing scheme, what is causing the problem?
The WAN links need IP addresses from a different major network.
* The WAN link that connects R1 to R2 overlaps with the R3 LAN.
The WAN links that connect R1 to R3 and R1 to R2 have incorrect masks.
The R1 LAN is incorrect because subnet zero cannot be used with VLSM.

25. Refer to the exhibit. A new host needs to be connected to the switch and be assigned to VLAN 2. Router RA is attached to the switch via a trunk and is configured as shown. What IP address should be assigned to this new host?
192.168.1.1 /26
192.168.1.22 /28
192.168.1.32 /28
* 192.168.1.44 /28
192.168.1.47 /28
192.168.1.55 /28

26. Which two processes allow a smooth transition from IPv4 to IPv6? (Choose two.)
IPSec
* tunneling
* dual stack
authentication
anycast addressing
header simplification

27. Which two statements are true about the enhancements IPv6 has over IPv4? (Choose two.)
*IPv6 does not support broadcasts.
*IPv6 uses a simplified header structure.
IPv6 does not require private addresses.
IPv6 uses fixed length address strings.
IPsec for IPv6 is not compatible with IPsec for IPv4.

28. Refer to the exhibit. The named ACL "Managers" already exists on the router. What will happen when the network administrator issues the commands that are shown in the exhibit?
The commands overwrite the existing Managers ACL.
* The commands are added at the end of the existing Managers ACL.
The commands are added at the beginning of the existing Managers ACL.
The network administrator receives an error that states that the ACL already exists.


29. Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of an access layer switch and connects three PCs. The engineer attempts to ping from each PC to the other connected PCs to test the configuration. Which statement describes the result of the last step?
Host 1 can ping Host 2.
* Host 1 can ping Host 3.
Host 2 can ping Host 3.
No hosts can ping any other host.

30. Refer to the exhibit. A network administrator is configuring a new router to provide routing between VLANs. The administrator removes the router from the box and connects the Fa0/0 interface to a trunking port on the switch. After the configuration is applied to the router, as shown in the exhibit, the traffic between VLANs fails. What is causing this to occur?
The R1 router needs a routing protocol configured.
* The subinterfaces of the R1 router should have IP addresses applied.
The R1 router needs three additional Fast Ethernet interfaces installed.
The subinterfaces of the R1 router should be configured in the same VLAN.

31. During prototype testing, the network designer performs a test to determine the ability of the network to recover from a link or device failure. Which design goal is validated if the test is a success?
scalability
manageability
* availability
security

32. A network administrator of a middle-sized company is asked to upgrade the routing protocol of the network to support VLSM and route summarization. The current company network contains both Cisco and non-Cisco routers. Which routing protocol should be used for the upgrade?
BGP
RIPv1
* RIPv2
EIGRP

33. Refer to the exhibit. What is the spanning-tree role of all the enabled interfaces of SW11?
alternate
backup
* designated
root

34. Refer to the exhibit. An extended ACL has been created to deny traffic from the 192.168.35.0/24 network to the web server with IP address 209.165.201.15. According to Cisco best practices, where should the ACL be applied?
* RTB Fa0/0 inbound
RTC S0/0/1 inbound
RTD Fa0/0 outbound
RTC S0/1/0 outbound

35. A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. The technician asks the caller to talk to nearby users to see if other machines are affected. The caller reports that several immediate neighbors in the same department have a similar problem and that they cannot ping each other. Those who are seated in other departments have connectivity. What should the technician check as the first step in troubleshooting the issue?
the power outlet to the PC that is used by the caller.
the trunks between switches in the wiring closet.
* the status of the departmental workgroup switch in the wiring closet.
the cable that connects the PC of the caller to the network jack.
the cable connection between a PC and a network outlet that is used by a neighbor.

36. During prototype testing, a LAN switch fails. As the switch re-initializes using the default parameters, a port that has a PC attached transitions to the forwarding state within one second. What protocol would support this feature?
STP
RIP
BGP
VTP
* RSTP

37. Refer to the exhibit. A networking company designer is reviewing a diagram of a customer network. What are the two problems that need to be resolved in the topology that is shown? (Choose two.)
* The firewall router and ISP connection represent a single point of failure.
If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable.
* A power supply failure of the server block switch will cause the entire IP telephony system to fail.
Using Layer 3 switches to interconnect the server block servers to the IP phones introduces too much delay.
The IP phones need to be redundantly connected to the switches to prevent single points of failure at the access layer.

38. Refer to the exhibit. A technician at the ISP site asks the network administrator at the client site to change the CHAP password as part of the routing security maintenance. After the administrator makes the change and reboots the router, the technician issues a show interfaces serial 0/0/0 command. According to the output, what can be concluded about the serial connection between the client site and ISP site?
The router at the client site is still in the process of rebooting.
*The administrator probably configured the wrong password.
The administrator has not issued a no shut command on the serial interface.
The administrator probably configured the wrong IP address for the serial interface.


39. Refer to the exhibit. Based on the EIGRP configuration that is shown, what can the field engineer conclude about the EIGRP authentication between RouterA and RouterB?
Authentication will fail because only one key is configured.
Authentication will fail because the key chain names do not match.
* Authentication will succeed and EIGRP updates can be exchanged.
Authentication will fail because the key chain names must match the router names.


40. A network administrator has configured Frame Relay on a serial interface and issued the show interfaces serial command. The output shows that the interface is up and the line protocol is up. However, pings to the remote router across the link fail. What should the next step be to ensure that the IP address of the remote router appears in the Frame Relay map table of the local router?
Configure the router using the no inverse-arp command.
Ensure that the LMI type is correct for the circuit.
*Configure the router using the frame-relay map ip command.
Verify that the remote router has Frame Relay encapsulation enabled.

41. Refer to the exhibit. A pre-sales systems engineer receives a diagram of the exhibited WAN implementation from a customer. EIGRP is the routing protocol that is used on the WAN. None of the parameters for EIGRP metric calculation have been modified in any router configurations. Which statement is true about the routing table on router RM?
There is a single route to the 192.168.24.0/24 LAN using the T1 connection.
There is a single route to the 192.168.24.0/24 LAN using the DSL connection.
* There is a single route to the 192.168.24.0/24 LAN using the Metro Ethernet connection.
EIGRP installs all three routes to the 192.168.24.0/24 LAN and load balances the traffic.


42. A company establishes a Frame Relay connection between corporate headquarters and a branch office. The CIR for the connection is set at 4 Mb/s. Which statement is true about this WAN connection?
The company will not be able to send data faster than 4 Mb/s.
* If the company sends data faster than 4 Mb/s, some of the data frames will be flagged with a DE bit.
If the company sends data faster than 4 Mb/s, the TSP will change the CIR to zero.
When the company sends data faster than 4 Mb/s, the Frame Relay switch will set the BECN bit to 1 on the frames that are headed to the company.

43.What are two accurate descriptors of a DLCI? (Choose two.)
* Frame Relay Layer 2 address
one DLCI allowed per local loop
* locally significant circuit endpoint
signaling standard between DTE and DCE
establishes the data transfer rate through a Frame Relay network

44. When implementing a security policy, which two actions should be included as part of the security checklist? (Choose two.)
Disable all logging.
Enable Telnet on TCP port 23.
Use HTTP for web administration.
* Set timeouts and ACLs on VTY lines.
* Shut down any unused ports and interfaces.

45. A company plans to establish Frame Relay connections between corporate headquarters and several branch offices. The network designer recommends using one physical interface on the edge router to support the new Frame Relay connections. The company currently uses RIPv2 for routing and plans no changes to the RIPv2 configuration. What should be done to ensure that each branch office link is a separate subnet and that routing updates are successful between corporate headquarters and the branch offices?
Configure multipoint subinterfaces on the physical interface.
* Configure point-to-point subinterfaces on the physical interface.
Configure a single subinterface to establish multiple PVC connections.
Configure the physical interface to share one DLCI to multiple remote sites and their connections.


46. A company has branch offices at several locations across the country. Which security implementation would provide a cost-effective, secure, and authenticated connection to centralized internal resources that are located at company headquarters, without requiring configuration for individual employees at the branch offices?
leased line with PPP authentication
* site-to-site VPN
access control list
remote-access VPN

47. A bank is planning to add a secure, authenticated WAN connection to a rural branch office. The connection must provide bandwidth of up to 10 Mb/s with QoS supporting VoIP. Which WAN connection type should the network designer recommend?
DSL
ISDN
* leased line
Frame Relay

48. What Cisco VPN solution allows for simple configuration of VPNs on the laptops of remote and mobile employees?
EasyVPN Server
* EasyVPN Remote
EasyVPN Client
EasyVPN Remote-Access

49. Which two technologies can provide data integrity in a VPN connection? (Choose two.)
ESP
DES
* MD5
DH1
* SHA-1

final ccna2_form2a-ver.4.1

How many host addresses may be assigned on each subnetwork when using the 130.68.0.0 network address with a subnet mask of 255.255.248.0?
30
256
*2046
2048
4094
4096

Which type of address is 192.168.17.111/28?
host address
network address
*broadcast address
multicast address

A customer reports connectivity problems to an ISP technician. Upon questioning the customer, the technician discovers that all network applications are functioning except for FTP. What should the technician suspect is the problem?
*misconfigured firewall
bad port on switch or hub
misconfigured IP addressing on the customer's workstation
wrong DNS server configured on the customer's workstation
wrong default gateway configured on the customer's workstation

A customer reports connectivity problems to an ISP technician. Upon questioning the customer, the technician discovers that all network applications are functioning except for FTP. What should the technician suspect is the problem?
misconfigured firewall
bad port on switch or hub
*misconfigured IP addressing on the customer's workstation
wrong DNS server configured on the customer's workstation
wrong default gateway configured on the customer's workstation

How do port filtering and access lists help provide network security?
*They prevent specified types of traffic from reaching specified network destinations.
They alert network administrators to various type of denial of service attacks as they occur.
They prevent viruses, worms, and Trojans from infecting host computers and servers.
They enable encryption and authentication of confidential data communications.

A hacker attempts to reach confidential information that is stored on a server inside the corporate network. A network security solution inspects the entire packet, determines that it is a threat, and blocks the packet from entering the inside network. Which security measure protected the network?
an IDS
*an IPS
a host-based firewall
Anti-X software

When customers use credit cards to make purchases at a small business, a modem is heard dialing a telephone number to transfer the transaction data to the central office. What type of WAN serial connection is in use?
leased line
packet switched
*circuit switched
point-to-point

The command copy tftp running-config has been entered on the router. What will this command do?
copy the configuration in RAM to a server
*copy the configuration file from a server to RAM
copy the configuration file in NVRAM to RAM
copy the configuration file in NVRAM to a server
copy the configuration file from a server to NVRAM

A network technician is using a network management station to gather data about the performance of devices and links within the ISP. Which application layer protocol makes this possible?
*SNMP
FTP
DHCP
SMTP

A user reports being unable to access the Internet. The help desk technician employs a bottom-up approach to troubleshooting. The technician first has the user check the patch cable connection from the PC to the wall, and then has the user verify that the NIC has a green link light. What will the technician have the user do next?
Enter an IP address into the WWW browser address bar to see if DNS is at fault.
Use traceroute to identify the device along the path to the ISP that may be at fault.
*Verify the IP address, subnet, and gateway settings using ipconfig on the PC.
Connect to the user home router to check firewall settings for blocked TCP ports.

Refer to the exhibit. Which two IP addresses could be assigned to the hosts in the diagram? (Choose two.)
192.168.65.31
192.168.65.32
*192.168.65.35
*192.168.65.60
192.168.65.63
192.168.65.64

Refer to the exhibit. Which command would an administrator use to configure the router name?
Router# ip hostname Boise
Router# hostname Boise
Router(config-line)# name Boise
*Router(config)# hostname Boise
Router> ip hostname Boise

What can cause a problem at the data link layer?
a faulty network cable
a firewall that is blocking all HTTP traffic
*incorrectly configured device drivers
incorrectly configured subnet masks

Which cable type is used to interconnect the FastEthernet interfaces of two routers?
straight-through
*crossover
console
rollover

Which statement is true about FTP implementations?
The protocol interpreter (PI) function engages once the data transfer process (DTP) function is complete.
The DTP function is responsible for the login sequence.
*FTP requires two connections, one for control and one for data.
Both the PI and the DTP close automatically when the transfer is complete.


Which statement is true about the reverse lookup DNS zone?
It is most commonly experienced when users are surfing the Internet.
It is the backup for the forward lookup zone.
It dynamically updates the resource records.
*It resolves an IP address to a fully qualified domain name.

A network is spread across two buildings that are separated by a distance of 500 feet (152 meters). An electrical transformer is installed near the cable route. Which type of cable should be used in this network?
STP
UTP
coaxial
*fiber-optic

Refer to the exhibit. R1 and R2 are configured with the commands that are displayed. All interfaces are properly configured, but neither router is receiving routing updates. What two things can be done to solve the problem? (Choose two.)
*Configure the routing protocol on R1 for network 10.0.0.0.
*Configure the routing protocol on R2 for network 10.0.0.0.
Configure the routing protocol on R1 for network 192.168.4.0.
Configure the routing protocol on R1 for network 192.168.2.0.
Configure the routing protocol on R2 for network 192.168.1.0.
Configure the routing protocol on R2 for network 192.168.3.0.

When a router learns two paths to the same destination network, which two factors determine the path that will be included in the routing table? (Choose two.)
*route metric
the MAC address of the neighboring router
the source IP address in data packets
the IP address of the next hop router
*administrative distance

Which two services are required to enable a computer to receive dynamic IP addresses and access the Internet using domain names? (Choose two.)
*DNS
WINS
HTTP
*DHCP
SMTP

A building has experienced a power outage. When the power returns, none of the devices on one floor can access the Internet. The network administrator checks the switch in the IDF that these devices are connected to and notes that the SYST LED on the front of the switch is amber.
What is a possible cause of this problem?
The switch is functioning properly.
*The switch has failed POST.
The switch configuration file was not saved to NVRAM.
The connection between the switch and the server did not autonegotiate speed and duplex properly.

Refer to the exhibit. While configuring the serial interface of a router, the network administrator sees the highlighted error message. What is the reason for this?
The serial interface is administratively down.
The serial interface is already configured with an IP address.
*The network administrator has attempted to configure the serial interface with a broadcast address.
The same IP address has been configured on another interface.

How does an SNMP trap aid network monitoring and management?
It reports to the management station by responding to polls.
It collects information for the management station by using polling devices.
*It sends an alert message to the management station when a threshold is reached.
It flags attempts to begin a DoS attack on the network.

An organization has 50 traveling salespersons who must be able to connect to the company network from client sites and hotels. Which WAN connection will allow this access?
Frame Relay
Cable
DSL
*dialup

When using NAT on a router, what is the term for the IP address of an inside host as it appears to the outside network?
inside local
*inside global
outside local
outside global

For the assignment of permissions to files and folders, what does the "principle of least privilege" imply?
No user has more privileges than any other user.
Permissions to files are given based on seniority.
*Users only have access to resources that are necessary for their jobs.
Users should be given no access to computer resources until they ask.

A client complains to an ISP that the hosted web server seems slow and frequently cannot be reached. The technician suspects the special high performance server NIC might be the source of the problem. After checking with vendor support, it is verified that the NIC is causing framing errors and the firmware needs to be upgraded. With which layer of the OSI model is this problem associated?
Layer 1
*Layer 2
Layer 4
Layer 7

Which question provides troubleshooting information about a problem at Layer 1 or Layer 2 of the OSI model?
Can the server be reached through Telnet?
Is there a firewall that is configured on the PC?
*Is there a link light on the network card?
What addresses are configured in the TCP/IP settings?

Which protocol allows secure in-band management so that a network administrator can monitor and configure network devices without fear of any passwords being compromised?
*SSH
HTTP
SNMP
Telnet

Refer to the exhibit. Static routes have been configured on all routers in the network. PC2 can communicate with PC1 but not with PC3. What should be done to remedy the problem?
Reconfigure the first static route with the exit interface S0/0/0.
*Reconfigure the second static route with the exit interface S0/0/1.
Reconfigure the first static route with the next hop address 172.16.3.1.
Reconfigure the second static route with the next hop address 172.16.3.1.

Refer to the exhibit. R1 and R2 are connected over a WAN. PC A is connected to the fa0/0 port on R1 and PC B is connected to the fa0/5 port on SW1. Starting with PC A and ending with PC B, what cable types would be used to connect all the devices?
Link A - straight-through, Link B - crossover, Link C - serial, Link D - straight-through.
*Link A - crossover, Link B - serial, Link C - straight-through, Link D - straight-through.
Link A - straight-through, Link B - serial, Link C - crossover, Link D - straight-through.
Link A - crossover, Link B - crossover, Link C- serial, Link D - straight-through.

Refer to the exhibit. Which type of link is supported by this interface module?
LAN
*WAN
WLAN
VLAN

A network technician wants to restore a backup copy of the saved configuration file on a router from a TFTP server. After restoring the file from the TFTP server, the technician reloads the router and finds that it still has the old configuration file instead of the restored file. What could have caused this?
The technician entered the command delete flash: before reloading the router.
The technician entered the command boot system rom before reloading the router.
The technician entered the command erase startup-config before reloading the router.
*The technician failed to enter the command copy running-config startup-config before reloading the router.

Refer to the exhibit. The Transfer > Capture Text feature available through HyperTerminal has been used to capture the running configuration on a router. The startup-configuration has been erased from the router followed by the issuing of the reload command. The startup-config is restored by using the captured file, but all interfaces on the router are shown as administratively down. What could cause this problem?
The enable password was incorrectly entered.
The configuration register was not set to 0x2142.
The enable secret password was incorrectly entered.
*The no shutdown command must be entered under each interface section in the file being sent.
The captured file should have restored the running configuration not the startup configuration.

A network technician wants to load a configuration file from a TFTP server to a router. What must the technician know before initiating the transfer?
*the IP address of the TFTP server and the name of the configuration file on the server
the operating system of the TFTP server and the IP address of the connected router interface
the IP address of the TFTP server and the name of the configuration file in NVRAM of the router
the name of the configuration file on the router and the IP address of the interface that is connected to the TFTP server

At which layer of the OSI model is the Ethernet family of technologies defined?
Layer 1
*Layer 2
Layer 3
Layer 4
Layer 5
Layer 6
Layer 7

Which transport layer protocol will allow segments to be exchanged between two hosts with low overhead and no mechanism for retransmission?
IP
FTP
TCP
*UDP
SMTP

What does the command RA(dhcp-config)# dns-server 10.10.64.221 10.10.64.222 accomplish?
allows RA to act as a DNS relay agent
allows RA to be configured as a DNS server
identifies the default gateway address that is used to reach the DNS servers
*enables DHCP clients to use the specified IP addresses as DNS servers

Which statement best describes HDLC encapsulation?
*It is a bit-oriented data link layer protocol.
It is a circuit-switched network layer protocol.
It is a packet-switched network layer protocol.
It is a packet-switched data link layer protocol.

Which type of WAN connection uses packet-switched connections?
T1
E1
ISDN
*Frame Relay

Which storage media type is most commonly selected if cost effectiveness, large capacity, and transportability are the key factors being considered during implementation of a backup scheme?
*digital tape
solid-state storage
optical media discs
storage area networks
network-attached storage

In a structured cable system, what is the purpose of horizontal cabling?
It connects an IDF to an IDF.
It connects an IDF to the MDF.
*It connects wall jacks to an IDF.
It connects wall jacks to user workstations.

A network engineer has been asked to design a new structured cable system. What should be the first step in the project?
*Obtain an accurate floor plan.
Identify all potential sources of EMI.
Sketch the proposed network design.
Determine the locations of all network devices.

Refer to the exhibit. A network technician is configuring the WAN interface on the HQ router. Which set of commands correctly configures the WAN interface if the IP address that is assigned to the WAN link is 198.133.219.13/30 and router HQ is a DTE device?
HQ(config-if)# ip address 198.133.219.13 255.255.255.248
HQ(config-if)# clock rate 64000
HQ(config-if)# no shutdown
HQ(config-if)# ip address 198.133.219.13 255.255.255.252
HQ(config-if)# clock rate 64000
HQ(config-if)# no shutdown
HQ(config-if)# ip address 198.133.219.13 255.255.255.248
HQ(config-if)# no shutdown
*HQ(config-if)# ip address 198.133.219.13 255.255.255.252
HQ(config-if)# no shutdown

What is a function of an IPS?
It analyzes only layer 7 of the OSI model to identify malicious activity.
It provides perimeter security for the entire network.
It routes traffic to a DMZ or protected internal network.
*It blocks suspicious network activity in real time.
It passively monitors all network traffic that enters the internal network and DMZ.

What is the purpose of the routing process?
to encapsulate data that is used to communicate across a network
*to select the paths that are used to direct traffic to destination networks
to convert a URL name into an IP address
to provide secure Internet file transfer
to forward traffic on the basis of MAC addresses

A network engineer is asked to specify the type of cable for a new network installation. The engineer plans horizontal cable runs of less than 90 feet (27.4 meters) using cable that is not expensive and is easy to implement. It will be positioned away from electrically noisy areas to avoid EMI. Which cable should the engineer choose?
STP
*UTP
coaxial
fiber optic

Which two terms are used to refer to cable connections that run between network distribution facilities? (Choose two.)
patch
*vertical
*backbone
horizontal
crossover

Refer to the exhibit. A user who is connected to RTA is trying to telnet to RTB, but the connection is failing. Based on the output of the show running-config command on router RTB, why is the Telnet session failing?
Telnet has not been configured on the console line.
The login command has not been issued on the console line.
*No password has been configured on the VTY lines.
A session limit has not been configured for Telnet.