Beruflich Dokumente
Kultur Dokumente
To reduce unwanted incoming traffic from the outside, a network technician is tasked
with establishing the filtering rules for the network firewall. Which traffic should be
allowed?
incoming ICMP traffic
all incoming connections to internal servers
incoming responses to traffic that is generated from the inside
incoming connections from the outside that duplicate inside addresses
Refer to the exhibit. Based on the EIGRP configuration that is shown, what can the field
engineer conclude about the EIGRP authentication between RouterA and RouterB?
Authentication will fail because only one key is configured. Authentication will
fail because the key chain names do not match. Authentication will succeed and
EIGRP updates can be exchanged. Authentication will fail because the key chain
names must match the router names.
A network administrator has configured Frame Relay on a serial interface and issued the
show interfaces serial command. The output shows that the interface is up and the line
protocol is up. However, pings to the remote router across the link fail. What should the
next step be to ensure that the IP address of the remote router appears in the Frame Relay
map table of the local router?
Configure the router using the no inverse-arp command. Ensure that the LMI
type is correct for the circuit. Configure the router using the frame-relay map ip
command. Verify that the remote router has Frame Relay encapsulation enabled.
Which two statements accurately describe the result of entering the command
BRT(config-if)# frame-relay map ip 10.1.10.1 35 on a router? (Choose two.)
The remote router updates the Frame Relay map table with DLCI 35 to reach the
10.1.10.0 network. Inverse ARP is used to add an entry for 10.1.10.1 into the Frame
Relay map table via the use of DLCI 35. DLCI 35 replaces the MAC address in the
ARP table for entry 10.1.10.1. A Layer 2 address is statically mapped to a Layer 3
address. Router BRT uses DLCI 35 to forward data to 10.1.10.1.
A user in a large office calls technical support to complain that a PC has suddenly lost
connectivity to the network. The technician asks the caller to talk to nearby users to see if
other machines are affected. The caller reports that several immediate neighbors in the
same department have a similar problem and that they cannot ping each other. Those who
are seated in other departments have connectivity. What should the technician check as
the first step in troubleshooting the issue?
the power outlet to the PC that is used by the caller.
the trunks between switches in the wiring closet.
the status of the departmental workgroup switch in the wiring closet.
the cable that connects the PC of the caller to the network jack.
the cable connection between a PC and a network outlet that is used by a neighbor
Refer to the exhibit. A pre-sales system engineer receives a diagram of the current WAN
from a customer. EIGRP is the routing protocol used on the WAN. Based on the default
operation of EIGRP, which statement is true about the routing table on router R1?
There is a single route to the 192.168.16.0/24 LAN using the T1 connection.
There is a single route to the 192.168.16.0/24 LAN using the DSL connection. There
is a single route to the 192.168.16.0/24 LAN using the Metro Ethernet connection.
EIGRP installs all three routes to the 192.168.16.0/24 LAN and load balances the traffic.
Refer to the exhibit. What will be the result of entering the commands as shown in the
exhibit?
RIPng will not be enabled on interface fa0/0 because the network address is a
broadcast address. RIPng will not be enabled on this interface because the IPv6
address is only /64 bits long. RIPng will be enabled on interface fa0/0 and will
advertise the configured network. The IPv6 interface configuration requires a
network statement for the network. The IPv6 routing instance must be called RTA
not RT0.
A company has branch offices at several locations across the country. Which security
implementation would provide a cost-effective, secure, and authenticated connection to
centralized internal resources that are located at company headquarters, without requiring
configuration for individual employees at the branch offices?
leased line with PPP authentication
site-to-site VPN
access control list
remote-access VPN
Refer to the exhibit. The named ACL "Managers" already exists on the router. What will
happen when the network administrator issues the commands that are shown in the
exhibit?
The commands overwrite the existing Managers ACL. The commands are added
at the end of the existing Managers ACL. The commands are added at the beginning
of the existing Managers ACL. The network administrator receives an error that states
that the ACL already exists.
Refer to the exhibit. A company with four servers in its server farm has not enabled
PVRST on the switches that connect to the server farm segment. What will happen within
the network if a primary link goes down?
Access to the the servers will be lost. Convergence time will be slow and possibly
cause applications to time out. Routing protocols will not send the triggered updates
in the event of a failure of the root bridge. Switches that connect the servers to the
network will not be found by other switches in the network.
Refer to the exhibit. A network engineer issues the show ip route command to validate
that the newly designed network is working as anticipated. Which users will the
Admin_LAN be able to communicate with?
Users on the Admin_LAN will not be able to communicate with users on either
LAN. Users on the Admin_LAN will be able to communicate with the users on the
Faculty_LAN. Users on the Admin_LAN will be able to communicate with the users
on the Student_LAN. Users on the Admin_LAN will be able to communicate with the
users on the Faculty_LAN and the Student_LAN.
Refer to the exhibit. A technician at the ISP site asks the network administrator at the
client site to change the CHAP password as part of the routing security maintenance.
After the administrator makes the change and reboots the router, the technician issues a
show interfaces serial 0/0/0 command. According to the output, what can be concluded
about the serial connection between the client site and ISP site?
The router at the client site is still in the process of rebooting. The administrator
probably configured the wrong password. The administrator has not issued a no shut
command on the serial interface. The administrator probably configured the wrong IP
address for the serial interface.
Refer to the exhibit. A technician at the ISP site asks the network administrator at the
client site to change the CHAP password as part of the routing security maintenance.
After the administrator makes the change and reboots the router, the technician issues a
show interfaces serial 0/0/0 command. According to the output, what can be concluded
about the serial connection between the client site and ISP site?
The router at the client site is still in the process of rebooting. The administrator
probably configured the wrong password. The administrator has not issued a no shut
command on the serial interface. The administrator probably configured the wrong IP
address for the serial interface.
Refer to the exhibit. What does the TOR router do with traffic that is destined for a web
server with an IP address of 172.18.10.24?
The router sends the traffic out Serial 0/0/0. The router sends the traffic out all
interfaces other than the one it came in on. The router places the packets into a queue
until a better route is discovered via RIP. The router sends a request to neighboring
routers for paths to the 172.18.10.0 network.
Refer to the exhibit. The users on the 192.168.10.128/26 network are not allowed Internet
access. Where is the most efficient location to place an extended ACL?
inbound on S0/0/0 of R1 outbound on S0/0/1 of R1 inbound on Fa0/0 of R2
outbound on Fa0/0 of R2 inbound on S0/0/1 of R2
A network designer must select a routing protocol for the network of a customer. The
currently installed network contains both Cisco and non-Cisco routers, and there is no
budget to replace them. The designer plans on implementing both VLSM and route
summarization in the new network design. Which two protocols can provide the
necessary functionality for this LAN? (Choose two.)
RTP
RSTP
RIPv1
RIPv2
EIGRP
OSPF
Refer to the exhibit. A network associate is configuring a new router to provide routing
between VLANs. The associate removes the router from the box and connects the Fa0/0
interface to a trunking port on the switch. After the configuration is applied to the router,
the traffic between VLANs still fails. What is causing this to occur?
The NWRnStick router needs a routing protocol configured. The NWRnStick
router needs additional Fast Ethernet interfaces installed. The subinterfaces of the
NWRnStick router should have IP addresses applied. All the subinterfaces of the
NWRnStick router should be configured in the same VLAN.
Refer to the exhibit. The routers are configured with RIPv2 with default configurations.
When attempting to communicate with other networks, hosts from 10.0.11.0/24 are
experiencing connectivity issues. What could be done to resolve this issue?
Change to a public IP addressing scheme. Use EIGRP with its default
configuration as the routing protocol. Change the subnet mask on the link between R2
and R3 to 255.255.255.0. Disable automatic route summarization on all routers in the
network
Refer to the exhibit. A customer has a problem with connectivity in the network. Based
on the IP addressing scheme, what is causing the problem?
The WAN links need IP addresses from a different major network. The WAN
link that connects R1 to R2 overlaps with the R3 LAN. The WAN links that connect
R1 to R3 and R1 to R2 have incorrect masks. The R1 LAN is incorrect because
subnet zero cannot be used with VLSM.
Which technology will prioritize traffic based upon the technical requirements of IP
telephony?
PoE
QoS
RPC
RTP
VPN
Which statement is true about the pairing of services and transport layer protocols for
FTP and VoIP?
FTP applications and VoIP use TCP at the transport layer.
FTP applications and VoIP use UDP at the transport layer.
FTP applications use TCP at the transport layer while VoIP uses UDP at the transport
layer.
FTP applications use UDP at the transport layer while VoIP uses TCP at the transport
layer.
What type of system connects to the PSTN and uses a PBX to route calls via analog or
digital lines?
VPN VoIP IP telephony traditional telephony
Why is it difficult for network designers to predict the patterns and behavior of file
transfer traffic?
The traffic is user initiated. File size is typically very small. Dedicated
bandwidth is essential. All file transfer traffic is queued as high priority.
A network administrator needs to transfer an IOS image to a router using a TFTP server.
What should be verified prior to beginning the transfer process?
The TFTP server must connect to the router via a serial connection.
Connectivity between the TFTP server and the router should have been established.
The TFTP server and the router must be on different networks for the transfer.
The TFTP server software must be the same version as the Cisco IOS software.
During the boot process and using the default sequence, what is the first location where
the router will look for the IOS?
ROM flash NVRAM TFTP server
Refer to the exhibit. The network administrator has used the Cisco Feature Navigator to
choose a Cisco IOS image to install on a router. Given the exhibited output of the show
version command, which statement is true about the capacity of the router to use this
Cisco IOS image?
There is enough DRAM and flash. There is not enough DRAM and flash.
There is enough DRAM but not enough flash. There is not enough DRAM but
enough flash.
Which two pieces of information are needed before an IOS image may be loaded on a
router from a TFTP server? (Choose two.)
the IP address of the TFTP server the current name of the IOS image on the
router the operating system of the TFTP server the name of the configuration file
in NVRAM the name of the IOS image on the TFTP server encapsulation of the
router interface that is connected to the TFTP server
What can be broadcast over the wireless network to help a user connect to the network
and use wireless services?
SSID WEP keys VLAN parameters WPA encryption keys VPN
authentication information
The network designer recommends using RSTP in the design of a new data center. There
are multiple redundant Layer 2 switches and links contained in the new design. What is
the benefit of using RSTP rather than STP in this situation?
Redundant links are not blocked.
Routing tables converge more quickly.
Spanning Tree convergence times are reduced.
Fewer redundant links are required to maintain connectivity.
A network designer has chosen to specify the use of a dedicated firewall appliance at the
perimeter of a large network. Why would the designer use a dedicated firewall rather than
using the Cisco IOS firewall feature set on the existing router?
Traffic filtering is needed on the internal LAN.
Multiple levels of access to the network are needed.
The DMZ requires packet filtering and port blocking.
Heavy network traffic will be handled best by using a dedicated device.
Refer to the exhibit. What can be concluded from the output that is shown?
MDF_2811 has a MAC address of 2294:300F:0000. Device C3750-24_IDF2
is running Cisco IOS Software Release 12.3(23)SEE2. A Cisco 3750 switch is
connected to the FastEthernet1/0/1 port on MDF_2811. MDF_2811 is installed in
the main distribution facility on floor 28 of building 11.
Sdf