Company ABC expanded its business and recently opened a new
branch office in another country. IPv6 addresses have been used for the company networ. !he data servers "erver1 and "erver# run applications which re$uire end%to%end functionality& with unmodified pacets that are forwarded from the source to the destination. !he ed'e routers R1 and R# support dual stac confi'uration. (hat solution should be deployed at the ed'e of the company networ in order to successfully interconnect both offices) a manually configured IPv6 tunnel between the edge routers R1 and R2
#. An administrator is confi'urin' a dual stac router with IPv6 and IPv* usin' RIPn'. !he administrator receives an error messa'e when tryin' to enter the IPv* routes into RIPn'. (hat is the cause of the problem) IPv4 is incompatible with RIPng. 3. Refer to the exhibit. A networ administrator has issued the commands that are shown on Router1 and Router#. A later review of the routin' tables reveals that neither router is learnin' the +A, networ of the nei'hbor router. (hat is most liely the problem with the RIPn' confi'uration) he RIPng process is not enabled on interfaces. *.- (hich statement is true about ,CP) !ach networ" protocol has a corresponding #$P. % (hich I... /-#.16 broadband wireless technolo'y allows users to connect to the I"P at speeds comparable to 0"+ and cable) &i'a( 6 A networ administrator is tased with maintainin' two remote locations in the same city. Both locations use the same service provider and have the same service plan for 0"+ service. (hen comparin' download rates& it is noticed that the location on the .ast side of town has a faster download rate than the location on the (est side of town. 1ow can this be explained) he service provider is closer to the location on the !ast side. 2 Refer to the exhibit. Router1 and Router# are directly connected over a point%to%point serial lin. Router1 initiates a PPP session with Router#. (hich statement is true based on the confi'uration) ) hash value of the username and password are sent * Refer to the exhibit. A host connected to 3a-4- is unable to ac$uire an IP address from the 01CP server. !he output of the debug ip dhcp server command shows 501CP06 there is no address pool for 17#.16/.8.129. (hat is the problem) he pool of addresses for the 1+2#etwor" pool is configured incorrectly. + A system administrator must provide Internet connectivity for ten hosts in a small remote office. The ISP has assigned two public IP addresses to this remote office. How can the system administrator configure the router to provide Internet access to all ten users at the same time? $onfigure dynamic #) with overload. 1, (hen ,A! is in use& what is used to determine the addresses that can be translated on a Cisco router) access control list 11 A li'ht manufacturin' company wishes to replace its 0"+ service with a non%line%of%si'ht broadband wireless solution that offers comparable speeds. (hich solution should the customer choose) &i'a( 1# A technician has been ased to run Cisco "0: one%step locdown on the router of a customer. (hat will be the result of this process) he router is tested for potential security problems and any necessary changes are made. 18 Refer to the exhibit. (hat is placed in the address field in the header of a frame that will travel from the 0C router to the ;rlando router) -.$I 321 14 Refer to the exhibit. 1ow is the !CP4IP confi'uration information specified by thedefault/ router and dns/server commands made available) he $P0IP information is supplied to any -1$P client on the networ" connected to the 2ast!thernet ,0, interface of R1 1< (here does a service provider assume responsibility from a customer for a (A, connection) demarcation point 16 (hen confi'urin' a 3rame Relay connection& what is the purpose of Inverse ARP) to create a mapping of -.$I to .ayer 3 addresses that belong to remote peers 13 (hich three 'uidelines would help contribute to creatin' a stron' password policy) =Choose three.> 0eliberately misspell words when creatin' passwords. Create passwords that are at least / characters in len'th. ?se combinations of upper case& lower case& and special characters. 1/ Refer to the exhibit. A networ administrator is tryin' to bacup the I;" software on R1 to the !3!P server. 1e receives the error messa'e that is shown in the exhibit& and cannot pin' the !3!P server from R1. (hat is an action that can help to isolate this problem) Chec that R1 has a route to the networ where the !3!P server resides 17 (hich option correctly defines the capacity throu'h the local loop 'uaranteed to a customer by the service provider) $IR #- (hich encapsulation protocol when deployed on a Cisco router over a serial interface is only compatible with another Cisco router) PPP "+IP 10+C 3rame Relay #1 Which data lin layer encapsulation protocol is used by default for serial connections between two !isco routers? AT" #rame $elay H%&! ## Refer to the exhibit. (hich statement is true about the 3rame Relay connection) !he 3rame Relay connection is in the process of ne'otiation. A con'estion control mechanism is enabled on the 3rame Relay connection. #8 What is a characteristic feature of a worm? e'ploits a nown vulnerability #* Refer to the exhibit. !his router is bein' confi'ured to use "0:& but the "0: interface of the router cannot be accessed. (hat is the cause of the problem) !he @!A lines are not confi'ured correctly. #< Refer to the exhibit. A networ administrator is confi'urin' 3rame Relay on router 1B. It is desired that each 3rame Relay P@C between the routers be in a separate subnet. (hich two commands on 1B will accomplish this tas for the connection to R1) =Choose two.> 145config67 interface 8,0,0,.1 point/to/point 145config/subif67 frame/relay interface dlci 3,1 Refer to the exhibit. Results of the show vlan and show vtp status commands for switches "1 and "# are displayed in the exhibit. @+A, 11 was created on "1. (hy is @+A, 11 missin' from "#) . !he @!P domain names do not match. (hich characteristic of @P, technolo'y prevents the contents of data communications from bein' read by unauthoriCed parties) confidentiality An issue of response time has recently arisen on an application server. !he new release of a software paca'e has also been installed on the server. !he confi'uration of the networ has chan'ed recently. !o identify the problem& individuals from both teams responsible for the recent chan'es be'in to investi'ate the source of the problem. (hich statement applies to this situation) It will be difficult to isolate the problem if two teams are implementin' chan'es independently. Refer to the exhibit. All devices are confi'ured as shown in the exhibit. PC1 is unable to pin' the default 'ateway. (hat is the cause of the problem) Port 3a-4# on "# is assi'ned to the wron' @+A,. (hich type of AC+ will permit traffic inbound into a private networ only if an outbound session has already been established between the source and destination) refle(ive (hich statement is true about wildcard mass) ) wildcard mas" of ,.,.,., means the address should match e(actly. Refer to the exhibit. (hat is the effect of the extended AC+ when applied inbound on the "-4-4- interface on R#) 9nly elnet traffic destined for 132.16.1,.,024 will be permitted during the specified days and time range. Refer to the exhibit. 3rom the output of the show interfaces and pin' commands& at which layer of the ;"I model is a fault indicated) networ" An administrator is unable to receive e%mail. (hile troubleshootin' the problem& the administrator is able to pin' the local mail server IP address successfully from a remote networ and can successfully resolve the mail server name to an IP address via the use of the nslooup command. At what ;"I layer is the problem most liely to be found) application layer Refer to the exhibit. 3rom the output of the show interface commands& at which ;"I layer is a fault indicated) data lin" Refer to the exhibit. RIPv# has been confi'ured on all routers in the networ. Routers R1 and R8 have not received any RIP routin' updates. (hat will fix the issue) !nable RIP authentication on R2. (hich two protocols in combination should be used to establish a lin with secure authentication between a Cisco and a non%Cisco router) =Choose two.> PPP $1)P (hich variable is permitted or denied by a standard access control list) source IP address (hich option represents a best practice for applyin' AC+s) !(tended )$.s should be applied closest to the source that is specified by the )$.. Refer to the exhibit. (hat happens if the networ administrator issues the commands shown when an AC+ called :ana'ers already exists on the router) he commands are added at the end of the e(isting 'anagers )$.. (hich two statements are true about creatin' and applyin' access lists) =Choose two.> here is an implicit deny at the end of all access lists. 9ne access list per port: per protocol: per direction is permitted. (hat is the result when the command permit tcp 1,.2%.132., ,.,.,.2%% any e; smtp is added to a named access control list and applied on the inbound interface of a router) raffic using port 2% from the 1,.2%.132.,024 is permitted to all destinations. Refer to the exhibit. (hich statement correctly describes how Router1 processes an 3!P re$uest enterin' interface s-4-4-& destined for an 3!P server at IP address 17#.16/.1.<) It matches the incoming pac"et to the access/list 1,1 permit ip any 1+2.16*.1., ,.,.,.2%% statement: ignores the remaining statements in )$. 1,1: and allows the pac"et into the router. Refer to the exhibit. RIPv# has been confi'ured on all routers in the networ. Routers R1 and R8 have not received any RIP routin' updates. (hat will fix the issue !nable RIP authentication on R#. (hich additional functionality is available on an interface when the encapsulation is chan'ed from 10+C to PPP) )uthentication Refer to the exhibit. (hat statement is true about the core router devices) hey support multiple telecommunications interfaces of the highest speed and are able to forward IP pac"ets at full speed on all of those interfaces A company uses a P@C with a committed information rate =CIR> of 1#/ b4s and a committed burst information rate =CBIR> of 6* b4s. !he lin is used to periodically send updates at a rate of 1** b4s. (hat will happen to the update traffic) he traffic will be sent: but the burst traffic will be mar"ed for discard if congestion is encountered. (hich security solution has the responsibility of monitorin' suspicious processes that are runnin' on a host and that mi'ht indicate infection of !roDan horse applications) antivirus application A company is looin' for a (A, solution to connect its head$uarters site to four remote sites. (hat are two advanta'es that dedicated leased lines provide compared to a shared 3rame Relay solution) =Choose two.> reduced <itter reduced latency Refer to the exhibit. !his serial interface is not functionin' correctly. Based on the output shown& what is the most liely cause) PPP negotiation failure (hat will be the result of addin' the command ip dhcp e(cluded/address 1,.1,.4.1 1,.1,.4.% to the confi'uration of a local router that has been confi'ured as a 01CP server) he -1$P server will not issue the addresses ranging from 1,.1,.4.1 to 1,.1,.4.%. Refer to the exhibit. A host connected to 3a-4- is unable to ac$uire an IP address from this 01CP server. !he output of the debug ip dhcp server command shows 501CP06 there is no address pool for 17#.16/.1.19. (hat is the problem) he pool of addresses for the 1+2#etwor" pool is incorrect. Refer to the exhibit. R1 is performin' ,A! overload for the 1-.1.1.-4#* inside networ. 1ost A has sent a pacet to the web server. (hat is the destination IP address of the return pacet from the web server) 132.3,.2,.1=3333 Refer to the exhibit. A networ administrator has issued the commands that are shown on Router1 and Router#. A later review of the routin' tables reveals that neither router is learnin' the +A, networ of the nei'hbor router. (hat is most liely the problem with the RIPn' confi'uration) he RIPng process is not enabled on interfaces. Refer to the exhibit. 1ow is the !CP4IP confi'uration information specified by thedefault/ router and dns/server commands made available) he $P0IP information is supplied to any -1$P client on the networ" connected to the 2ast!thernet ,0, interface of R1. (hich statement is true about an interface that is confi'ured with the IPv6 addresscommand) ) lin"/local IPv6 address is automatically configured on the interface (hich encapsulation protocol when deployed on a Cisco router over a serial interface is only compatible with another Cisco router) 1-.$ (hich additional functionality is available on an interface when the encapsulation is chan'ed from 10+C to PPP) )uthentication (hat name is 'iven to the location where a customer networ interfaces with a networ that is owned by another or'aniCation) demarcation point Refer to the exhibit. (hich data transmission technolo'y is bein' represented) -' Refer to the exhibit. (hat statement is true about the core router devices) hey support multiple telecommunications interfaces of the highest speed and are able to forward IP pac"ets at full speed on all of those interfaces. (hich combination of +ayer # protocol and authentication should be used to establish a lin without sendin' authentication information in plain text between a Cisco and a non%Cisco router) PPP with $1)P Refer to the exhibit. Communication between two peers has failed. Based on the output that is shown& what is the most liely cause) PPP negotiation failure Refer to the exhibit. !he lin between the C!R+ and BRE1 routers is confi'ured as shown in the exhibit. (hy are the routers unable to establish a PPP session) he usernames are misconfigured. (hich statement is true about PAP in the authentication of a PPP session) P)P uses a two/way handsha"e. Refer to the exhibit. Branch A has a non%Cisco router that is usin' I.!3 encapsulation and Branch B has a Cisco router. After the commands that are shown are entered& R1 and R# fail to establish the P@C. !he R# +:I is Cisco& and the R1 +:I is A,"I. !he +:I is successfully established at both locations. (hy is the P@C failin') he I!2 parameter is missing from the frame/relay map ip 1,.1,.1,.1 2,1 command. Refer to the exhibit. (hat is placed in the address field in the header of a frame that will travel from the "an Fose router to the 0C router) -.$I 3,1 Refer to the exhibit. (hich two conclusions can be drawn from the output shown) =Choose two.> his networ" is e(periencing congestion. he networ" is discarding eligible pac"ets. (hich technolo'y is used to dynamically map next hop& networ layer addresses to virtual circuits in a 3rame Relay networ) Inverse )RP (hich three functions are provided by the +ocal :ana'ement Interface used in 3rame Relay networs) =Choose three.> e(change information about the status of virtual circuits provide flow control send "eepalive pac"ets to verify operation of the P>$ Refer to the exhibit. Aou are a networ administrator who has been tased with completin' the 3rame Relay topolo'y that interconnects two remote sites. 1ow should the point%to% point subinterfaces be confi'ured on 1B to complete the topolo'y) 145config/subif67 frame/relay interface/dlci 3,1 on 8erial ,0,0,.1 145config/subif67 frame/relay interface/dlci 3,2 on 8erial ,0,0,.2 Refer to the exhibit. !o reach R#& and for confi'urin' 3rame Relay on the point%to%point interfaces shown in the 'raphic& which 0+CI should be used in the frame/relay interface/dlci command that is issued on R1) 1,, (hen would the multipoint eyword be used in 3rame Relay P@Cs confi'uration) when participating routers are in the same subnet A technician is talin' to a collea'ue at a rival company and comparin' 0"+ transfer rates between the two companies. Both companies are in the same city& use the same service provider& and have the same rate4service plan. (hat is the explanation for why company 1 reports hi'her download speeds than company # reports) $ompany 2 is located farther from the service provider than company 1 is. (hat are two main components of data confidentiality) =Choose two.> encapsulation encryption (hich I... /-#.16 broadband wireless technolo'y allows users to connect to the I"P at speeds comparable to 0"+ and cable) &i')? A technician has been ased to run the Cisco "0: one%step locdown on a customer router. (hat will be the result of this process) he router is tested for any potential security problems and all recommended security/related configuration changes will be automatically applied. Refer to the exhibit. A networ administrator is tryin' to bacup the I;" software on R1 to the !3!P server. 1e receives the error messa'e that is shown in the exhibit& and cannot pin' the !3!P server from R1. (hat action can help to isolate this problem) $hec" that R1 has a route to the 1,.1,.1,., networ". (hich type of networ attac exploits vulnerabilities in the compromised system with the intent of propa'atin' itself across a networ) &orm (hich method is most effective in protectin' the routin' information that is propa'ated between routers on the networ) $onfigure routing protocol authentication. (hat is a common use of a !3!P server) to perform I98 image and configuration uploads and downloads over the networ" Refer to the exhibit. !his router is bein' confi'ured to use "0:& but the "0: interface of the router cannot be accessed. (hat is the cause of the problem) he >@ lines are not configured correctly. (hat is the result when the command security passwords min/length * is entered into a router) )ll new passwords are re;uired to be a minimum of * characters in length. A networ administrator is instructin' a technician on best practices for applyin' AC+s. (hich su''estion should the administrator provide) !(tended )$.s should be applied closest to the source that is specified by the )$.. (hich variable is permitted or denied by a standard access control list) source IP address Refer to the exhibit. (hich statement correctly describes how Router1 processes an 3!P re$uest pacet that enters interface "-4-4-& and is destined for an 3!P server at IP address 12#.16.1.<) he router matches the incoming pac"et to the statement that was created by the access/list 1,1 permit ip any 132.16.1., ,.,.,.2%% command: ignores the remaining statements in )$. 1,1: and allows the pac"et into the router. (hich two statements are true about creatin' and applyin' access lists) =Choose two.> ;ne access list per port& per protocol& per direction is permitted. Access list entries should filter in the order from 'eneral to specific. "tatements are processed se$uentially from top to bottom until a match is found. (hich statement is true about wildcard mass) ) wildcard mas" of ,.,.,., means the address should match e(actly. Refer to the exhibit. !he networ administrator creates a standard access control list to prohibit traffic from the 17#.16/.1.-4#* networ from reachin' the Internet. !he access list must still permit the 17#.16/.1.-4#* networ access to the 17#.16/.#.- networ. ;n which router interface and in which direction should the access control list be applied) interface 8,0,0,: outbound Refer to the exhibit. AC+ 1#- is confi'ured to allow traffic comin' from 17#.16/.1-.-4#* networ to 'o to any destination limited to ports /- and **8. AC+ 18- should allow only re$uested 1!!P traffic to flow bac into the networ. (hat additional confi'uration is needed in order for the access lists to fulfill the re$uirements) Refer to the exhibit. .IGRP has been confi'ured as a routin' protocol on the networ. ?sers on the 17#.16/.1.-4#* networ should have full access to the web server that is connected to 17#.16/.8.-4#* but should not be allowed to telnet to router R8. @erifyin' the confi'uration& the networ administrator realiCes that users on networ 17#.16/.1.-4#* can successfully telnet to the router. (hat should be done to remedy the problem) he )$. 1,1 statements 1, and 2, should be reversed. Refer to the exhibit. (hich statement is true about the confi'uration of R1) he remote session is encrypted. A networ administrator has moved the company intranet web server from a switch port to a dedicated router interface. 1ow can the administrator determine how this chan'e has affected performance and availability on the company intranet) $onduct a performance test and compare with the baseline that was established previously. An administrator is unable to receive e%mail. (hile troubleshootin' the problem& the administrator is able to pin' the local mail server IP address successfully from a remote networ and can successfully resolve the mail server name to an IP address via the use of the nsloo"up command. At what ;"I layer is the problem most liely to be found) application layer Refer to the exhibit. A technician issues the show interface s,0,0, command on R1 while troubleshootin' a networ problem. (hat two conclusions can be determined by from the output shown) =Choose two.> !he bandwidth has been set to the value of a !1 line. !his interface should be confi'ured for PPP encapsulation. !here is no failure indicated in an ;"I +ayer 1 or +ayer #. A recently patched application server is experiencin' response time problems. !he networ on which the application server is located has been experiencin' occasional outa'es that the networ team believes may be related to recent routin' chan'es. ,etwor and application teams have been notified to wor on their respective issues. (hich statement applies to this situation) It will be difficult to isolate the problem if two teams are implementing changes independently. Refer to the exhibit. 3rom the output of the show interfaces commands& at which ;"I layer is a fault indicated) Physical Refer to the exhibit. RIPv# has been confi'ured on all routers in the networ. Routers R1 and R8 have not received any RIP routin' updates. (hat will fix the issue) !nable RIP authentication on R2. Refer to the exhibit. All devices are confi'ured as shown in the exhibit. PC1 is unable to pin' the default 'ateway. (hat is the cause of the problem) Port 2a,02 on 82 is assigned to the wrong >.)#. Refer to the exhibit. Results of the show vlan and show vtp status commands for switches "1 and "# are displayed in the exhibit. @+A, 11 was created on "1. (hy is @+A, 11 missin' from "#) he >P domain names do not match. (hat will be the result of addin' the command ip dhcp e(cluded/address 1,.1,.4.1 1,.1,.4.% to the confi'uration of a local router that has been confi'ured as a 01CP server)) he -1$P server will not issue the addresses ranging from 1,.1,.4.1 to 1,.1,.4.%. Refer to the exhibit. A networ administrator has issued the commands that are shown on Router1 and Router#. A later review of the routin' tables reveals that neither router is learnin' the +A, networ of the nei'hbor router. (hat is most liely the problem with the RIPn' confi'uration)) he RIPng process is not enabled on interfaces. A system administrator must provide Internet connectivity for ten hosts in a small remote office. !he I"P has assi'ned two public IP addresses to this remote office. 1ow can the system administrator confi'ure the router to provide Internet access to all ten users at the same time)) $onfigure dynamic #) with overload. (hich encapsulation protocol when deployed on a Cisco router over a serial interface is only compatible with another Cisco router)) 1-.$ A networ administrator has chan'ed the @+A, confi'urations on his networ switches over the past weeend. 1ow can the administrator determine if the additions and chan'es improved performance and availability on the company intranet)) $onduct a performance test and compare with the baseline that was established previously. An administrator is unable to receive e%mail. (hile troubleshootin' the problem& the administrator is able to pin' the local mail server IP address successfully from a remote networ and can successfully resolve the mail server name to an IP address via the use of the nsloo"up command. At what ;"I layer is the problem most liely to be found)) application layer Refer to the exhibit. R1 is performin' ,A! overload for the 1-.1.1.-4#* inside networ. 1ost A has sent a pacet to (eb "erver. (hat is the destination IP address of the return pacet from (eb "erver when received at R1)) 132.3,.2,.1=3333 (hile confi'urin' a router usin' RIPn' and dual%stac technolo'y with IPv* and IPv6& the administrator receives an error messa'e when inputtin' IPv* routes. (hat could cause the error messa'e)) IPv4 is not compatible with RIPng A networ administrator is worin' with an applications team to fix a problem that a server based application is havin' with response time. !he administrator has examined the networ portions of the data path and identified several possible problem areas. !he applications team has simultaneously identified potential issues with the current release of software. !he networ administrator be'ins addressin' the networ issues while the applications team implements software patches. (hich statement applies to this situation)) It will be difficult to isolate the problem if two teams are implementing changes independently. Refer to the exhibit. A technician issues the show interface s,0,0, command on R1 while troubleshootin' a networ problem. (hat two conclusions can be determined by from the output shown)) =Choose two.> he bandwidth has been set to the value of a 1 line. here is no failure indicated in an 98I .ayer 1 or .ayer 2. Refer to the exhibit. (hich confi'uration command would result in the output in the exhibit)) ip nat inside source static 1+2.16*.,.1, 132.16.36.3 At what physical location does the responsibilty for a (A, connection chan'e from the user to the service provider)) demarcation point Refer to the exhibit. 3rom the output of the show interfaces commands& at which ;"I layer is a fault indicated)) Physical Refer to the exhibit. RIPv# has been confi'ured on all routers in the networ. Routers R1 and R8 have not received any RIP routin' updates. (hat will fix the issue)) !nable RIP authentication on R2. (hich additional functionality is available on an interface when the encapsulation is chan'ed from 10+C to PPP) )uthentication Refer to the exhibit. All devices are confi'ured as shown in the exhibit. PC1 is unable to pin' the default 'ateway. (hat is the cause of the problem) Port 2a,02 on 82 is assigned to the wrong >.)#. Refer to the exhibit. Results of the show vlan and show vtp status commands for switches "1 and "# are displayed in the exhibit. @+A, 11 was created on "1. (hy is @+A, 11 missin' from "#) he >P domain names do not match. Refer to the exhibit. (hich data transmission technolo'y is bein' represented) -' (hy is serial communication preferred over parallel communication for lon' distance (A, lins) 8erial cables contain a single wire: resulting in faster transmission speeds. (hich combination of authentication and +ayer # protocol should be used to establish a lin between a Cisco and a non%Cisco router without sendin' authentication information in plain text) $1)P and PPP Refer to the exhibit. (hy are the routers unable to establish a PPP session) he usernames are misconfigured. Refer to the exhibit. Communication between two peers has failed. Based on the output that is shown& what is the most liely cause) PPP negotiation failure Refer to the exhibit. Router1 is not able to communicate with its peer that is connected to this interface. Based on the output as shown& what is the most liely cause) unplugged cable Refer to the exhibit. A networ administrator is tased with completin' the 3rame Relay topolo'y that interconnects two remote sites. 1ow should the point%to%point subinterfaces be confi'ured on 1B to complete the topolo'y) frame/relay interface/dlci 3,1 on "erial -4-4-.1 frame/relay interface/dlci 3,2 on "erial -4-4-.# (hat does an access control list determine when used with ,A! on a Cisco router) addresses that are to be translated (hich option correctly defines the capacity throu'h the local loop 'uaranteed to a customer by the service provider) $IR (hat does an access control list determine when used with ,A! on a Cisco router) addresses that are to be translated Refer to the exhibit. (hat is placed in the address field in the header of a frame that will travel from the ;rlando router to the 0C router) -.$I 123 (hen 3rame Relay encapsulation is used& what feature provides flow control and exchan'es information about the status of virtual circuits) .'I (hich 3rame Relay flow control mechanism is used to si'nal routers that they should reduce the flow rate of frames) 2!$# Refer to the exhibit. A networ administrator is attemptin' to confi'ure a 3rame Relay networ. !he administrator enters the commands as shown in the exhibit on R#& but the 3rame Relay P@Cs are inactive. (hat is the problem) he incorrect -.$I numbers are being configured on R2. Refer to the exhibit. A technician is teachin' a trainee to interpret the results of various 3rame Relay troubleshootin' commands. (hat conclusion can be drawn from the output that is shown) o reach 1+2.16*.3.1: the Aranch router will use the virtual circuit that is identified by -.$I 133. (hich statement about a @P, is true) >P#s use virtual .ayer 3 connections that are routed through the Internet. networ administrator is tased with maintainin' two remote locations in the same city. Both locations use the same service provider and have the same service plan for 0"+ service. (hen comparin' download rates& it is noticed that the location on the .ast side of town has a faster download rate than the location on the (est side of town. 1ow can this be explained) he service provider is closer to the location on the !ast side. (hat course of action will ensure data confidentiality) Protect data from eavesdropping. (hich three 'uidelines would help contribute to creatin' a stron' password policy) =Choose three.> 0eliberately misspell words when creatin' passwords. Create passwords that are at least / characters in len'th. ?se combinations of upper case& lower case& and special characters. A technician has been ased to run the Cisco "0: one%step locdown on a customer router. (hat will be the result of this process) It will automatically apply all recommended security/related configuration changes. (hat are two maDor characteristics of a worm) =Choose two.> e(ploits "nown vulnerabilities copies itself to the host and selects new targets An administrator issues the command confreg ,B2142 at the rommon 1H prompt. (hat is the effect when this router is rebooted) $ontents in #>R)' will be ignored. (hat are three attributes of a security policy) =Choose three.> It defines acceptable and unacceptable use of networ" resources. It defines a process for managing security violations. It creates a basis for legal action if necessary. Refer to the exhibit. A networ administrator is considerin' updatin' the I;" on Router1. (hat version of I;" is currently installed on Router1) 12.4 (hat is the function of an intrusion detection system on a networ) to detect attac"s against a networ" and send logs to a management console (hich variable is permitted or denied by a standard access control list) source IP address (hich statement is true about wildcard mass) IP address bits that must be chec"ed are identified by a C,D in the wildcard mas". Refer to the exhibit. !he networ administrator creates a standard access control list to prohibit traffic from the 17#.16/.1.-4#* networ from reachin' the 17#.16/.#.-4#* networ while still permittin' Internet access for all networs. ;n which router interface and in which direction should it be applied) interface 2a,01: outbound Refer to the exhibit. (hich statement correctly describes how Router1 processes an 3!P re$uest that enters interface s-4-4- and is destined for an 3!P server at IP address 17#.16/.1.<) !he router matches the incomin' pacet to the statement that was created by the access/ list 1,1 permit ip any 1+2.16*.1., ,.,.,.2%% command and allows the pacet into the router. A networ administrator is instructin' a technician on best practices for applyin' AC+s. (hich two su''estions should the administrator provide) =Choose two.> Place standard )$.s as close to the destination as possible. !(tended )$.s should be applied closest to the source that is specified by the )$.. Refer to the exhibit. An AC+ called :ana'ers already exists on this router. (hat happens if the networ administrator issues the commands as shown in the exhibit) he commands are added to the end of the e(isting )$.. A technician is editin' and reapplyin' AC+ 11< to a router& what is the result of addin' the command access/list 11% permit tcp any 132.16.,., ,.,.2%%.2%% established to the AC+ when it is reapplied to the router) Responses to traffic that originates from the 132.16.,.,016 networ" are allowed. Refer to the exhibit. Based on the output as shown& which two statements correctly define how the router will treat !elnet traffic that comes into interface 3ast.thernet -41) =Choose two>. elnet to 132.16.2,.,024 is denied. elnet to 132.16.1,.,024 is permitted.