Sie sind auf Seite 1von 7

1 Top of Form

Where does a service provider assume responsibility from a customer for a WAN connection?
local loop

DTE cable on router

demarcation point

demilitarized zone
Bottom of Form

2 Top of Form

Refer to the exhibit. R1 is performing NAT overload for the 10.1.1.0/24 inside network. Host A has sent a
packet to the web server. What is the destination IP address of the return packet from the web server?
10.1.1.2:1234

172.30.20.1:1234

172.30.20.1:3333

192.168.1.2:80
Bottom of Form

3 Top of Form
Which IP address and wildcard mask would be used in an ACL to block traffic from all hosts on the same sub
as host 192.168.16.43/28?
access-list 10 deny 192.168.16.0 0.0.0.31
access-list 10 deny 192.168.16.16 0.0.0.31

access-list 10 deny 192.168.16.32 0.0.0.16

access-list 10 deny 192.168.16.32 0.0.0.15

access-list 10 deny 192.168.16.43 0.0.0.16


Bottom of Form

4 Top of Form

Refer to the exhibit. What is the meaning of the term dynamic in the output of the command?
The bandwidth capability of the interface increases and decreases automatically based on BECNs.

The Serial0/0/1 interface acquired 172.16.3.1 from a DHCP server.

The mapping between DLCI 100 and 172.16.3.1 was learned through Inverse ARP.

DLCI 100 will automatically adapt to changes in the Frame Relay cloud.
Bottom of Form

5 Top of Form
An administrator learns of an e-mail that has been received by a number of users in the company. This e-mai
appears to come from the office of the administrator. The e-mail asks the users to confirm their account and
password information. Which type of security threat does this e-mail represent?
cracking

phishing

phreaking

spamming
Bottom of Form

6 Top of Form
What are two effective measures for securing routers? (Choose two.)
Protect all active router interfaces by configuring them as passive interfaces.
Configure remote administration through VTY lines for Telnet access.

Use quotes or phrases to create pass phrases.

Disable the HTTP server service.

Enable SNMP traps.


Bottom of Form

7 Top of Form
Which combination of Layer 2 protocol and authentication should be used to establish a link without sending
authentication information in plain text between a Cisco and a non-Cisco router?
PPP with PAP

PPP with CHAP

HDLC with PAP

HDLC with CHAP


Bottom of Form

8 Top of Form
A network administrator has changed the VLAN configurations on his network switches over the past weeke
How can the administrator determine if the additions and changes improved performance and availability on
company intranet?
Conduct a performance test and compare with the baseline that was established previously.

Interview departmental secretaries and determine if they think load time for web pages has improved.

Determine performance on the intranet by monitoring load times of company web pages from remote sit
Compare the hit counts on the company web server for the current week to the values that were recorded
previous weeks.
Bottom of Form

9 Top of Form
Which type of ACL will permit traffic inbound into a private network only if an outbound session has alread
been established between the source and destination?
extended

reflexive

standard
time-based
Bottom of Form

10 Top of Form

Refer to the exhibit. This serial interface is not functioning correctly. Based on the output shown, what is the
most likely cause?
improper LMI type

interface reset

PPP negotiation failure

unplugged cable
Bottom of Form

11 Top of Form
Refer to the exhibit. RIPv2 has been configured on all routers in the network. Routers R1 and R3 have not
received any RIP routing updates. What will fix the issue?
Enable RIP authentication on R2.

Issue the ip directed-broadcast command on R2.

Change the subnet masks to 10.11.12.0/8 and 172.16.40.0/16 on R2.

Enable CDP on R2 so that the other routers will receive routing updates.
Bottom of Form

12 Top of Form
Refer to the exhibit. All devices are configured as shown in the exhibit. PC1 is unable to ping the default
gateway. What is the cause of the problem?
The default gateway is in the wrong subnet.

STP has blocked the port that PC1 is connected to.

Port Fa0/2 on S2 is assigned to the wrong VLAN.

S2 has the wrong IP address assigned to the VLAN30 interface.


Bottom of Form

13 Top of Form
Which statement is true about PAP in the authentication of a PPP session?
PAP uses a two-way handshake.

The password is unique and random.

PAP conducts periodic password challenges.

PAP uses MD5 hashing to keep the password secure.


Bottom of Form

14 Top of Form
Which technology is used to dynamically map next hop, network layer addresses to virtual circuits in a Fram
Relay network?
Inverse ARP

LMI

DLCI

FECN
Bottom of Form

15 Top of Form
What is tunneling?
using digital certificates to ensure that data endpoints are authentic

creating a hash to ensure the integrity of data as it traverses a network

using alternate paths to avoid access control lists and bypass security measures

encapsulating an entire packet within another packet for transmission over a network
Bottom of Form

Das könnte Ihnen auch gefallen