Sie sind auf Seite 1von 9

Selametle Ali,

1-)A small company has contracted with its ISP for web hosting. Which two items would be included
in the SLA for this service? (Choose two.)

a-) performance
b-) web server cost
c-) service availability
d-) operating system on the web server
e-) web server model and configuration

2-)Refer to the exhibit. All cables are working and all devices have IP addresses. However, H1 cannot
ping the server. What is the cause of the problem?

a-) The default gateway is incorrect on R1.


b-) The switch should be assigned an IP address.
c-) H1 and the server are on different subnetworks.
d-) H1 does not know the physical address of the server.

3-)Which service team in an ISP is responsible for determining if the new customer has hardware that
will support the new WAN connection and if new WAN circuits need to be installed?

a-) customer service


b-) onsite installation
c-) planning and provisioning
d-) network operations center

4-)Why are port numbers included in the TCP header of a segment?

a-) to indicate the correct router interface that should be used to forward a segment
b-) to identify which switch ports should receive or forward the segment
c-) to determine which Layer 3 protocol should be used to encapsulate the data
d-) to enable a receiving host to forward the data to the appropriate application
e-) to allow the receiving host to assemble the packet in the proper order

5-)Which routing protocol depends on the DUAL algorithm to calculate the shortest path to a
destination?

a-) OSPF
b-) EIGRP
c-) RIP
d-) BGP

6-)Which protocol allows secure in-band management so that a network administrator can monitor and
configure network devices without fear of any passwords being compromised?

a-) SSH
b-) HTTP
c-) SNMP
d-) Telnet

7-)Which two processes enable a router to determine paths to destination networks? (Choose two.)

a-) inspection of the source IP address in data packets


b-) ARP requests from connected routers
c-) manual configuration of routes
d-) updates from other routers
e-) DHCP information broadcasts
f-) updates from the SMTP management information base

8-)Which type of address is 192.168.17.111/28?

a-) host address


b-) network address
c-) broadcast address
d-) multicast address

9-)If the configuration register is currently set to 0x2102, what is the first action that a router will take
after the bootstrap program loads successfully?

a-) load the IOS from flash


b-) load the IOS from NVRAM
c-) load the IOS from the TFTP server
d-) load the startup configuration file from flash
e-) load the startup configuration file from NVRAM
f-) load the startup configuration file from the TFTP server

10-)What occurs during a static NAT translation?

a-) Multiple local addresses are mapped to one global address.


b-) The host device is configured with a permanent outside global address.
c-) A one-to-one mapping is created between an inside local and outside global address.
d-) The router is forced to return the inside global address to the address pool when a session ends.

11-)Which application can be delivered using UDP?

a-) FTP
b-) DNS
c-) HTTP
d-) SMTP

12-)Refer to the exhibit. A NOC technician at an ISP enters the command c:\ping 209.165.201.7.
What are two reasons to use this command? (Choose two.)

a-) map the path to 209.165.201.7


b-) test reachability to 209.165.201.7
c-) locate connectivity problems along the route to 209.165.201.7
d-) identify ISPs that interconnect the NOC and remote host with IP 209.165.201.7
e-) measure the time that packets take to reach 209.165.201.7 and return to the technician's
workstation

13-)Which statement correctly describes the function of AAA?

a-) It prevents unauthorized access to a network.


b-) It filters traffic based on destination IP and port number.
c-) It enables users to send information to a daemon that is running on a management station.
d-) It encrypts data to provide network security.
14-)Refer to the exhibit. The S0/0/0 interface of R2 is configured correctly with the default
encapsulation. Which configuration should be implemented at the S0/0/0 interface of R1 to complete
the connection between the two routers?

a-) R1(config-if)# ip address 192.168.1.31 255.255.255.252


R1(config-if)# no shutdown
b-) R1(config-if)# ip address 192.168.1.33 255.255.255.252
R1(config-if)# encapsulation PPP
R1(config-if)# no shutdown
c-) R1(config-if)# ip address 192.168.1.28 255.255.255.252
R1(config-if)# encapsulation PPP
R1(config-if)# no shutdown
d-) R1(config-if)# ip address 192.168.1.29 255.255.255.252
R1(config-if)# no shutdown

15-)Which two commands ensure that any password that permits access to the privileged EXEC mode
is not shown in plain text when the configuration files are displayed? (Choose two.)

a-) Router(config)# enable secret cisco


b-) Router(config)# enable cisco
c-) Router(config)# encryption-password all
d-) Router(config)# enable login encrypted
e-) Router(config)# enable password encryption
f-) Router(config)# service password-encryption

16-) What is the purpose of the routing process?

a-) to encapsulate data that is used to communicate across a network


b-) to select the paths that are used to direct traffic to destination networks
c-) to convert a URL name into an IP address
d-) to provide secure Internet file transfer
e-) to forward traffic on the basis of MAC addresses

17-)A company is developing an Internet store for its website. Which protocol should be used to
transfer credit card information from customers to the company web server?

a-) FTPS
b-) HTTP
c-) HTTPS
d-) WEP2
e-) TFTP

18-)What will a router do with a packet that is destined for a host with the IP address 192.168.1.5/24 if
no entry for the 192.168.24.0/24 network exists in the routing table?

a-) It will broadcast the packet out of all of its active interfaces except the interface that received the
packet.
b-) It will send the packet back to the source address.
c-) It will drop the packet.
d-) It will broadcast the packet out of all of its active interfaces.
19-)Refer to the exhibit. What is the device named "Distribution"?

a-) a firewall
b-) a router
c-) a switch
d-) an IP phone

20-)Refer to the exhibit. While configuring the serial interface of a router, the network administrator
sees the highlighted error message. What is the reason for this?

a-) The serial interface is administratively down.


b-) The serial interface is already configured with an IP address.
c-) The network administrator has attempted to configure the serial interface with a broadcast address.
d-) The same IP address has been configured on another interface.

21-)Refer to the exhibit. What does the highlighted value 120 represent?

a-) the number of hops between the router and network 10.0.5.0
b-) the administrative distance of the routing protocol
c-) the UDP port number that is used for forwarding traffic
d-) the bandwidth that is allocated to the serial interface

22-)Refer to the exhibit. The network administrator has added networks A and B to router R1. Which
two subnetwork numbers should be used to address networks A and B so that these networks use the
same subnet mask as networks C and D? (Choose two.)

a-) 192.168.1.32/26
b-) 192.168.1.64/26
c-) 192.168.1.96/26
d-) 192.168.1.160/26
e-) 192.168.1.192/26

23-) A network engineer is asked to specify the type of cable for a new network installation. The
engineer plans horizontal cable runs of less than 90 feet (27.4 meters) using cable that is not expensive
and is easy to implement. It will be positioned away from electrically noisy areas to avoid EMI. Which
cable should the engineer choose?

a-) STP
b-) UTP
c-) coaxial
d-) fiber optic

24-) Refer to the exhibit. The network administrator uses the command below to configure a default
route on RTB:

RTB(config)# ip route 0.0.0.0 0.0.0.0 fa0/0

A ping issued from PC3 is successful to RTB. However, echo request packets arrive at PC1 but the
echo replies do not make it back to PC3. What will fix this problem?
RTA must be configured to forward packets to the 192.168.2.0 network.

a-) The ip route command needs to be edited so that the next hop address is 10.1.1.5.
b-) The ip route command needs to be edited so that the 192.168.2.1 address is the next hop address.
c-) The ip route command should be removed from the RTB router configuration.
d-) Another default route should be configured on RTA with a next hop address of 10.1.1.6.

25-)Which two statements are true about the use of the debug ip rip command on a Cisco router?
(Choose two.)

a-) The debug ip rip command displays RIP routing activity in real time.
b-) The debug ip rip command can be issued at the user EXEC configuration mode.
c-) The debug ip rip command displays a combination of the information that is displayed by the show
ip route and show ip protocols commands.
d-) Because of router processor usage, the debug ip rip command should be used only when necessary.
e-) The debug ip rip command should be used instead of the show ip route command whenever
possible.

26-)Refer to the exhibit. Which combination of cables and symbols is correct?

a-) A - crossover, B - straight-through, C - straight-through


b-) A - crossover, B - rollover, C - straight-through
c-) A - straight-through, B -crossover, C - straight-through
d-) A - straight-through, B -straight-through, C - straight-through
e-) A - straight-through, B - straight-through, C - crossover
f-) A - rollover, B - straight-through, C - straight-through

27-) Refer to the exhibit. Based on the DHCP configuration commands, what is the reason that a PC is
receiving an IP address but is unable to communicate outside of the local network?

a-) The default gateway is misconfigured.


b-) Excluded addresses must be configured.
c-) The DNS server is on the incorrect network.
d-) There are not enough addresses to support the 28 hosts that are required for this LAN.

28-) A hacker attempts to reach confidential information that is stored on a server inside the corporate
network. A network security solution inspects the entire packet, determines that it is a threat, and
blocks the packet from entering the inside network. Which security measure protected the network?

a-) an IDS
b-) an IPS
c-) a host-based firewall
d-) Anti-X software

29-) What should be the first step in a structured cable project?

a-) Locate all sources of EMI.


b-) Obtain an accurate floor plan.
c-) Identify the network backbone.
d-) Design efficient cable management systems.
30-) The network administrator can ping a remote router but is unable to telnet to it. At what layer of
the OSI model does this error occur?

a-) physical
b-) network
c-) data link
d-) application

31-) How do port filtering and access lists help provide network security?

a-) They prevent specified types of traffic from reaching specified network destinations.
b-) They alert network administrators to various type of denial of service attacks as they occur.
c-) They prevent viruses, worms, and Trojans from infecting host computers and servers.
d-) They enable encryption and authentication of confidential data communications.

32-) A user reports being unable to access the Internet. The help desk technician employs a bottom-up
approach to troubleshooting. The technician first has the user check the patch cable connection from
the PC to the wall, and then has the user verify that the NIC has a green link light. What will the
technician have the user do next?

a-) Enter an IP address into the WWW browser address bar to see if DNS is at fault.
b-) Use traceroute to identify the device along the path to the ISP that may be at fault.
c-) Verify the IP address, subnet, and gateway settings using ipconfig on the PC.
d-) Connect to the user home router to check firewall settings for blocked TCP ports.

33-)What is one purpose of the TCP three-way handshake?

a-) sending echo requests from the source to the destination host to establish the presence of the
destination
b-) determining the IP address of the destination host in preparation for data transfer
c-) requesting the destination to transfer a binary file to the source
d-) synchronizing sequence numbers between source and destination in preparation for data transfer

34-)Which statement is true about FTP implementations?

a-) The protocol interpreter (PI) function engages once the data transfer process (DTP) function is
complete.
b-) The DTP function is responsible for the login sequence.
c-) FTP requires two connections, one for control and one for data.
d-) Both the PI and the DTP close automatically when the transfer is complete.

35-)Which statement describes a feature of TCP?

a-) It provides low overhead data delivery.


b-) It acknowledges the receipt of packets.
c-) It does not provide error checking.
d-) It is a connectionless protocol.

36-)A company has formed a team that must analyze the probability of a disaster occurring and the
associated effects and costs to their business. Which step of the disaster recovery plan is the team
tasked with completing?

a-) risk assessment


b-) vulnerability assessment
c-) disaster scenario prioritization
d-) disaster recovery strategy development

37-)Which statement is true about the reverse lookup DNS zone?

a-) It is most commonly experienced when users are surfing the Internet.
b-) It is the backup for the forward lookup zone.
c-) It dynamically updates the resource records.
d-) It resolves an IP address to a fully qualified domain name.

38-)Refer to the graphic. Which command will configure a static route on Router A to direct traffic
from LAN A that is destined for LAN C?

a-)RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.5.2


b-)RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.3.2
c-)RouterA(config)# ip route 192.168.5.0 255.255.255.0 192.168.3.2
d-)RouterA(config)# ip route 192.168.3.0 255.255.255.0 192.168.3.1
e-)RouterA(config)# ip route 192.168.3.2 255.255.255.0 192.168.4.0

39-)Which two services are required to enable a computer to receive dynamic IP addresses and access
the Internet using domain names? (Choose two.)

a-) DNS
b-) WINS
c-) HTTP
d-) DHCP
e-) SMTP

40-)Which protocol allows encryption of any application layer protocol?

a-) FTP
b-) FTPS
c-) HTTPS
d-) IPsec
e-)Telnet

41-)What is the most commonly used exterior routing protocol?

a-) BGP
b-) RIP
c-) OSPF
d-) EIGRP

42-)Which WAN service provides point-to-point connections with a predefined communications path?

a-)E1
b-)T1
c-)dialup
d-) leased line

43-)Refer to the exhibit. A user who is connected to RTA is trying to telnet to RTB, but the connection
is failing. Based on the output of the show running-config command on router RTB, why is the Telnet
session failing?

a-)Telnet has not been configured on the console line.


b-)The login command has not been issued on the console line.
c-)No password has been configured on the VTY lines.
d-) A session limit has not been configured for Telnet.

44-)A network technician is using a network management station to gather data about the performance
of devices and links within the ISP. Which application layer protocol makes this possible?

a-)SNMP
b-)FTP
c-)DHCP
d-)SMTP

45-)A building has experienced a power outage. When the power returns, none of the devices on one
floor can access the Internet. The network administrator checks the switch in the IDF that these
devices are connected to and notes that the SYST LED on the front of the switch is amber.

What is a possible cause of this problem?

a-)The switch is functioning properly.


b-)The switch has failed POST.
c-)The switch configuration file was not saved to NVRAM.
d-)The connection between the switch and the server did not autonegotiate speed and duplex properly.

47-)Which type of cable may be used for backbone cabling between data centers that are located on
different floors and that are separated by a distance of 1640 feet (500 meters)?

a-)STP
b-)UTP
c-)coaxial
d-)fiber-optic

48-)A host has been properly cabled and configured with a unique hostname and valid IP address.
Which two additional components should be configured to enable the host to access remote resources?
(Choose two.)

a-)the subnet mask


b-)the MAC address
c-)the default gateway
d-)the loopback IP address
e-)the DHCP server IP address

48-)A user calls a help desk about being unable to connect to a web server. The technician asks the
user to issue a ping 127.0.0.1 command. What is the purpose of this command?

a-)verify if the network cable is connected to the PC


b-)verify if the TCP/IP stack is functioning on the PC
c-)verify if the IP address is configured correctly on the PC
d-)verify if the DNS server IP addresses are present on the PC

49-)A client complains to an ISP that the hosted web server seems slow and frequently cannot be
reached. The technician suspects the special high performance server NIC might be the source of the
problem. After checking with vendor support, it is verified that the NIC is causing framing errors and
the firmware needs to be upgraded. With which layer of the OSI model is this problem associated?

a-)Layer 1
b-)Layer 2
c-)Layer 4
d-)Layer 7

50-)What is an example of a dedicated point-to-point WAN link?

a-)ISDN
b-) Frame Relay
c-)dialup
d-)T1/E1

51-)Refer to the exhibit. A ping 192.168.1.20 command is issued on workstation A to determine if


workstation B can be reached. What two events will occur if this command is successful? (Choose
two.)

a-)The router will reply to the echo request with a proxy ping response.
b-)Workstation A will send a UDP ping request message to workstation B.
c-)The router will send a TCP acknowledgment message to workstation A.
d-)Workstation B will send a UDP ping reply message to the router.
e-)Workstation A will send an ICMP echo request message to workstation B
f-)Workstation B will send an ICMP echo reply message to workstation A.

52-)What is the primary function of a Level 1 support technician in an ISP help desk department with
multiple levels of customer support?

a-)to install hardware replacements for the customer


b-)to accompany an on-site technician to provide additional technical support
c-)to diagnose and document the symptoms of hardware, software, and system problems
d-)to design network enhancements that support the new technology requirements of the customer