Sie sind auf Seite 1von 3

Chapter 7 12. Refer to the exhibit.

On the basis of the configuration


shown, how should the pool of the excluded addresses be
1. Refer to the exhibit. Traffic exiting R1 is failing translation. assigned to key hosts on the network, such as router
What part of the configuration is most likely incorrect? interfaces, printers, and servers?
access-list statement The addresses are statically assigned by the network
administrator.
2. Refer to the exhibit. What is the purpose of the command
marked with an arrow shown in the partial configuration output 13. Refer to the exhibit. A technician used SDM to enter the
of a Cisco broadband router? NAT configuration for a Cisco router. Which statement
defines which addresses can be translated correctly describes the result of the configuration?
A user on the outside network sees a request addressed from
3. How many bits of an IPv6 address are used to identify the 192.168.1.3 using port 80.
interface ID?
64 14. Refer to the exhibit. According to the output, how many
addresses have been successfully assigned or renewed by this
4. Refer to the exhibit. How many IPv6 broadcast domains DHCP server?
exist in this topology? 8
0
15. What are two benefits of NAT? (Choose two.)
5. Refer to the exhibit. Which two addresses could be assigned • It saves public IP addresses.
to traffic leaving S0 as a result of the statement ip nat pool • It adds a degree of privacy and security to a network.
Tampa 179.9.8.96 179.9.8.111 netmask 255.255.255.240?
(Choose two.) 16. Refer to the exhibit. R1 is performing NAT for the
• 179.9.8.98 10.1.1.0/24 network, and R2 is performing NAT for the
• 179.9.8.101 192.168.1.2/24 network. What would be valid destination IP
address for HostA to put in its IP header when communicating
6. Refer to the exhibit. A network technician determines DHCP with the web server?
clients are not working properly. The clients are receiving IP 172.30.20.2
configuration information from a DHCP server configured on
the router but cannot access the Internet. From the output in 17. Refer to the exhibit. Which two statements about the
the graphic, what is the most likely problem? configuration are true? (Choose two.)
The pool does not have a default router defined for the clients. • Traffic from the 10.1.1.0 network will be translated.
• Permitted traffic gets translated to a single inside
7. Your organization is issued the IPv6 prefix of global IP address.
2001:0000:130F::/48 by your service provider. With this prefix,
how many bits are available for your organization to create 18. What type of NAT should a network administrator use to
subnetworks? ensure that a web server on the inside network is always
16 available to the outside network?
static NAT
8. After activating IPv6 routing on a Cisco router and
programming IPv6 addresses on multiple interfaces, what is 19. Refer to the exhibit. Which address or addresses represent
the remaining step to activate RIPng? the inside global address?
Enter the interface programming mode for each IPv6 interface 209.165.20.25
and enable IPng RIP.
20. A technician has been told by a supervisor to always clear
9. Refer to the exhibit. IPv6 address 2006:1::1/64 eui-64 has any dynamic translations before attempting to troubleshoot a
been configured on the router FastEthernet0/0 interface. Which failed NAT connection. Why has the supervisor issued these
statement accurately describes the EUI-64 identifier instructions?
configuration? Because entries can be cached for long periods of time, the
The configuration will derive the interface portion of the IPv6 supervisor wants to prevent decisions being made based on
address from the MAC address of the interface. old data.

10. What is true regarding the differences between NAT and 21. A network administrator wants to connect two IPv6 islands.
PAT? The easiest way is through a public network that uses only
PAT uses unique source port numbers to distinguish between IPv4 equipment. What simple solution solves the problem?
translations. Use tunneling to encapsulate the IPv6 traffic in the IPv4
protocol.
11. Refer to the exhibit. The FTP server has an RFC 1918
private address. Users on the Internet need to connect to the
FTP server on the Fa0/0 LAN of R1. Which three
configurations must be completed on R1? (Choose three.)
• open port 20
• open port 21
• NAT with port forwarding
Chapter 6 13. A company is using WiMAX to provide access for
1. Which two protocols can be used to encapsulate traffic that teleworkers. What home equipment must the company provide
is traversing a VPN tunnel? (Choose two.) at the teleworker’s site?
• IPsec a WiMAX receiver
• PPTP
14. A technician has been asked to configure a broadband
2. What are the three main functions of a secure VPN? connection for a teleworker. The technician has been
(Choose three.) instructed that all uploads and downloads for the connection
must use existing phone lines. Which broadband technology
• authentication should be used?
• data confidentiality DSL
• data integrity
15. Which two Layer 1 requirements are outlined in the Data-
3. Data confidentiality through a VPN can be enhanced over-Cable Service Interface Specification (DOCSIS)?
through the use of which three encryption protocols? (Choose (Choose two.)
three.) • channel widths
• AES • modulation techniques
• DES
• RSA 16. Refer to the exhibit. All users have a legitimate purpose
and the necessary permissions to access the Corporate
4. While monitoring traffic on a cable network, a technician network. Based on the topology shown, which locations are
notes that data is being transmitted at 38 MHz. Which able to establish VPN connectivity with the Corporate network?
statement describes the situation observed by the technician? All locations can support VPN connectivity.
Data is being transmitted from the subscriber to the headend.
17. Which two features can be associated with the Worldwide
5. Which two statements are valid solutions for a cable ISP to Interoperability for Microwave Access (WiMAX)
reduce congestion for users? (Choose two.) telecommunication technology? (Choose two.)
• allocate an additional channel • covers areas as large as 7,500 square kilometers
• subdivide the network to reduce users on each • connects directly to the Internet through high-
segment bandwidth connections

6. Data confidentiality through a VPN is achieved through 18. Refer to the exhibit. A VPN tunnel has been established
which two methods? (Choose two.) between the HQ Office and the Branch Office over the public
• encryption Internet. Which three mechanisms are required by the devices
• encapsulation on each end of the VPN tunnel to protect the data from being
intercepted and modified? (Choose three.)
7. What two protocols provide data authentication and integrity • The two parties must establish a secret key used by
for IPsec? (Choose two.) encryption and hash algorithms.
• AH • The two parties must agree on the encryption
• ESP algorithm to be used over the VPN tunnel.
• The devices must be authenticated before the
8. Which two methods could an administrator use to communication path is considered secure.
authenticate users on a remote access VPN? (Choose two.)
• digital certificates 19. Which statement describes cable?
• smart cards Delivering services over a cable network requires downstream
frequencies in the 50 to 860 MHz range, and upstream
9. Which is an example of symmetric-key encryption? frequencies in the 5 to 42 MHz range.
pre-shared key

10. Refer to the exhibit. A teleworker is connected over the


Internet to the HQ Office. What type of secure connection can
be established between the teleworker and the HQ Office?
a remote-access VPN

11. After conducting research to learn about common remote


connection options for teleworkers, a network administrator
has decided to implement remote access over broadband to
establish VPN connections over the public Internet. What is the
result of this solution?
The connection has increased security and reliable
connectivity. Users need a remote VPN router or VPN client
software.

12. Which two statements about DSL are true? (Choose two.)
• local loop can be up to 3.5 miles (5.5km)
• user connections are aggregated at a DSLAM located
at the CO
Chapter 8 11. Which two statements are true concerning logical
networking models? (Choose two.)
1. What combination of IP address and wildcard mask should • The top layer of the TCP/IP model combines the
be used to specify only the last 8 addresses in the subnet functions of the top three OSI layers.
192.168.3.32/28? • The TCP/IP network access layer corresponds to the
192.168.3.40 0.0.0.7 OSI physical and data link layers.

2. Excessive broadcasts are generally a symptom of a problem 12. Refer to the exhibit. Which two steps should be taken
at which layer? during the process of creating network documentation?
data link (Choose two.)
• Record the information about the devices discovered
3. Refer to the exhibit. Which three pieces of information can in the entire network, including the remote locations.
be determined by analyzing the output shown? (Choose three.) • Transfer any information about the devices from the
• A carrier detect signal is present. network configuration table that corresponds to a
• Keepalives are being received successfully. component of the topology diagram.
• The LCP negotiation phase is complete.
13. What is one example of a physical layer problem?
4. A network administrator has received complaints that users incorrect clock rate
on a local LAN can retrieve e-mail from a remote e-mail server
but are unable to open web pages on the same server. 14. Clients across the company are reporting poor
Services at which two layers of the OSI model should be performance across all corporate applications running in the
investigated during the troubleshooting process? (Choose data center. Internet access and applications running across
two.) the corporate WAN are performing normally. The network
• transport layer administrator observes a continual broadcast of random
• application layer meaningless traffic (jabber) on the application server LAN in
the data center on a protocol analyzer. How should the
5. When gathering symptoms for troubleshooting a network administrator start troubleshooting?
problem, which step could result in getting an external The jabber in the data center indicates a local physical layer
administrator involved in the process? problem. Use the protocol analyzer to determine the source of
determining ownership the jabber, and then check for a recent NIC driver update or
bad cabling.
6. Encapsulation errors from mismatched WAN protocols on a
serial link between two routers indicate a problem at which OSI 15. A technician has been asked to make several changes to
layer? the configuration and topology of a network and then
data link determine the outcome of the changes. What tool can be used
to determine the overall effect caused by the changes?
7. Refer to the exhibit. Users at Branch B are reporting trouble baselining tool
accessing a corporate website running on a server that is
located at HQ. HQ and Branch A users can access the 16. A technician has been asked to troubleshoot an existing
website. R3 is able to ping 10.10.10.1 successfully but not switched network but is unable to locate documentation for the
10.10.10.2. The users at Branch B can access servers at VLAN configuration. Which troubleshooting tool allows the
Branch A. Which two statements are true aboutthe technician to map and discover VLAN and port assignments?
troubleshooting efforts? (Choose two.) network analyzer
• Frame Relay at R3 and R2 should be tested to narrow
the scope of the problem. 17. Which two pieces of information are typically found on a
• An ACL entry error could cause the failure at Layer 4 logical network diagram? (Choose two.)
in either R3 or R2. interface identifiers
DLCI for virtual circuits
8. Which troubleshooting approach is suggested for dealing
with a complex problem that is suspected of being caused by 18. Which two components should be taken into consideration
faulty network cabling? when establishing a network baseline? (Choose two.)
bottom up information about the network design
expected performance under normal operating conditions
9. Users are complaining of very long wait times to access
resources on the network. The show interface command 19. Which three approaches should be used when attempting
reveals collision counts far above the network baseline. At to gather data from users for troubleshooting? (Choose three.)
which OSI layer should the administrator begin • Obtain information by asking simple pertinent
troubleshooting? questions.
physical • Determine if the problem is related to time or a
specific event.
10. Refer to the exhibit. Users on the Internal LAN are unable • Determine if the user can re-create the problem or
to connect to the www server. The network administrator pings events leading to the problem.
the server and verifies that NAT is functioning correctly. Which
OSI layer should the administrator begin to troubleshoot next? 20. Information about which OSI layers of connected Cisco
Application devices can be verified with the show cdp neighbors
command?
Layer 1, Layer 2, and Layer 3

Das könnte Ihnen auch gefallen