Beruflich Dokumente
Kultur Dokumente
Close Window
Assessment System
1. Assessment Selection
2. Assessment Settings
3. Take Assessment
Take Assessment - EWAN Final Exam - CCNA Exploration: Accessing the WAN (Version 4.0)
Time Remaining:
16
Refer to the exhibit. A network administrator notices that three VLANs created on SW1 do not show in SW3. Based on output from the show vtp status and show running-config commands, what is the cause of the problem in the SW3 configuration? VTP version 2 is disabled. The VTP mode is misconfigured. The configure revision number for VTP does not match. Trunk mode is not configured on FastEthernet 0/1 and 0/2.
17 When would the multipoint keyword be used in Frame Relay PVCs configuration? when global DLCIs are in use when using physical interfaces when multicasts must be supported when participating routers are in the same subnet
18
Refer to the exhibit. A network administrator is tasked with completing the Frame Relay topology that interconnects two remote sites. How should the point-to-point subinterfaces be configured on HQ to complete the topology? frame-relay interface-dlci 103 on Serial 0/0/0.1 frame-relay interface-dlci 203 on Serial 0/0/0.2 frame-relay interface-dlci 301 on Serial 0/0/0.1
frame-relay interface-dlci 302 on Serial 0/0/0.2 frame-relay map ip 192.168.1.1 103 broadcast on Serial 0/0/0.1 frame-relay map ip 192.168.2.2 203 broadcast on Serial 0/0/0.2 frame-relay map ip 192.168.1.1 301 broadcast on Serial 0/0/0.1 frame-relay map ip 192.168.2.2 302 broadcast on Serial 0/0/0.2
19 What are two main components of data confidentiality? (Choose two.) checksum digital certificates encapsulation encryption hashing
20
Refer to the exhibit. Which statement is true about the Frame Relay connection? The Frame Relay connection is in the process of negotiation. A congestion control mechanism is enabled on the Frame Relay connection. The ACTIVE status of the Frame Relay connection indicates that the network is experiencing congestion. Only control FECN and BECN bits are sent over the Frame Relay connection. No data traffic traverses the link.
21
Which data link layer encapsulation protocol is used by default for serial connections between two Cisco routers? ATM Frame Relay HDLC PPP SDLC
22 What is the result when the command permit tcp 10.25.132.0 0.0.0.255 any eq smtp is added to a named access control list and applied on the inbound interface of a router? TCP traffic with a destination to the 10.25.132.0/24 is permitted. Only Telnet traffic is permitted to the 10.24.132.0/24 network Ttraffic from 10.25.132.0/24 is permitted to anywhere on using any port. b 23 At what physical location does the responsibilty for a WAN connection change from the user to the service provider? demilitarized zone (DMZ) demarcation point local loop cloud
24
Refer to the exhibit. What statement is true about the core router devices? They use multiport internetworking devices to switch traffic such as Frame Relay, ATM, or X.25 over the WAN. They provide internetworking and WAN access interface ports that are used to connect to the service provider network. They provide termination for the digital signal and ensure connection integrity through error correction and line monitoring. They support multiple telecommunications interfaces of the highest speed and are able to forward IP packets at full speed on all of those interfaces.
25 An administrator issues the command confreg 0x2142 at the rommon 1> prompt. What is the effect when this router is rebooted? Contents in RAM will be erased. Contents in RAM will be ignored. Contents in NVRAM will be erased. Contents in NVRAM will be ignored.
26 Which option correctly defines the capacity through the local loop guaranteed to a customer by the service provider? BE DE CIR CBIR
27 An administrator is configuring a dual stack router with IPv6 and IPv4 using
RIPng. The administrator receives an error message when trying to enter the IPv4 routes into RIPng. What is the cause of the problem? When IPv4 and IPv6 are configured on the same interface, all IPv4 addresses are over-written in favor of the newer technology. Incorrect IPv4 addresses are entered on the router interfaces. RIPng is incompatible with dual-stack technology. IPv4 is incompatible with RIPng.
28 A network administrator determines that falsified routing information is propagating through the network. What action can be used to address this threat? Update the IOS images. Change console passwords. Employ end-user authentication. Configure routing protocol authentication.
29
Refer to the exhibit. A network administrator is trying to backup the IOS software on R1 to the TFTP server. He receives the error message that is shown in the exhibit, and cannot ping the TFTP server from R1. What is an action that can help to isolate this problem? Use correct source file name in the command. Verify that the TFTP server software is running. Make sure that there is enough room on the TFTP server for the backup. Check that R1 has a route to the network where the TFTP server resides.
30 A company has a remote branch office that uses a cable modem connection to communicate with the main office. What type of WAN connection is established at the branch office? public Internet connection dedicated connection circuit-switched connection packet-switched connection
<Prev
Page:
Next>
All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.