Sie sind auf Seite 1von 26


Refer to the exhibit. A company decides to install a new data center to improve the services available on the network. EIGRP is chosen as a routing protocol. VLAN 100 is the management VLAN. After a prototype network is built, the staff executes basic connectivity tests. The results show very slow convergence after a network failure. Which step should be taken by the engineers to improve the network performance? Eliminate all trunk links in the network. Configure per-VLAN rapid spanning tree. Configure VLAN 1 as a management VLAN. At the distribution layer, replace EIGRP with RIPv2. 2 A network administrator is given a network address of to create four subnets with seven hosts in each subnet. Which subnet mask should be used? 3 A small bookstore would like to offer wireless connectivity for customers with laptops. Which wireless components or devices will provide connectivity to the Internet for the customers with the least possible cost to the bookstore? wireless LAN controllers standalone access points wireless network cards for an ad hoc WLAN lightweight access point and wireless LAN controller 4 While troubleshooting a Frame Relay link, the network administrator executes the show ip interface brief command on both sides of the PVC link. All interfaces show a configured IP address and that the line protocol is up. Further investigation reveals that the IP address of the remote router does not appear in the Frame Relay table. Which step would solve this problem? Change the LMI type on the local router. Verify that the DLCI number is the same on both sides of the PVC. Configure the router using the frame-relay map ip command. Verify that the remote router has Frame Relay encapsulation enabled. When configuring Frame Relay, what identifies a virtual circuit to the WAN switch? LMI CPE PVC DLCI 6 A user in a large office calls tech support to complain that the PC no longer connects to the Internet or to any network resources, but seems otherwise normal. The help desk technician asks the caller to talk to nearby users to see if other machines are affected. After a few minutes, the caller reports that several immediate neighbors

have the same problem, but those seated further away do not. Assuming that the description is accurate, what should be checked next? power outlet to the PC that is used by the caller workgroup switch in the telecommunications room cable between any network outlet and the telecommunications room cable between the PC that is used by the caller and the network outlet it connects to cable between the PC that is used by a neighbor and the network outlet the neighbor PC it connects to 7 During the network upgrade process a company is working with an individual who is responsible for evaluating the current network, as well as testing and evaluating proposed solutions. What is the main role of this individual? account manager post-sales field engineer pre-sales systems engineer Level 2 help desk support technician

Refer to the exhibit. Which type of application communication model best describes this network? client-client

client-server farm client-enterprise edge client-enterprise server 9 Which task would typically only require services located at the access layer of the hierarchical design model? connecting to the corporate web server to update sales figures using a VPN from home to send data to the main office servers printing a meeting agenda on a local departmental network printer placing a VoIP call to a business associate in another country responding to an e-mail from a co-worker in another department 10 Which protocol allows redundant Layer 2 links without switching loops? DHCP HSRP MPLS RSTP 11

Refer to the exhibit. What can be concluded from the output that is shown? MDF_2811 has a MAC address of 2294:300F:0000. A Cisco 3750 switch is connected to the FastEthernet1/0/1 port on MDF_2811. MDF_2811 is installed in the main distribution facility on floor 28 of building 11. Device C3750-24_IDF2 is running Cisco IOS Software Release 12.2(25)SEE2. 12

Refer to the exhibit. A pre-sales systems engineer receives a diagram of the exhibited WAN implementation from a customer. EIGRP is the routing protocol that is used on the WAN. None of the parameters for EIGRP metric calculation have been modified in any router configurations. Which statement is true about the routing table on router RM? There is a single route to the LAN using the T1 connection. There is a single route to the LAN using the DSL connection. There is a single route to the LAN using the Metro Ethernet connection. EIGRP installs all three routes to the LAN and load balances the traffic. 13 Which two descriptions relate to a Frame Relay DLCI? (Choose two.) guaranteed rate at which data travels on the packet-switched network signalling standard between DTE and DCE indicator of congestion on the network locally significant circuit endpoint one DLCI allowed per local loop

Layer 2 address 14 Which IOS component can be used for classification and protocol discovery of network traffic and applications in use? CDP NBAR ACL logging Network Assistant 15 A network administrator has removed a router from the network for maintenance. A new Cisco IOS software image has been successfully downloaded to a server and copied into the flash of the router. What should the administrator do before placing the router back into service? Delete the previous version of the Cisco IOS software from flash. Copy the new IOS into NVRAM to create a backup copy. Restart the router and verify that the new image starts successfully. Verify the free space available on the router to store the new IOS image. 16

Refer to the exhibit. Before the encapsulation was changed to Frame Relay, the administrator verified physical connectivity by successfully pinging the remote router. After the encapsulation was changed, the administrator attempted to ping the remote router on the Frame Relay circuit but was not successful. A show frame-relay pvc command was issued. What could be the problem? The DLCI is incorrect. The IP address is incorrect. The interface needs to be re-enabled after the encapsulation is changed. The network is not included in the routing table. 17

Refer to the exhibit. What does the JAX router do with traffic that is destined for a web server with an IP address of The traffic is sent out Serial 0/0/0. The router sends the traffic out all interfaces other than the one it came in on. A request is sent to neighboring routers for paths to the network. The packets are placed into a queue until a better route is discovered via RIP. 18

Refer to the exhibit. The network administrator wishes to use the Cisco Feature Navigator to choose a Cisco IOS image to install on a router that will allow VoIP functionality. Based on the output of the show version command, which statement accurately describes the ability of the router to run the Cisco IOS image selected? There is enough DRAM and flash. There is enough DRAM but not enough flash. There is not enough DRAM but there is enough flash. There is not enough DRAM and flash. 19 Which two technologies can provide data integrity in a VPN connection? (Choose two.)

ESP DES MD5 DH1 SHA-1 20 What best describes the function of QoS in data networks? prioritizes data traffic over all other types of traffic increases bandwidth on a link to ensure voice quality provides preferred service to specified network traffic automatically assigns the highest priority to web and database traffic 21 A network designer has chosen to specify the use of a dedicated firewall appliance at the perimeter of a large network. Why would the designer use a dedicated firewall rather than using the Cisco IOS firewall feature set on the existing router? Traffic filtering is needed on the internal LAN. Multiple levels of access to the network are needed. The DMZ requires packet filtering and port blocking. Heavy network traffic will be handled best by using a dedicated device. 22 In order for the IT staff of a company to understand the basic operation of VPNs, which two features or technologies must the network designer identify as training needs? (Choose two.) IPv6 tunneling QoS operation tunneling protocols VLAN configuration encryption algorithms 23

Refer to the exhibit. An extended ACL has been created to deny traffic from the network to the web server with IP address According to Cisco best practices, where should the ACL be applied? R3 Fa0/0 inbound R3 S0/0/1 outbound R2 S0/0/1 inbound ISP Fa0/0 outbound 24 What can be broadcast over the wireless network to help a user connect to the network and use wireless services? SSID WPA encryption keys voice VLAN parameters

IP address of the access point management VLAN parameters 25

Refer to the exhibit. Which username and password combination will correctly configure PPP authentication on routers RTR_A and RTR_B?

26 The network designer recommends using RSTP in the design of a new data center. There are multiple redundant Layer 2 switches and links contained in the new design. What is the benefit of using RSTP rather than STP in this situation? Redundant links are not blocked. Routing tables converge more quickly. Spanning Tree convergence times are reduced. Fewer redundant links are required to maintain connectivity. 27

Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of an access layer switch and connects three PCs to test the configuration. The engineer attempts to ping from each PC to the other connected PCs. Which three statements describe the expected results of pinging from one host to another? (Choose three.) Host 1 can ping Host 2. Host 1 cannot ping Host 2. Host 2 cannot ping Host 3. Host 3 can ping Host 1. Host 3 can ping Host 2.

Host 3 cannot ping Host 1. 28 What is meant by "tunneling" in the context of migrating from IPv4 to IPv6? obtaining IPv6 addresses from an IPv4 DHCP server allowing both protocol stacks to run on the same network device encapsulating one protocol packet within another protocol enabling direct communication between hosts that use different versions of the IP protocol 29 During prototype testing, the network designer performs a test to determine the ability of the network to store device configurations and statistics on local databases. Which design goal is validated if the test is a success? security scalability availability manageability 30 What is the result of implementing a Frame Relay service with a CIR value of zero? Data will not cross the Frame Relay WAN. All frames that enter the Frame Relay WAN will be marked as DE. Only frames that exceed the local access rate will be marked as DE. CIR is disabled, which allows all data traffic to pass through the Frame Relay WAN. 31 Which component in a Frame Relay WAN would set the BECN bit in the Frame Relay header if congestion is experienced? source DTE device Frame Relay switch destination DTE device router through which communication was first initiated 32 A company would like to ensure that the failure of a single access switch does not disrupt service to the mail

servers located in the data center. What can be done to ensure maximum connectivity to the mail servers? Enable CDP to ensure all neighboring devices are known. Create a separate RSTP specifically for the mail servers. Configure a routing protocol so that paths to all Layer 3 devices are cached. Install redundant access links between the servers and the access layer switches. 33 Which two statements are true about the enhancements IPv6 has over IPv4? (Choose two.) IPv6 does not support broadcasts. IPv6 uses a simplified header structure. IPv6 does not require private addresses. IPv6 uses fixed length address strings. IPsec for IPv6 is not compatible with IPsec for IPv4. 34

Refer to the exhibit. A network associate is configuring a new router to provide routing between VLANs. The associate removes the router from the box and connects the Fa0/0 interface to a trunking port on the switch. After the configuration is applied to the router, the traffic between VLANs still fails. What is causing this to occur? The router needs a routing protocol configured. The router needs additional Fast Ethernet interfaces installed. The subinterfaces of the router should have IP addresses applied. All the subinterfaces of the router should be configured in the same VLAN. The subinterfaces must be the same value as the VLAN ID that they are routing for.

35 A company plans to establish Frame Relay connections between corporate headquarters and several branch offices. The network designer recommends using one physical interface on the edge router to support the new Frame Relay connections. The company currently uses RIPv2 for routing and plans no changes to the RIPv2 configuration. What should be done to ensure that each branch office link is a separate subnet and that routing updates are successful between corporate headquarters and the branch offices? Configure multipoint subinterfaces on the physical interface. Configure point-to-point subinterfaces on the physical interface. Configure a single subinterface to establish multiple PVC connections. Configure the physical interface to share one DLCI to multiple remote sites and their connections. 36 A web-based retail company is considering updating its WAN connection with new technologies that are offered by the ISP. What testing platform should be used by the network team of the company to validate the performance and capacity of the new technology using real world data? pilot prototype emulation software simulation software 37 What is a characteristic of voice traffic in a converged network? It is assigned secondary priority to data traffic. It is processed in real time and cannot be retransmitted. It consists of large packets with long, irregular data flows. It uses the error-checking features of TCP to ensure good voice quality. 38

Refer to the exhibit. A customer has a problem with connectivity in the network. Based on the IP addressing scheme, what is causing the problem? The WAN link that connects R1 to R3 has an incorrect mask. The WAN links need IP addresses from a different major network. The WAN link that connects R1 to R2 overlaps with the R3 LAN. The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM. 39 A wireless survey has been conducted before the deployment of a wireless network. What would be the benefit of the survey? provides initial configuration of the access points determines the channel settings of the access points determines the security settings on the access points finds the optimal number and placement of access points

40 During prototype testing, a network engineer determines that the network can successfully recover from a link or device failure. Which design goal has been validated by the testing? security scalability availability manageability 41

Refer to the exhibit. What is the purpose of this configuration? auditing the network traffic with NBAR monitoring the network traffic with NetFlow capturing network traffic to send to a syslog server applying the named ACLs egress and ingress to the Ethernet interfaces 42

Refer to the exhibit. Based on the configuration of router R2, which statement is true if the four listed objectives are requirements of an active security policy? Objectives (1) All traffic from the Internet into the DMZ is to be logged. (2) Web traffic from the Internet is to be allowed into the DMZ. (3) TCP traffic from established sessions is to be allowed into the internal network. (4) Incoming e-mail from the Internet is to be handled by the DMZ e-mail server first. Only objective 1 is met. All four objectives are met. Objectives 1, 2, and 4 are met. Only objectives 2 and 4 are met.

Only objectives 2 and 3 are met. 43 An HWIC-4ESW, four-port switch module needs to be installed in a Cisco 1841 router that currently has a WIC2T module in slot 0. What should the network technician do first? Install the hot-swappable option module. Turn off the power to the router before installing the new module. Remove the WIC-2T module so that the new module can be installed in slot 0. Shut down all Fast Ethernet ports on the router until the switch module installation is complete. Configure the Cisco IOS software to support an internal trunk link between the switch and router module. 44

Refer to the exhibit. What is the spanning-tree role of all the enabled interfaces of SW11? alternate backup designated root

45 What is the purpose of a network baseline? to add access control capabilities to the network to reserve a spot in a rack for installing network equipment to create a configuration template for quickly configuring new equipment to establish a point of reference for comparison with current performance 46 A network administrator wants to configure a router that is running EIGRP so that it will advertise a route that will summarize the networks that are shown. Which network will summarize only these networks? 47 How should a network engineer determine if a router module is hot-swappable? Insert the module with the power on, then check to see if the associated LED is lit. Check the router and interface module data sheets on CCO to determine hot-swappability. Insert the module with the power on, then issue the show running-config command to verify that all new interfaces are recognized. Power off the router, insert the module, then verify new interfaces using the show running-config command after powering up. 48 A configuration file needs to be loaded into the RAM of a router from a TFTP server. What should an administrator know before accomplishing this task?

the router IP address and the operating system that is used by the TFTP server the TFTP server IP address and the name of the configuration file on the server the router IP address and the name of the router configuration file in NVRAM the TFTP server IP address and the value of the configuration register on the router 49

Refer to the exhibit. Based on the EIGRP configuration that is shown, what can the field engineer conclude about the EIGRP authentication between RouterA and RouterB? Authentication will fail because only one key is configured. Authentication will fail because the key chain names do not match. Authentication will succeed and EIGRP updates can be exchanged. Authentication will fail because the key chain names must match the router names. 50 Company XYZ requires a WAN solution that provides flexible bandwidth options and supports one physical

interface at the head office that would provide simultaneous connectivity to various remote sites. The distance from each site should not make the solution more expensive. Which WAN technology meets the requirements of the company? DSL cable Frame Relay T1 leased line