Sie sind auf Seite 1von 9

...

Dsm biSP FinalExa m Answers


1.AC ""1' 3ny is develo ping an Internet sl ore for ils v.ebsite. Which proiDc olshould be used ID transfer cred

card irtormation from customers to the company Y J e bser\Er? FTPS


H 1P T

HT1PS
WP E2

lFT P 2

rn!W

branch office

ppp

headquaners

dalabase server
Refer to the exhibit A

new a c nh

office has been added ID lt>e corporate net'I\Ork and a new router is to be

inSialled to alloW bfanc h office users bfanch_23(config-if)#

to access the

database server at headquarters. How should the serial010/0

interfac e of the new branch offiCe router be configured to connect ip ad dress 192168. 5.19 255.255.255.240 branch_23(con lig.if )# no shu1do l M bfanch_23(config-if)# encapst.lation hdlc branch_23(con lig.if )# ip address 192.168.5.25 255.255.255.240 branch_23(con lig.if )# no shu1do l M bfanch_23(config-if)# encapst.lation ppp branch_23(con lig.if )# no shu1do l M bfanch_23(config-if)# encapst.lation ppp

to the

headquarters router?

branch_23(con lig.if )# ip address 192.168.5.33 255.255.255.240 bfan ch_23(config.if)# encapst.l ation ppp branch_23(con lig.if )# ip address 192.168.5.21255.255.255.240 branch_23(con lig.if )# no shu1doM l

3. Wtich Mo commands ensure that any p a ss v-.o rd permits access to the privileged that EXEC mode is not sho'Ml in plain text v.hen the con liguration files are displ ayed? (Choose 1 '1 1.) 0
Router(contig)# enable secret cisco Route r(contig)# enable cisco Route r(contig )# encryptioo-paSSWO< all d Route r(contig)# enable login encryjXed Route r(contig)# enable passm rd encryption Rout er(contig)# seM<:e passv.or encryption 4. A new netv.ork is to be configured on a router. Which of the folb'Mng tasks must be complete d to configure this inte rface and implement dynamic IP rooting for the new net'I\Ork? (Choose three .) Select the rooting protocol A ssigl an IP address and subnet mask

to be configured. to the interface

on inlorm ation v.i1h the device name and new interf ace IP address. Corfigure the rot1ing protoco lWth the n B 'INneMork IP addr ess. ' Corfigure the rot1ing protoco lWth the new interface IP address and sulxlet mask. Corfigure the rot1ing protocolin use on all other enterpris routers...wh e the newnetwlrk information. Update the ip host configtnti

5. How does TCP ensure the r eliabletransferof data? if data segnents are not received from the source, the destinationrequeststhat the segmentsbe rese1t. If an ackJlo\.\tedgm en the transm itted t of segmentsis not received from the destinationin a predetermined amount of the time. the source resends the data. TCP uses the SYI\I.ACK portion of the three-v...y handshake ID eflSU'e that all data has been received. The TCP Protocol lrterprete process \erifies the transm itted r data at source and destinatio . n 6. A neMork adnlnistrator is asked todesign a system to allow simultaneous access to the Internet for 250 users. The ISP for this neM<lrk can only supply five public IPs. What can be used to accomplish this task?
rottable translation dym mic translation

Slatic translation

pert address
BGP RIP

translation

7. What is the most commoo-jy used exterior routi ng protocol?

OSPF
8GRP

8.

Leheki.ilg /7

4.06.2012 0:51

Refer to the exhibit T h e n e t> M > aariristrator rk

needs to configurethe rou 1 e r,.;th a name. Which command

,.;u
the aariristrator use to configure the rou1er name? Router ip hostname # Boise
Router# enable hostnameBoise

Router(config.line)# name Boise Router(config)# hostname Boise Router(config)# ip hostnam e Boise 9. Wlrf are port m.mbers included in the TCP header of a segment? to indcate the correct router interface that should be used to forward a
segment

to identify which 51\ltch ports shooJd receive or foowar the d segment to delermine which Layer 3 protocolshooJdbe used to encapslllalethe data to enable a receMng host to fO <...,r the data to the appropriale d applicati on to alow the receMng host to assemblethe packet in the proper order 10. What is the purpose of the roUtin g p < O cess? to encapsulate data that is used to commooicate across a
neMork

to select the paths that are used to dri ect traffic to destination
ne!Norks to c o i " Jerta URl name into an IP I. I
address

to povide

secure lrternet file transfer to forv.ard traffic on the basis of MAC addresses

11. Which I'M :>stalemeniS true abolt the use of the de rug ip rip com mandon a Cisco rou1er?(Choose are
I'M :>).

The debug ip rip corrrnand displays RIP roUtin activity in g realtime. The debug ip rip corrrnand can be issued at the user EXEC configuration mode. The debug ip rip corrrnand displays a comtination of the information that is displayedby the show ip r0u 1eand show ip protocolscorrrnands. Because of ro u te< p ro ce sS O < usage, the derug ip rip command should be used only when necessary. The debug ip rip corrrnand should be used instead of the show ip ro u1ecommand "'t1enever possible. 12. What minimum cor1igurations must be set on a host to allow a request to be sent to htq):/f.w w v. cisco.coml? (Choose tout.) DNSserver WINS server IP address NeiSIOS Slbnet mask defau gateway 13. A catalyst 2960 S 'M IJ has been taken out of stO < ag e b e used as a temporay replacen1ent :h to r for another S 'M IJh: that needs to be repaired Abolt a rr -after the S 'M IJh: has starled. the SYST LED on . io the front of the S 'M IJh: transitionsfra<n binking green to amber What is the meanio1Q of the aonber SYST . LED? The 51\ltch has no conf!Quratio file in n NVRA M.
The S'Mtch has failed POST and must be sent for service.

The switch is functioning properly. The switch is in halduplex


mocle.

14.

Refer

to the exhibit

W tich

com binati of cables and symbols is on

correct?

A- cro sso ve .B.straighthroug h, C . straigh < through A- cro ss o ve.B.rollolier. C.straightth < rough A- straight through. B .crossov er. C straigh through A- straightth rough. B .straighthroug h, C . straigh through A- straightth rough. B straigh through. C -

crosso\er A- rollov e < , B- straight through, C . straightthrough


15. After an msuccesstul ping to the local router, the technician decides to investigat the router. The e technician

...

obseM>sthat the lights and fan on the router are not operational. In "' llich layer of the OSI model is the problem most kely occurring? transport n e i'M :> rk data link physical 16. What are three characleristics of the TCP pro10col?(Choose three.) exchanges dalagrams unreiably is used to send IP error messages fO < c e the retransrrission of unacknowledged s packets creales a virtualsession b e i> M !e n end-user applications carries the IP address of the destination host in the TCP header is responsible for b<eaking messagesin 1 0 segment> and reassemb lio1Q them at their destin ation 17. 192.16 8.16.16128 192.168.15.0.00

192.168.10.4 8 128

Leheki.ilg /7

4.06.2012 0:51

, t. lOO.IO..W , tO

192.168.16.64128

Refer to lhe exhibit The n e tM :> sho'Ml is connected using services from lhe same IS P .How'IIIII lhe Fohi rk router dynarricaly learn roltes to lhe 192.168.16.16 128 192.168.16.32/28. and 192.168.16.6 128 . 4 subnet'I\O rks? 'llilh BGP Vlilh a Slatic route Vlilh a directly connectedroute Vlilh an interior routing prolocol 18.

Refer to lhe exhibit Wtich type ol UTP cable should be used lo connect Host A to &Mtch1?
rolover console crossover

suai !-lhrou gh 19When customersuse creacl ards to make purchasesat a so n a ll busines a o no d em heard dialing a s. is lelephonenumberto transferlhe transactio dati 1o lhe centraloffice. What type of WAN serialconnectionis n in use? leased line packet switched circutswitched poin point

20. A user reports being una 1o access lhe lnlernet The helpdesk technci ian eonploys bottom-upapproach a 1o trou shooting. The tectoicl ian first has lhe user check lhe patch cable connectio from lhe PC to lhe wa n
and than has lhe use< verify that lhe I>IC has a green fink tight What'llilllhe technicianhave lhe user do nexr? Enter an IP ad<tess into lhe www b ro v o .s e r address bar 1o see ff ONS is at tau use tracerouteto ideotify lhe deW:e abllQ lhe palh 1o lhe ISP lhat maybe at tau Verffy lhe IP address subnet and gatewaysetlings using ipconfig on lhe PC . . Coo ect to lhe user home router to check firewall setlings for blocked TCP ports. 21.

10.1.1.5124

192.1.1.20124

A ping 192.1.1.20 corrmand is issued on v.orkstationAto determine if v.orkstotionB can be reached What .
events'All occu- if this c o nT I"'a n c l successftJ?(Choose tHo.) is

The rouler >Mi l block lhe ping request message. The rouler >Mi l reply lo lhe echo request > M ih proxy ping response. a Workstotion A >Mi l send a UDP ping request messageto workstltion B. Workstotion B >Mi l send a UDP ping reply m essagelo workstltion A. Workstotion A woll send an ICMP echo requestmessagelo worksta tion B. Workstotion B woll send an ICMP echo reply m essageto workstation A. 22.How does a rouler know of palhs lo destinationnett.orks (Choose tNo.) ? inspection of lhe destination IP ad<tessin dati packets
ARP requestsfrom connected routers manual configuration of roltes updates from other routers DHCP information broadcasts updates from the SMTP managemen informationbase t

23.

client

Internet server

Refer to lhe exhibit Wtich t'IIO state m ents describe lhe data conversationsho.-n? (Choose 1'110.)
The data c O I'l'\. Ersation J N a s started by the HT1P applicationprocess running on the client The data comersation is idenlified by TCP port 80 on lhe client The user startedthe data c o ll'versation by sendingan e-mail. '

The IP address ollhe Internetser-. r is 192.168.17.43 . e The lnlernets""" 'r >Mi l send data to port8547 on lhe client 24. What is one pupose of lhe TCP lhree-w handshake? ay sending echo requests from the source to the destination host to es1ablish presence of the destination the delerrriring lhe IP address ollhe destinationhost in preparatio for dati transfer n reng lhe destinatio 1o transfera binary file 1o lhe source n synchronizing sequence numbers bei'M!e source and destinatio in preparatio for dati transfer n n n 25. Which type ol address is 192.168.17.111/28?
Mc:t ::ui1ro c:.

net\'Wrkaddress broadcas address t multicas address t

.,a
...

26. A customer reports connectivityproi:Ems to an ISP technician.Upon questioning the custome the r, techni ian disco\ers that all neMork apt:icationsare functioningeX J:ep for FTP. What shouldthe c t technician suspectis the problem? misconfigtJedfire.val bad po<t on S 'M tJ: or hub :h misconfigtJed addressingon the customer' 'NOfkstation IP s wong DNS server configured on the customer's Wlrkstation
V><on defa uglateway con figured on the customer's v.orkstation g

27.

192.168.1.2/24
s displayed:

192.168.5.2/24

The sh<1N ip rOIJie comman ds executed on one of the routers sho"" in the graphic and the folkYing OU1put
C 192.168. 4.0124 is direcUy COillecled. SeriaOIO R 192.16 8.5.0124 (1201 1( via 192.168.4.2. 00:00:1 9, SeriaOIO R 192.16 8.1.0124 (12012] via 192.168.3.1. 00:00:2 0, Seria0/1 R 192.16 8.2.0124(1201 2] via 192.168.3.1. 00:00:2 0, Seria0/1 C 192.168. 3.0124 is direcUy COillecled. Seria0/1 From which routers this command executed?

B
C D 28. Refer to the exhitit Which tA Os ets of commandsare required to configurep a S S " " - t W forsall management rd ports on a Catalyst 2960 S'Mtch? (Choose tHo.)
ALSMtJ::h (config)# inlerfac e vlan 1 ALSM!ch(co nfig-ff)# pass.. ord cisco ALSM!ch(co nfig-ff)# bgin ALShitJ::h(co nfig)# ne""f 0 4 ALSM!ch(co nfig-ine)# pass.. ord cisco ALSM!ch(co nfig-ine)# bgin ALShitJ::h(config)# ine""f 0 15 ALSM!ch(config-ine)# pass..ord cisco ALSM!ch(config-ine)# bgin ALShitJ::h(config)# enable secret class ALSM!ch(config)# enable pasSM:>rd cisco ALShitJ::h (config )# inlerfac e fa0/1 ALSM!ch(config-if)# pass..ord cisco ALSM!ch(config-if)# no shutdo'M> ALShitJ::h(co nfig)# ne cons 0 ALSM!ch(co nfig-ine)# passv. ord cisco ALSM!ch(co nfig-ine)# bgin

29. A user reportsbeing able to access the Internet but not being able to doonload e-mail from the mail serverat the ISP. What should the user check on the user v.orkstation? the PCP3 and SMTP server settings in the e-mail application the pat ch cable connections at the back of the v.orkstatio n and at theII plale the D :P sett ings in the operatin g system H the IP ad dress. mas k, and defa ugl ateway values the NIC drivers

30.

192.168. 3.0124

192.168.5.0124

A 19 2.16 8.2.01 24
is destine d for LAN

19 2.168.4.0124
to direct
traffic from LAN A that

Refer to the grap hic. Which command ....;nconfigure a static rOIJie on Rou1er A

C?

RouterA (confi g)# ip route 192.168.4.0 255.255.255.0 192.168. 5.2 RouterA (confi g)# ip route 192.168.4.0 255.255.255.0 192.168. 3.2 RouterA(con fig)# ip route 192.168.5.0 255.255.255.0 192.168.3.2 Router A(con fig)# ip route 192.168.3.0 255.255.255.0 192.168.3.1 Router A(con fig)# ip route 192.168.3.2 255.255.255.0 192.168 .4.0

Leheki.ilg /7

4.06.2012 0:51

31. Which suooetmaskscould be used V > lle sutnetting a Class B IP address?(Choose I'M>.) n 255.256.255.240 255.256.192.0 255.256.0.0 255.192.0.0 240.0.0.0 255.0.0.0 32.

10.16.10.5130 10.16.10.6130

SOI0/1

Server 10.16.10.9 8 Hosts 10.16.10.81


Refer to the exhibit The neM<lrk aO O inistrat has configuredthe RTA and RTB interlaces.In order to alk >N or hos1s that are attached to RTA to reach the server that is attached to RTB, a static route from RTA to the serwr LANand a defaul route from RTB back to RTA need to be configured.Which tHo command will the s administrato use to accof11ll these tasks on the I'M >routers? (Choose I'M>.) r sh RlA(config)# ip ro < .t 10.16.10.5 255.255.255.252 10.16.10.6 e RlA(config)# ip ro < .t 0.0.0.0 0.0. 0.0 10.16.10.6 e RlA(config)# ip ro < .t 10.16.10.96 255.255.255.252 10.16.10.6 e RlB(config)# ip route 10.16.10.6 255.255.255.248 10.16.10.6 RlB(config)# ip route 0.0.0.0 0.0. 0.0 S0/0/1 RlB(config)# ip route 0.0.0.0 0.0. 0.0 10.16.10.6

33. H< 1Ndo port filtering and access iS1s help pr<M de ne\'Mlrksecurity? They prevent specied types of traffiC from reaching spec ied n e t.-'O rk destination s. They alert n e M < > rk administrators varioustype of denialof sem attacks as they occur. to e They prevent viruses, mrms. and Trojans from infecting host com putersand seMrs. They enable encryr.O o and a<menfication of confidentialdata comrnunications. n 34.

650f t.
Refer to the exhibit The neM<lrk aO O inistrat of the building in the graphci needs to choose the type of or cable best sued to add Se"""B to the ne\'Mlrk. Which cable type is the best choice?
STP UTP coaxial hbef optic

35. What is used 'r 1 fa routing protocol to determinethe best path to ir >:lude in the rou tir1 table? : g Corr,ergence time Defaudlistance Metric Type of ro u te<

36.

Refer to the exhibit Wtich IP addressescould be assigned to U1 e h oS 1 sin the diagram? {Choose Mo.) 192.16 8.65.31 192.16 8.65.32 192.168.65.35 192.168.65.60 192.16 8.65.63 192.16 8.65.64

37.

...

Leheki.ilg /7

4.06.2012 0:51

p-..
30 hosts 25 hosts
Given the netM lrk 192.168.25. 0 sho'Ml in the graphic,ich suO O e tmask \!VOU id accommodate the number of
hosts in each subnet? 255.255. 0.0 255.255.224.0 255.255.255.0 255.255.255.2 24 255.255.255.240 255.255.255.248 38. Which t'v "ttprotocols aiiON neMork devices to report their net.t..ork rmnagem ent de;lce ? (Choose lv>o.) S ystog Telnet

status and

ev ents

to a centr alized

HTTP
HT $ TP

SNMP

39. Wh at is true regar ding llle difference


t i c

s b e NAT and e n

PA T? tim e extern alaccess

PAT uses llle m doverloocr at lhe end of lhe access-fist staten>ent10 share a single registere d address. r NAT albh an uovegistere d ad<tess to map 10 mulliple registere d addresses. s Dyna mic NAT alb s hosts to rec eiAe lhe h PAT uses ur i

so..ce port numbers

sa m egloba laddress

each

is required.

10 distin guish b e translations. e n

40.
Otvott 10 8o<M Enlty addren (es)

P l.a c fo rm csco 2960,Ca p JtM W S W !tc .h tt

lnttdaet FastEthtrndl.O, Port 10 (outgOing port) fa..EthttntO O Hold:trnt 121 Vtr&IOn

Cotto lOS Soawoot. C2960 Sollwo1t(C 29601ANBASEM ).v......, 122(2S)FX. RELEASESt:JflWAAE(f<l) Copynfl< (c) 19862005 by C<sto SysotMs.lnt C -'tdW d 120d.OS 2205by pl_ltam t Ouplt . .
ld trtlltm v ttll ti'IIOn

E MI')'-U K) ( Otvot IO RTA

Pl.ltform e:t" o C1841,CapabtlUtt: Routtt

1921E826

lnll<fott StnlllO . POlliO (OUIP>I POllStnOO.O H o a t:th m162 t

vo.-

c..coiOSs.

a....... IS<I So ftw1<t (CIS<If'BASE.M) Ttch nteal SUppott hnp 1/www ctJ.Cocomlttchwppott Copynfl< (c) 19862005 by C<sc Systomt.lnt o
Compled Mon 15-May.(l6 1 S A by pt_ltam

.-123(U)T7.RLEASE

SOFlWAR (1 < 2 )

Refer

to the exhibit The

graf: llic shows the ou1pUtof a command issu ed on router RTB. Acc ording

to the

output

' <hat l'Ml statements are true of router RTB? (Choose l'Ml.) The rout er is connected Router RTB is connected The IP address

to a router named Boise. to a Cisco 1841 router.

Router RTB is drectly connected to Mo oth er routers.

ot the

rout er irterface connected to rout er RTB is 192.168.2.6.

The RTB rot.ter is cornecte d to Mo Cisco de\1ces 41.

by Fast Ethernet links.

10.1.1.5/30 S0/0/0

10.1.1.6/30 S0/0/0

Refer to 1he exhibit

The net>M>rka<triristra10r uses lhe command below to configure a defauk route to 1he ISP

net>M>rk :RTB{co dig)# ip route 0. 0.0.0 0. 0.0.0 10. 1.1.6 A pio 1 issued from 1he ISP is successfu lto router Q RTB. Howev er.ping echo repacket s arrive at a host that is attached 10 lhe Fa0/ 0 intertace of RTB. and 1he replies dO not make it back The ISP

to llle ISP router. What v.ill fix lhis probl em? orustbe conif gured 10 forv. ard packets from 1he 192.168.1. 0 nel'Mlrk. The ip route comrm nd needs to be edited so thatlhe next hop address is 10.1.1.5. The ip route comrmnd needs to be edited so that1he 192.168.1.1 address is 1he next hop
The ip route command shotJd be removed from the RTB router configuration.

address.

42. A neM ork teciY iician is using a neM ork management station to gather data about the pertorm ance of devices and ri<s w n llle ISP. Which appication lay er pro10col makes this possible? itli

SNMP FTP DHCP SM TP

...

43. What are tw o!X Jrp ose s DNS? (CI>)osetwo.) ol to dynarricalyassign IP addressinginformatio to n e tM :>rk S 1S n ho to simplify the adrrinistration ol host and defaugl atewayaddressingon client computers to assign TCP po<tmmbers to h oS 1Sas part of ltle data transferprocess to resooe human-readabledomani nam esto nuneric IP addresses to replace lhe static HO STSfile V > a omre practicaldynamic sySiem ilh
44. A hacker attempts to reach conf'idential information that is storedon a server inside the corp:rate netv. rk.A neMrk security solution inspect the entire packet, determines that is a threat. and blocksthe o s it packet from entering the inside neMork .. Wtich sec Jity measure protectedthe nr ? k an IDS an IPS a host based fire'MIII Anti X softNare 45. HoN many host addresses may be assigned on each suOOeMork\1\tlen using the 130.68.0.0 neMork address o M tha subnetmask o/25 5.255.248.0? 30

256 2048 2048


4094 4096 46. In an 1Pv4 environment Wlat information is used by the router to forward data packets from one interface of a rot.ter So another?

destination n e lV >fk address O


source netv-ork address

source MAC address II kno'Ml port destinatio address n 47. A smatlire retailer reqlires a bw-costWAN connectio to its headquarter in order to manageits n s inventoryand!= fO C ess custom e< sales in realtime. Which WAN connectio type is best suited to its needs? n Sonet

T3
dial'4) DSL leased line

48. The commandcopy tftp runo io l9 -( nfo has been entered onlhe router.What will this commanddo? :o g
copy lhe config..ation in RAM to a seru!r copy lhe config..ation file from a server 1 0 RAM copy lhe config..ation file in NVRAMto RAM copy lhe config..ation file in NVRAMto a server copy lhe config..ation file from a serve r1 0 NVRAM

49.

Server

192.168.102.9 8

Refer to the exhibit The neMork aOOinistrat needs to configur e the Fa0/0 interface of RTB so that hosts or from RTA can connect to the server that is attachedto RTB. Which tV \0commands will the administrator use to acco"1llsh this task? (Choose W>.) R1B# ip address 192.168.102.98 255.255.255.248

RlB(contig. )# ip address 192.168.102.99 255.255.255.252 RlB(contig)# ip address192.168.102.97 255.255.25 5.252 RIB(contig)# no shu1d0Ml RlB(contig. )# no sr.Mown RlB(contig. )# ip address 192.168.102.97 255.255.255.252

50.

192.168.1.7

c:\> ping 192.168.1.7

Refer to the exhibit A NO: technician at an ISP enters the command shoM"'. What are t iM >reasons to use this command? (Choose tv.o.)

to map lhe path to 192.168.1.7 to lest reachabiity to 192.168.1.7 to locate connectivity problem salong the route 1 0 192.168.1.7 to identity the ISPs that intercomect the N C x ::: wilh the remotehostwilh the address 192.168.1.7 to measue the tim e that packets take to reach 192.168.1.7 and return to the lechnicians 'Mlrkstation

Leheki.ilg /7

4.06.2012 0:51

Das könnte Ihnen auch gefallen