Professional Documents
Culture Documents
slot of an 1841 router. The administrator needs to configure the first serial interface of this
new controller. Which interface should be used?
s0/0/0
s0/0/1
s1/1/0
s1/0/1
s0/1/1
5 What information can an administrator learn using the show version command?
Cisco IOS filename
configured routing protocol
status of each interface
IP addresses of all interfaces
8 What device is responsible for moving packets to destination networks outside the local
network?
router
switch
IPS device
IDS device
9 Which two types of information should be included in a business continuity plan? (Choose two.)
maintenance time periods
intrusion monitoring records
offsite data storage procedures
alternate IT processing locations
problem resolution escalation steps
12 A network manager wants to have processes in place to ensure that network upgrades do not
affect business operations. What will the network manager create for this purpose?
business security plan
business continuity plan
service level agreement
network maintenance plan
13 What is the maximum recommended cable length for Fast Ethernet over UTP?
50 meters
75 meters
100 meters
150 meters
14 Which two router parameters can be set from interface configuration mode? (Choose two.)
IP address
Telnet password
hostname
console password
subnet mask
enable secret password
15 Which two pieces of information are documented in a logical topology map? (Choose two.)
physical cabling
service level agreements
IP addressing
IDF location
group usage information
facility floor plans
16 An investment company has multiple servers that hold mission critical data. They are
worried that if something happens to these servers, they will lose this valuable information.
Which type of plan is needed for this company to help minimize loss in the event of a server
crash?
business security
business continuity
network maintenance
service level agreement
17 Which type of network map shows the location of hosts, network devices, and media?
physical topology
logical topology
control plane
business continuity
18 Which two items protect a corporate network against malicious attacks at the enterprise edge ?
(Choose two.)
point of demarcation
IP security (IPSec)
Data Service Unit (DSU)
intrusion prevention system (IPS)
intrusion detection system (IDS)
19 When searching for information about authentication methods and usernames of company
personnel, where can a network administrator look?
Business Continuity Plan
Business Security Plan
Network Maintenance Plan
Service Level Agreement
20 It is crucial that network administrators be able to examine and configure network devices
from their homes. Which two approaches allow this connectivity without increasing
vulnerability to external attacks? (Choose two.)
Configure a special link at the POP to allow external entry from the home computer.
Set up VPN access between the home computer and the network.
Install a cable modem in the home to link to the network.
Configure ACLs on the edge routers that allow only authorized users to access
management ports on network devices.
Configure a server in the DMZ with a special username and password to allow external
access.
21 Which two statements are true about a network operations center (NOC)? (Choose two.)
Most NOCs only have tower servers or desktop servers that provide high-speed storage
capabilities for thousands of clients.
A NOC is typically used only to monitor and maintain the most critical network components.
Because access is secured by firewalls, backup systems are not required in a NOC .
Routers, high-speed switches, and servers are located within a NOC.
High-speed and high-capacity data storage are important aspects of a NOC.
22 A DoS attack crippled the daily operations of a large company for 8 hours. Which two
options could be implemented by the network administrator to possibly prevent such an
attack in the future? (Choose two.)
install security devices with IDS and IPS at the enterprise edge
reset all user passwords every 30 days
filter packets based on IP address, traffic pattern, and protocol
deny external workers VPN access to internal resources
ensure critical devices are physically secure and placed behind the demarc
23 A Cisco router needs to be configured from a remote location by the use of out-of-band
management. Which method should be used?
Use Telnet or SSH and connect to an IP address of a FastEthernet port.
Use HTTP to connect to an IP address on a FastEthernet port.
Use dial up and a modem to connect to the auxiliary port.
Use a terminal emulation program and connect to the console port.