You are on page 1of 28

1. What are two characteristics of DSL technology? (Choose two.

)
Uploads typically offer larger transfer rates than downloads.
Service providers deploy DSL in the local loop of the telephone network.
DSL download rates are reduced y large volu!es of "#$S voice traffic.
%ilters and splitters allow "#$S and DSL traffic to share the sa!e !ediu!.
DSL is a shared !ediu! that allows !any users to share andwidth availale fro! the
DSL&'.
2.
(efer to the e)hiit. What is the effect of the e)tended &CL when applied inound on the
S*+*+* interface on (,?
&ll -" traffic will e per!itted during the specified days and ti!e range.
.oth -" and $elnet traffic will e per!itted during the specified days and ti!e range.
#nly $elnet traffic destined for /0,./1./*.*+,2 will e per!itted during the specified days
and ti!e range.
$elnet traffic will e per!itted only during the specified days and ti!e range. &ll other
network traffic will e per!itted any ti!e.
3.
(efer to the e)hiit. .ranch & has a Cisco router. .ranch . has a non3Cisco router set for
-4$% encapsulation. &fter the co!!ands that are shown are entered5 (, and (6 fail to
estalish the "7C. $he (, L'- is Cisco5 and the (6 L'- is &8S-. $he L'- is successfully
estalished at oth locations. Why is the "7C failing?
$he "7C to (6 !ust e point3to3point.
L'- types !ust !atch on each end of a "7C.
$he ietf para!eter is !issing fro! the frame-relay map ip 10.10.10.3 203co!!and.
4. &t what physical location does the responsiility for a W&8 connection change fro! the
service provider to the user?
D'9
local loop
CSU+DSU
de!arcation point

5.
(efer to the e)hiit. What can e concluded fro! the e)hiited output of the debug ip
nat co!!and?
$he /*././.,,: host is e)changing packets with the /;,./1<.*./* host.
$he native /*./.,**.,:2 address is eing translated to /;,./1<.*./*.
$he /;,./1<.*.*+,2 network is the inside network.
"ort address translation is in effect.

6.
(efer to the e)hiit. Which two state!ents correctly descrie how (outer/ processes an %$"
re=uest that enters interface S*+*+* and is destined for an %$" server at -" address
/;,./1<./.:? (Choose two.)
$he packet does not !atch an access list condition.
$he router !atches the inco!ing packet to the state!ent that is created fro! theaccess-
list 201 permit ip any any co!!and.
$he router !atches the inco!ing packet to the state!ent that is created fro! theaccess-
list 101 permit ip any 192.168.1.0 0.0.0.255 co!!and.
$he router !atches the inco!ing packet to the state!ent that is created fro! theaccess-
list 201 deny icmp 192.168.1.0 0.0.0.255 any co!!and.
$he packet is allowed into (outer/.

7.
(efer to the e)hiit. Which state!ent is true aout the W&8 switch device?
-t uses a !ultiport internetworking device to switch traffic such as %ra!e (elay5 &$' or >.,:
over the W&8.
-t provides internetworking and W&8 access interface ports that are used to connect to the
service provider network.
-t provides ter!ination for the digital signal and ensures connection integrity through error
correction and line !onitoring.
-t converts the digital signals produced y a co!puter into voice fre=uencies that can e
trans!itted over the analog lines of the pulic telephone network.

8.
(efer to the e)hiit. Which state!ent is true aout the status of the %ra!e (elay
connection?
$he %ra!e (elay connection is in the process of negotiation.
#nly packets with control it D4 set are sent over the "7C. 8o data traffic traverses the link.
"ackets !arked as %4C8 and .4C8 indicate that a congestion control !echanis! is enaled
on the %ra!e (elay "7C.
$he ?DLC- US&@4 A L#C&LB status indicates that the "7C link is not estalished etween
the interface S*+*+*./ and the %ra!e (elay switch.

9. &n ad!inistrator is configuring a dual stack router with -"v1 and -"v2 using (-"ng. $he
ad!inistrator receives an error !essage when trying to enter the -"v2 routes into (-"ng.
What is the cause of the prole!?
(-"ng is inco!patile with dual3stack technology.
&ll interfaces have een configured with the incorrect -"v2 addresses.
(-"v/ or (-"v, needs to e configured in addition to (-"ng to successfully use -"v2.
When -"v2 and -"v1 are configured on the sa!e interface5 all -"v2 addresses are shut down
in favor of the newer technology.

10.
(efer to the e)hiit. & network ad!inistrator is using two routers to test a W&8 connection .
What can e concluded ased on the output of the sh! running-cnfig co!!ands?
$he W&8 link is using """ encapsulation.
$he W&8 link speed is faster than a $/ line.
$he router (, serves as the DC4 for the W&8 link.
$he W&8 link is configured with the Cisco default encapsulation protocol.

11. Which state!ent is true aout wildcard !asks?
-nverting the sunet !ask will always create the wildcard !ask.
& wildcard !ask identifies a network or sunet it y using a C/C.
$he sa!e function is perfor!ed y oth a wildcard !ask and a sunet !ask.
When a C*C is encountered in a wildcard !ask5 the -" address it !ust e checked.

12.
(efer to the e)hiit. & technician issues the sh! interface s0"0"0 co!!and on (/ while
trouleshooting a network prole!. What two conclusions can e deter!ined y fro! the
output shown? (Choose two.)
$he andwidth has een set to the value of a $/ line.
$his interface should e configured for """ encapsulation.
$here is no failure indicated in an #S- Layer / or Layer ,.
$he physical connection etween the two routers has failed.
$he -" address of S*+*+* is invalid5 given the sunet !ask eing used.

13. Which co!ination of Layer , protocol and authentication should e used to estalish a
link etween a Cisco and a non3Cisco router without sending authentication infor!ation in
plain te)t?
DDLC with "&"
DDLC with CD&"
""" with "&"
""" with CD&"

14. &n ad!inistrator learns of an e3!ail that has een received y a nu!er of users in the
co!pany. $his e3!ail appears to co!e fro! the office of the ad!inistrator. $he e3!ail asks
the users to confir! their account and password infor!ation. Which type of security threat
does this e3!ail represent?
cracking
phishing
phreaking
spa!!ing

15. What effect would the (outer/(config3e)t3nacl)E permit tcp 172.16.4.0 0.0.0.255
any e# !!! co!!and have when i!ple!ented inound on the f*+* interface?
&ll $C" traffic is per!itted5 and all other traffic is denied.
$he co!!and is reFected y the router ecause it is inco!plete.
&ll traffic fro! /0,./1.2.*+,2 is per!itted anywhere on any port.
$raffic originating fro! /0,./1.2.*+,2 is per!itted to all $C" port <* destinations.

16. What is a co!!on use of a $%$" server?
to allow access to restricted syste! resources
to detect attacks against a network and send logs to a !anage!ent console
to provide active defense !echanis!s that prevent attacks against the network
to perfor! -#S i!age and configuration uploads and downloads over the network

17. &n ad!inistrator is unale to receive e3!ail. While trouleshooting the prole!5 the
ad!inistrator is ale to ping the local !ail server -" address successfully fro! a re!ote
network and can successfully resolve the !ail server na!e to an -" address via the use of
the nsl$up co!!and. &t what layer of the #S- !odel is the prole! !ost likely to e
found?
application
transport
network
data link

18.
(efer to the e)hiit. "C/5 "C,5 and "C6 are configured with dyna!ic address assign!ents.
"C, is assigned an -" address fro! the DDC" server. What would account for the -"
addresses that are currently assigned to "C/ and "C6?
Switch S, port %a*+/, is configured for full3duple).
$hese addresses were included in the DDC" server pools.
(outer (/ has a !isconfigured -" address on interface %a/+*.
(/ interface %a*+* is not in the sa!e network as the DDC" server.
(/ interfaces %a*+* and %a/+* do not include the ip helper-address co!!and.

19.
(efer to the e)hiit. (outers (/ and (, are oth configured for single area #S"%. Users who
are connected to switch S/ are unale to access dataase applications that run on servers
that are connected to S,. $he network engineer is working re!otely and only has the
infor!ation that is shown in the e)hiit to direct initial trouleshooting efforts. .ased on the
e)hiit5 which #S- layer is the !ost appropriate to start with for a divide3and3con=uer
approach?
network layer
application layer
data3link layer
physical layer

20. & network ad!inistrator added two switches and a new 7L&8 over the past weekend.
Dow can the ad!inistrator deter!ine if the additions and changes i!proved perfor!ance
and availaility on the co!pany intranet?
"erfor! a aseline test and co!pare the current values to values that were otained in
previous weeks.
-nterview depart!ental secretaries and deter!ine if they think load ti!e for we pages is
i!proved.
Co!pare the hit counts on the co!pany we server for the current week to the values that
were recorded fro! previous weeks.
"erfor!ance on the intranet can e deter!ined y !onitoring load ti!es of co!pany we
pages fro! re!ote sites.

21.
(efer to the e)hiit. & network ad!inistrator configures a standard access control list on
(outer/ to prohiit traffic fro! the /;,./1<.*.*+,2 network fro! reaching the -nternet. $he
access control list also per!its traffic fro! the /;,./1<.*.*+,2 network to reach the
/;,./1<./.*+,2 network. #n which interface and in which direction should the access
control list e applied?
interface %a*+*5 inound
interface %a*+*5 outound
interface S*+*+*5 inound
interface S*+*+*5 outound

22. Which -444 <*,./1 roadand wireless technology allows users to connect to the -S" at
speeds co!parale to DSL and cale?
Wi3%i
satellite
Wi'&>
'etro 4thernet

23.
(efer to the e)hiit. (outer/ and (outer, each support separate areas of a data center5 and
are connected via a crossover cale. (esources attached to (outer/ are unale to connect
to resources attached to (outer,. What is the likely cause?
$he crossover cale is faulty.
$he -" addressing is incorrect.
$here is a Layer , prole! with the router connection.
$he upper layers are e)periencing an unspecified prole!.
#ne or oth of the 4thernet interfaces are not working correctly.

24.
(efer to the e)hiit. & network ad!inistrator is trying to ackup the -#S software on (/ to
the $%$" server. De receives the error !essage that is shown in the e)hiit5 and cannot ping
the $%$" server fro! (/. What action can help to isolate this prole!?
Check that (/ has a route to the /*./*./*.* network.
7erify that the $%$" server software supports inary file transfers.
'ake sure that the $%$" server has /;,./1<././ as its default gateway.
4nsure that the laptop has an -" address in the /;,./1<./.*+,2 network.

25. & technician is talking to a colleague at a rival co!pany and co!paring DSL transfer
rates etween the two co!panies. .oth co!panies are in the sa!e city5 use the sa!e
service provider5 and have the sa!e rate+service plan. What is the e)planation for why
Co!pany & reports higher download speeds than Co!pany .?
Co!pany . has a higher volu!e of "#$S voice traffic than Co!pany &.
Co!pany . shares the conection to the DSL&' with !ore clients than Co!pany &.
Co!pany & only uses !icrofilters on ranch locations.
Co!pany & is closer to the service provider.

26. & network ad!inistrator is instructing a technician on est practices for applying &CLs.
Which suggestion should the ad!inistrator provide?
8a!ed &CLs are less efficient than nu!ered &CLs.
Standard &CLs should e applied closest to the core layer.
&CLs applied to outound interfaces are the !ost efficient.
4)tended &CLs should e applied closest to the source that is specified y the &CL.

27.
(efer to the e)hiit. Dow !any addresses could e assigned to clients y DDC"G(outer?
6
/0
/;
:/
/,:

28.
(efer to the e)hiit. (/ is perfor!ing 8&$ overload for the /*././.*+,2 inside network. Dost
& has sent a packet to the we server. What is the source -" address of the return packet
fro! the we server when received at the 8-C on host &?
/*././.,H/,62
/0,.6*.,*./H/,62
/0,.6*.,*./H6666
/;,./1<./.,H<*

29.
(efer to the e)hiit. & network ad!inistrator is creating a prototype to verify the new W&8
design. Dowever5 the co!!unication etween the two routers cannot e estalished. .ased
on the output of the co!!ands5 what can e done to solve the prole!?
(eplace the serial cale.
(eplace the W-C on (&.
Configure (& with a clc$ rate co!!and.
-ssue a n shutd!n interface co!!and on (..

30.
(efer to the e)hiit. (outers (/ and (, have een configured with 4-@(" in the sa!e
autono!ous syste!. Co!puters "C/ and "C, are not ale to ping each other. %urther
investigation has revealed that the route to /;,./1<./*.* is !issing fro! the routing tale
on (,. What is the cause of the prole!?
$he networks are not correctly su!!ariIed.
$he %ast4thernet interfaces on (/ are configured as passive.
$he network state!ents on (, are incorrectly configured.
4-@(" on (/ does not recogniIe the /;,./1<./*.* network.

31. During the initial configuration of a router5 the ad!inistrator enters the co!!and n
ser%ice cnfig. Dow will the router ehave as a result of this co!!and?
&ll services will e disaled.
$he default configuration will e restored on reoot.
&uto!atic configuration fro! the network will e prevented.
Services that are configured on the router will not e allowed to originate traffic.

32. & co!pany is looking for a W&8 solution to connect its head=uarters site with four
re!ote sites. What advantage would dedicated leased lines provide to the custo!er
co!pared to a shared %ra!e (elay solution?
lower cost
lower latency and Fitter
variale andwidth capacity
fewer physical router interfaces

33.
(efer to the e)hiit. %ro! the output of the sh! interface co!!ands5 at which #S- layer
is a fault indicated?
application
transport
network
data link
physical

34.
(efer to the e)hiit. "&$ has een i!ple!ented on router (,. "C/ and "C, are unsuccessful
when atte!pting to connect to -nternet resources. What is a possile cause?
8o 8&$ pool is configured.
$he CinsideC and CoutsideC interfaces are switched.
$he access control list is configured with an incorrect access list nu!er.
$he access control list is !issing a state!ent for the /*.;2.1.* network.
$he ip nat inside surce list 1 interface co!!and is pointing to the wrong serial
interface.

35.
(efer to the e)hiit. &n &CL called 'anagers already e)ists on this router. What happens if
the network ad!inistrator issues the co!!ands as shown in the e)hiit?
$he new &CL overwrites the e)isting &CL.
$he network ad!inistrator will receive an error !essage.
$he e)isting &CL is !odified to include the new co!!and.
& second 'anagers &CL is created that contains only the new co!!and.

36. What functionality do access control lists provide when i!ple!enting dyna!ic 8&$ on a
Cisco router?
defines which addresses can e translated
defines which addresses are assigned to a 8&$ pool
defines which addresses are allowed out of the router
defines which addresses can e accessed fro! the inside network

37.
(efer to the e)hiit. What is placed in the address field in the header of a fra!e that will
travel fro! the DC office of &.C Co!pany to the #rlando office?
'&C address of the #rlando router
'&C address of the DC router
/;,./1<./.,:
/;,./1<./.,1
DLC- /**
DLC- ,**

38.
(efer to the e)hiit. $his serial interface is not functioning correctly. .ased on the output
shown5 what is the !ost likely cause?
i!proper L'- type
interface reset
""" negotiation failure
unplugged cale

39. What three state!ents descrie the roles of devices in a W&8? (Choose three.)
& CSU+DSU ter!inates a digital local loop.
& !ode! ter!inates a digital local loop.
& CSU+DSU ter!inates an analog local loop.
& !ode! ter!inates an analog local loop.
& router is co!!only considered a D$4 device.
& router is co!!only considered a DC4 device.

40. When configuring re!ote access to a router5 what is the significance of the n
pass!rd co!!and on a 7$J line?
Logins are prevented on that line.
8o password is re=uired to log in to that line.
$he re!ote user is not allowed to change the password for that line.
$he re!ote user is pro!pted to change the line password after connecting to the router.

41.
(efer to the e)hiit. &n ad!inistrator has added the e)hiited co!!ands to routers & and
.5 ut no routing updates are e)changed etween the two routers. .ased on the infor!ation
that is given5 what is the likely cause of the prole!?
(outer & is advertising the wrong network.
$he authentication key strings do not !atch.
$he serial interfaces of routers & and . are not on the sa!e network.
$he authentication key nu!ers do not !atch the 4-@(" process nu!er for oth routers.

42.
(efer to the e)hiit. $he hosts in network & all have static addresses that are assigned in
the /;,./1<.,.*.+,2 network. $he hosts in network . are DDC" clients in the
/;,./1<./.*+,2 network. &fter router (/ has een configured with the state!ents as shown
in the e)hiit5 the DDC" clients are reporting that they cannot access any network
resources. $he hosts with static addresses cannot access any resources outside network &.
What is the prole!?
$he DDC" scope has the wrong address pool.
$he interfaces on (/ are incorrectly addressed.
$he assignale DCD" addresses are all e)cluded.
$he DCD" clients are receiving the wrong default router address.

43.
(efer to the e)hiit. Why are the routers unale to estalish a """ session?
$he userna!es are !isconfigured.
$he -" addresses are on different sunets.
$he clock rate is configured on the wrong end of the link.
$he CD&" passwords !ust e different on the two routers.
-nterface serial *+*+* on (outer/ !ust connect to interface serial *+*+/ on (outer,.

44. & co!pany uses a "7C with a co!!itted infor!ation rate (C-() of /,< k+s and a
co!!itted urst infor!ation rate (C.-() of 12 k+s. $he link is used to periodically send
updates at a rate of /22 k+s. What will happen to the update traffic?
$he traffic will e sent5 ut the co!pany will e charged a penalty.
$he traffic will e sent using the additional C.-( and will e guaranteed delivery.
$he traffic will e dropped at the C# for e)ceeding the co!!itted infor!ation rate.
$he traffic will e sent5 ut the urst traffic will e !arked for discard if congestion is
encountered.

45. Which state!ent is true aout 8C"?
Link ter!ination is the responsiility of 8C".
4ach network protocol has a corresponding 8C".
8C" estalishes the initial link etween """ devices.
8C" tests the link to ensure that the link =uality is sufficient.

46. Which three ite!s are LC" options that can e configured for """? (Choose three.)
CD&"
Stacker
-"C"
CD"C"
'ultilink

47. When configuring a %ra!e (elay connection5 what is the purpose of -nverse &("?
to assign a DLC- to a re!ote peer
to disale peer re=uests fro! deter!ining local Layer 6 addresses
to negotiate L'- encapsulations etween local and re!ote %ra!e (elay peers
to create a !apping of DLC- to Layer 6 addresses that elong to re!ote peers

48.
(efer to the e)hiit. What is another way to represent this -"v1 address?
,*6/HH/6*%HH;C*HH/6*.
,*6/HH/6*%HH;C*H*H/6*.
,*6/H*H/6*%HH;C*HH/6*.
,*6/H*H/6*%HH;C*H*H/6*.

49.
(efer to the e)hiit. Which state!ent is true aout the configuration of (/?
$he re!ote session is encrypted.
& password is sent in plain te)t.
& connection that is using secure D$$" is enaled.
& local userna!e dataase is used for authentication.

50.
(efer to the e)hiit. $o reach (,5 and for configuring %ra!e (elay on the point3to3point
interfaces shown in the graphic5 which DLC- should e used in the frame-relay interface-
dlci co!!and that is issued on (/?
/**
/*/
,**
,*/

You might also like