You are on page 1of 16


Refer to the exhibit. The routers are configured with RIPv2 with default configurations. When attempting to communicate with other networks, hosts from are experiencing connectivity issues. What could be done to resolve this issue? Change to a public IP address scheme. Disable automatic route summarization. Change the IP network address on R3 Fa0/0 to /26. Change the subnet mask on the link between R2 and R3 to 2

Refer to the exhibit. What will be the result of entering the commands as shown in the exhibit? RIPng will not be enabled on interface fa0/0 because the network address is a broadcast address. RIPng will not be enabled on this interface because the IPv6 address is only /64 bits long. RIPng will be enabled on interface fa0/0 and will advertise the configured network. The IPv6 interface configuration requires a network statement for the network. The IPv6 routing instance must be called RTA not RT0. 3 Which two technologies can provide data integrity in a VPN connection? (Choose two.) ESP DES MD5 DH1 SHA-1 4 Which protocol is enabled by default to dynamically discover and eliminate Layer 2 loops that are created by redundant links between switches? CDP DTP

STP VTP 5 What is used locally by a router to identify each Frame Relay PVC? LMI DLCI IP address MAC address 6 A company decides to deploy a virtual private network (VPN) to connect remote workers and branch offices to corporate headquarters. What is the best description of the type of connectivity the company is ready to implement? a VPN that uses LANs to connect remote sites or users a VPN that uses a public network to connect remote sites or users a VPN that uses a wireless LAN over the Internet to connect remote sites or users a VPN that uses a dedicated connections, such as leased lines, to connect remote sites or users 7 In the Cisco Enterprise Architecture, which module would include web and e-commerce servers for access by users external to the organization? campus core enterprise edge enterprise branch enterprise campus 8 What is one advantage of a full mesh topology at the core layer of the enterprise network compared with a partial mesh topology? It adds scalability to the corporate network. It provides fully redundant links to connecting modules. It lowers the impact and risk of DoS attacks from the Internet. It increases the manageability of the network devices in the core layer. 9 Which command can be used to load a new Cisco IOS image on a router? copy startup-config tftp: copy tftp: startup-config copy running-config tftp: copy tftp: flash: copy flash: tftp: copy flash: startup-config 10 What functionality does NBAR provide to network technicians? provides data which can be used to create a network diagram allows for monitoring and managing network devices allows for classification and monitoring of network traffic

displays the IOS versions and IP addresses on neighboring devices 11 A company has help desk staff that is not highly trained in VPNs. What two features or technologies must the network designer identify as training needs in order for the help desk to support secure remote access for teleworkers? (Choose two.) QoS operation VLAN configuration tunneling protocols IPv6 and IPv4 dual stack encryption algorithms Frame Relay configuration 12

Refer to the exhibit. What three actions will R1 take after receiving a frame from host H1 which is destined for host H2? (Choose three.) The data frames will be forwarded out interface FastEthernet 0/1 of R1. No data frames will be forwarded out of either FastEthernet interface of R1. Router R1 will replace the destination IP address of the packets with the IP address of host H2. Router R1 will place the MAC address of host H2 in the destination MAC address of the frames. Router R1 will place the MAC address of the forwarding FastEthernet interface in the place of the source MAC address. Router R1 will place the IP address of the forwarding FastEthernet interface in the place of the source IP address in the packets. 13 Which statement describes the use of a network baseline? It creates a high level logical network diagram. It provides a point of reference for future network evaluations. It allows precise identification of the original location of network equipment.

It should be established as soon as a problem is detected on the network. 14

Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of an access layer switch and connects three PCs. The engineer attempts to ping from each PC to the other connected PCs to test the configuration. Which statement describes the result of the last step? Host 1 can ping Host 2. Host 1 can ping Host 3. Host 2 can ping Host 3. No hosts can ping any other host. 15

Refer to the exhibit. Which username and password combination will correctly configure PPP authentication on routers RTR_A and RTR_B?

16 During a review of the proposed bill of materials, an account manager of the network solution company realizes that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than was originally specified by the network designer. When questioned, the systems engineer responds that the switches specified by the designer cannot be purchased within the

budget limitations of the customer. Which action should the account manager take? Inform the customer that the project budget must be increased. Inform the customer that the project cannot be completed given the unreasonable budget constraints. Communicate any risks that are associated with the equipment substitution and obtain customer approval to proceed. Because the customer is probably aware that the budget limitations will require lower cost, less capable equipment, the account manager should do nothing. 17 What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch? STP VTP RSTP BPDU port security 18 What level of service is specified by the CIR from a Frame Relay service provider? the minimum available clock rate the number of available virtual circuits the maximum average data transfer rate the minimum amount of bandwidth available 19 Which is a valid representation of the IPv6 address 4110:00b9:0000:0000:0303:0000:11fa:771a? 4110:b9::303:11fa:771a 4110:00b9:3:3::11fa:771a 4110:00b9::303::11fa:771a 4110:b9::303:0:11fa:771a 20

Refer to the exhibit. EIGRP is correctly configured on router Remote and router HQ. A network technician is configuring a backup route on router Remote to network via router Branch. Which configuration option will successfully create the backup route? Remote(config)# ip route

Remote(config)# ip route 85 Remote(config)# ip route 90 Remote(config)# ip route 100 21

Refer to the exhibit. What can be concluded from the output that is shown? MDF_R1 has a MAC address of 2294:300F:0000. MDF_R1 is connected through FastEthernet0/1 to C2960-24TT-L_IDF1. Device C2960-24TT-L_IDF1 is running Cisco IOS Software Release 12.2(25)SEE2. MDF_R1 is installed in the main distribution facility on floor 24 of building L. 22 What is a signaling standard that is used for managing and maintaining the connection between a CPE router and the service provider Frame Relay switch? ARP CIR DLCI Inverse ARP LMI 23

Refer to the exhibit. An administrator installs a WIC-2T module into a Cisco 1841 router. Attempts to configure the S0/0/0 interface are unsuccessful. As a first step in troubleshooting the failure, the administrator issues the show version command. What is a possible reason for the failure? The WIC was not physically installed properly. The WIC was installed into slot 1 instead of slot 0. The interface type and number are invalid on an 1841. The configuration register is the wrong value for adding new modules. 24 Which two processes allow a smooth transition from IPv4 to IPv6? (Choose two.) IPSec tunneling dual stack authentication anycast addressing header simplification 25

Refer to the exhibit. Which type of application communication model best describes this network? client-client client-server farm client-enterprise edge client-enterprise server 26

Refer to the exhibit. Based on the EIGRP configuration that is shown, what can the field engineer conclude about the EIGRP authentication between RouterA and RouterB? Authentication will fail because only one key is configured. Authentication will fail because the key chain names do not match. Authentication will succeed and EIGRP updates can be exchanged. Authentication will fail because the key chain names must match the router names. 27 What type of Frame Relay subinterface must be used to connect remote sites without having to disable split horizon? multipoint multiaccess point-to-point nonbroadcast multiaccess 28 A large company plans to add several servers and requires that the servers be reachable directly from the Internet. Which action will help the company accomplish this goal? Assign to each server a static internal IP address that is mapped statically to a public IP address. Place all servers in their own Class C private subnet. Provide a private address to each server using DHCP. Assign addresses from a pool of public Class B addresses using DHCP.

29 A NetworkingCompany engineer is on a support call resolving technical problems for a client network. After the issue is resolved, the engineer also provides a training session for the network support staff. What role is the engineer filling on the networking company team? post-sales field engineer pre-sales engineer network designer account manager 30 A network administrator is given a network address of to create four subnets with seven hosts in each subnet. Which subnet mask should be used?

31 What makes the Cisco EasyVPN application a useful tool for VPN implementation? It provides encryption algorithms unavailable in other systems. It ensures that remote workers actually use the VPN for connectivity. It simplifies the configuration tasks for the device that is used as the VPN server. It allows a greater variety of network devices to be used for VPN connections. 32 A network administrator is integrating IPv6 into an IPv4 network by encapsulating one protocol packet within another protocol. Which transition method is being used? dual stack tunneling proxying and translation NAT with Protocol Translator 33 What should be considered in the design of a wireless LAN on a corporate campus? the vendor of all employee wireless NICs the cables that are used for LAN connectivity the number of wireless NICs required on enterprise servers the messaging features that are used on employee cell phones the location of the concrete pillars and walls between the offices 34 What is a characteristic of FTP traffic flows? low-volume traffic predictable bandwidth usage large packet sizes for transfers

low throughput with high response-time requirements 35 Which technology will prioritize traffic based upon the technical requirements of IP telephony? PoE QoS RPC RTP VPN 36 As part of network monitoring, a network administrator receives an alert that the CPU usage of the core router reaches 90% several times a day. Which protocol is in use to monitor the network performance? DNS SNMP SMTP DHCP TFTP 37 When implementing an IP telephony solution, why should VLANs be used? to allow the use of a single IP gateway to separate voice from data traffic for ease of prioritization to allow the PBX to use VLAN IDs to filter both voice and data traffic to allow connectivity between traditional phone devices and IP-based telephony devices 38 If traditional phones are used when introducing VoIP to a network, what component would be required to convert the analog voice from traditional telephone signals into IP packets? Multipoint control unit Power over Ethernet switches a router that acts as a voice gateway Cisco Unified Communications Manager 39 A network administrator of a middle-sized company is asked to upgrade the routing protocol of the network to support VLSM and route summarization. The current company network contains both Cisco and non-Cisco routers. Which routing protocol should be used for the upgrade? BGP RIPv1 RIPv2 EIGRP 40

Refer to the exhibit. A new host needs to be connected to the switch and be assigned to VLAN 2. Router RA is attached to the switch via a trunk and is configured as shown. What IP address should be assigned to this new host? /26 /28 /28 /28 /28 /28 41 On a Monday morning the help desk at a large company receives an unusually high number of calls reporting no connectivity to the Internet or to any other network resources. Otherwise the PCs are functioning normally. Help desk technicians note that all the calls are from a single department, and all affected users are on the same floor of a single building. Where should the help desk technicians suspect that the problem lies? workgroup switch PC power supplies patch cords from PCs to network jacks cabling from the network jack to the wiring closet 42

Refer to the exhibit. An extended ACL has been created to deny traffic from the network to the web server with IP address According to Cisco best practices, where should the ACL be applied? RTB Fa0/0 inbound RTC S0/0/1 inbound RTD Fa0/0 outbound RTC S0/1/0 outbound 43

Refer to the exhibit. A networking company designer is reviewing a diagram of a customer network. What are the two problems that need to be resolved in the topology that is shown? (Choose two.) The firewall router and ISP connection represent a single point of failure. If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable. A power supply failure of the server block switch will cause the entire IP telephony system to fail. Using Layer 3 switches to interconnect the server block servers to the IP phones introduces too much delay. The IP phones need to be redundantly connected to the switches to prevent single points of failure at the access layer. 44

Refer to the exhibit. What problem is associated with the the addressing scheme of the network? The WAN links need IP addresses from a different major network. The R1 LAN is incorrect because subnet zero cannot be used with VLSM. The WAN link IP address that connects R1 to R3 has an incorrect mask. The R1 to R3 and R1 to R2 WAN links have IP addresses that overlap. The WAN IP address that connects R1 to R2 overlaps with the R3 LAN IP addresses. 45 What are the primary design goals for the core Layer? to provide centralized server farm and VoIP services to provide dynamic routing services, filtering, and traffic flow management to provide 100% uptime, maximization of throughput, and facilitation of network growth to provide static routing, wireless access points for the network, and security for the edge devices

46 During prototype testing, the network designer performs a test to determine the ability of the network to recover from a link or device failure. Which design goal is validated if the test is a success? scalability manageability availability security 47 A network technician needs to install a four-port switch module in an operational Cisco 1841 router that has an available HWIC slot. What should the technician do first? Turn off the power to the router before installing the new module. Install the hot-swappable four-port switch module directly into slot 1 of the 1841.

Move the existing WIC-2T module to slot 1 and install the four-port module in slot 0. Shut down all Fast Ethernet ports on the router until the switch module installation is complete. 48 What feature of EIGRP should be considered when selecting a routing protocol? EIGRP cannot secure routing updates. It does not scale well for large networks. It is designed for WAN connections only. It can only be configured on Cisco devices. 49 Which two pieces of information should a network administrator have before starting an IOS transfer via TFTP? (Choose two.) IP address of the TFTP server name of the IOS image on the router operating system of the TFTP server name of the configuration file in NVRAM name of the IOS image on the TFTP server encapsulation of the router interface that is connected to the TFTP server 50 Which two Frame Relay header bits are used to indicate possible virtual circuit congestion? (Choose two.) BECN C/R DE DLCI FECN