1.What device is responsible for moving packets to destination networks outside the local network?

router switch IPS device IDS device
q q q q

Reset View

Scoring Rule For: correctness of response 2 points for Option 1 0 points for any other option Max Value = 2

2. Which two items protect a corporate network against malicious attacks at the enterprise edge ? (Choose two.) point of demarcation IP security (IPSec) Data Service Unit (DSU) intrusion prevention system (IPS) intrusion detection system (IDS)
Reset View

Scoring Rule For: correctness of response Option 4 and Option 5 are correct. 1 point for each correct option. 0 points if more options are selected than required

3.It is crucial that network administrators be able to examine and configure network devices from their homes. Which two approaches allow this connectivity without increasing vulnerability to external attacks? (Choose two Configure a special link at the POP to allow external entry from the home computer. Set up VPN access between the home computer and the network. Install a cable modem in the home to link to the network. Configure ACLs on the edge routers that allow only authorized users to access management ports on network devices. Configure a server in the DMZ with a special username and password to allow external access.
Reset View

Scoring Rule For: correctness of response Option 2 and Option 4 are correct. 1 point for each correct option. 0 points if more options are selected than required.

4. A DoS attack crippled the daily operations of a large company for 8 hours. Which two options could be implemented by the network administrator to possibly prevent such an attack in the future? (Choose two.) install security devices with IDS and IPS at the enterprise edge reset all user passwords every 30 days filter packets based on IP address, traffic pattern, and protocol deny external workers VPN access to internal resources ensure critical devices are physically secure and placed behind the demarc
Reset View

Scoring Rule For: correctness of response Option 1 and Option 3 are correct. 1 point for each correct option. 0 points if more options are selected

5.Which two pieces of information are documented in a logical topology map? (Choose two.) physical cabling service level agreements IP addressing IDF location group usage information facility floor plans
Reset View

Scoring Rule For: correctness of response Option 3 and Option 5 are correct. 1 point for each correct option. 0 points if more options are selected than required. Max Value = 2

6.Which type of network map shows the location of hosts, network devices, and media? physical topology logical topology control plane business continuity
q q q q

Reset View

Scoring Rule For: correctness of response 2 points for Option 1 0 points for any other option Max Value = 2

7. Which two situations require a network administrator to use out-of-band management to change a router configuration? (Choose two.) Network links to the router are down. No Telnet password has been configured on the router. The administrator can only connect to the router using SSH. The network interfaces of the router are not configured with IP addresses. Company security policy requires that only HTTPS be used to connect to routers.
Reset View

Scoring Rule For: correctness of response Option 1 and Option 4 are correct. 1 point for each correct option. 0 points if more options are selected than required. Max Value = 2

8. When searching for information about authentication methods and usernames of company personnel, where c network administrator look? Business Continuity Plan Business Security Plan Network Maintenance Plan Service Level Agreement
q q q q

Reset View

Scoring Rule For: correctness of response 2 points for Option 2 0 points for any other option Max Value = 2

9. An investment company has multiple servers that hold mission critical data. They are worried that if somethin happens to these servers, they will lose this valuable information. Which type of plan is needed for this company help minimize loss in the event of a server crash? business security business continuity network maintenance service level agreement
q q q q

Reset View

Scoring Rule For: correctness of response 2 points for Option 2 0 points for any other option Max Value = 2

10. A network manager wants to have processes in place to ensure that network upgrades do not affect business operations. What will the network manager create for this purpose? business security plan business continuity plan service level agreement network maintenance plan
q q q q

Reset View

Scoring Rule For: correctness of response 2 points for Option 4 0 points for any other option Max Value = 2

11.Which two types of information should be included in a business continuity plan? (Choose two.) maintenance time periods intrusion monitoring records offsite data storage procedures alternate IT processing locations problem resolution escalation steps
Reset View

Scoring Rule For: correctness of response Option 3 and Option 4 are correct. 1 point for each correct option. 0 points if more options are selected than required. Max Value = 2

12. Which two types of information should be included in a business continuity plan? (Choose two.) maintenance time periods intrusion monitoring records offsite data storage procedures alternate IT processing locations problem resolution escalation steps
Reset View

Scoring Rule For: correctness of response Option 3 and Option 4 are correct. 1 point for each correct option. 0 points if more options are selected than required. Max Value = 2

13. A network administrator must define specific business processes to implement if a catastrophic disaster prev a company from performing daily business routines. Which portion of the network documentation is the administrator defining? business security plan business continuity plan network solvency plan service level agreement network maintenance plan
q q q q q

Reset View

Scoring Rule For: correctness of response 2 points for Option 2 0 points for any other option Max Value = 2

14. . Which two router parameters can be set from interface configuration mode? (Choose two.) IP address Telnet password hostname console password subnet mask enable secret password
Reset View

Scoring Rule For: correctness of response Option 1 and Option 5 are correct. 1 point for each correct option. 0 points if more options are selected than required. Max Value = 2

15. What information can an administrator learn using the show version command? Cisco IOS filename configured routing protocol status of each interface IP addresses of all interfaces
q q q q

Reset View

Scoring Rule For: correctness of response 2 points for Option 1 0 points for any other option Max Value = 2

v 16. A network administrator has just inserted a new WIC2T controller into the first available slot of an 1841 rou The administrator needs to configure the first serial interface of this new controller. Which interface should be u s0/0/0 s0/0/1 s1/1/0 s1/0/1 s0/1/1
q q q q q

Reset View

Scoring Rule For: correctness of response 2 points for Option 1 0 points for any other option Max Value = 2

17. What is the maximum recommended cable length for Fast Ethernet over UTP? 50 meters 75 meters 100 meters 150 meters
q q q q

Reset View

Scoring Rule For: correctness of response 2 points for Option 3 0 points for any other option Max Value = 2

18.. What is the demarcation? physical point where the ISP responsibility ends and the customer responsibility begins physical location where all server farm connections meet before being distributed into the Core point of entry for outside attacks and is often vulnerable point of entry for all Access Layer connections from the Distribution Layer devices
q q q q

Reset View

Scoring Rule For: correctness of response 2 points for Option 1 0 points for any other option Max Value = 2

19. A Cisco router needs to be configured from a remote location by the use of out-of-band management. Which method should be used? Use Telnet or SSH and connect to an IP address of a FastEthernet port. Use HTTP to connect to an IP address on a FastEthernet port. Use dial up and a modem to connect to the auxiliary port. Use a terminal emulation program and connect to the console port.
q q q q

Reset View

Scoring Rule For: correctness of response 2 points for Option 3 0 points for any other option Max Value = 2

20.. A network administrator needs to configure Telnet access to a router. Which group of commands enable Teln access to the router? Router(config)# enable password class Router(config)# line con 0 Router(config-line)# login Router(config-line)# password cisco Router(config)# ip host 192.168.1.1 NewYork Router(config)# enable password cisco Router(config)# line aux 0 Router(config-line)# login Router(config-line)# password cisco Router(config)# enable password class Router(config)# line vty 0 4 Router(config-line)# password cisco Router(config-line)# login
q q q q

21. What type of connection point is a point of presence (POP)? between a client and a host between two local networks between a computer and a switch between an ISP and an Enterprise network
q q q q

Reset View

Scoring Rule For: correctness of response 2 points for Option 4 0 points for any other option Max Value = 2

22. Which two statements are true about a network operations center (NOC)? (Choose two.) Most NOCs only have tower servers or desktop servers that provide high-speed storage capabilities for thousa of clients. A NOC is typically used only to monitor and maintain the most critical network components. Because access is secured by firewalls, backup systems are not required in a NOC . Routers, high-speed switches, and servers are located within a NOC. High-speed and high-capacity data storage are important aspects of a NOC.
Reset View

Scoring Rule For: correctness of response Option 4 and Option 5 are correct. 1 point for each correct option. 0 points if more options are selected than required. Max Value = 2

23.. Which three items would be found in a NOC? (Choose three.) raised floors all wireless access points network monitoring station departmental printers customer workstations data storage devices
Reset View

Scoring Rule For: correctness of response Option 1, Option 3, and Option 6 are correct. 1 point for each correct option. 0 points if more options are selected than required. Max Value = 3

23

24. What two features are true of an IDF? (Choose two.) referred to as a wiring closet located within the NOC contains access layer devices for user connectivity contains firewalls and content filtering devices alternately called an MDF
Reset View

Scoring Rule For: correctness of response Option 1 and Option 3 are correct. 1 point for each correct option. 0 points if more options are selected than required. Max Value = 2

Master your semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master your semester with Scribd & The New York Times

Cancel anytime.