This action might not be possible to undo. Are you sure you want to continue?
They will prevent all simultaneous in-band connections. They will permit an unlimited number of in-band connections. They will permit a maximum of five simultaneous in-band connections. They will permit a minimum of four simultaneous in-band connections with a different password on each connection. A network technician wants to restore a backup copy of the saved configuration file on a router from a TFTP server. After restoring the file from the TFTP server, the technician reloads the router and finds that it still has the old configuration file instead of the restored file. What could have caused this? The technician entered the command delete flash: before reloading the router. The technician entered the command boot system rom before reloading the router. The technician entered the command erase startup-config before reloading the router. The technician failed to enter the command copy running-config startupconfig before reloading the router. What is the primary function of the NOC at a large ISP? installing equipment at a customer site setting up customer accounts and passwords monitoring and testing customer network connections entering customer requirements in an order-tracking database
Refer to the exhibit. The Transfer > Capture Text feature available through HyperTerminal has been used to capture the running configuration on a router. The startup-configuration has been erased from the router followed by the issuing of the reload command. The startup-config is restored by using the captured file, but all interfaces on the router are shown as administratively down. What could cause this problem? The enable password was incorrectly entered. The configuration register was not set to 0x2142. The enable secret password was incorrectly entered. The no shutdown command must be entered under each interface section in the file being sent. The captured file should have restored the running configuration not the startup configuration.
Sw2. If the show cdp neighbors command is issued on RTB. PC1. Sw2.Refer to the exhibit. RTC. RTC. Sw1. Sw1. Which routing protocol would likely be used to distribute routes between these routers? RIP BGP OSPF EIGRP Refer to the exhibit. which devices will appear in the output if all devices use the Cisco IOS and have CDP enabled? RTA. Sw2 RTA. RTC RTA. Sw3 RTA. Sw3. RTC. PC2 Which scenario may require the use of a crossover UTP cable? connecting a host to a hub connecting a host to a switch connecting a router to a switch connecting a switch to another switch .
NAT will be configured on RTRC.1 10.1.6 18.104.22.168.1.201.226 What is a characteristic of a scalable network? 100% uptime redundant links easy expansion multiple backup devices Which type of WAN connection uses packet-switched connections? T1 E1 ISDN Frame Relay . Host H1 is sending a datagram to host H2 across the Internet.200.165.201. Which address is considered the inside local address? 10.17 209.Refer to the exhibit.1.2 209.
Which statement correctly describes the operation of DNS? It uses a local HOSTS file to resolve URLs to IP addresses for internal devices. The reliability setting is too low for the interface. It references a central file that maps hostnames to IP addresses for all Internet hosts. A defective serial interface cable was used.What is an SLA? a tool to diagnose basic network connectivity issues a survey to obtain initial information about customer problems a program that shares remote desktops to diagnose customer issues an entry-level position that provides technicians with valuable experience a contract that defines expectations between an organization and a service vendor Refer to the exhibit. It uses a distributed hierarchy of servers to resolve hostnames to IP addresses. What could be two possible causes for the Serial0/0/0 interface status? (Choose two. The bandwidth is set too high.) A Layer 3 issue exists. A loopback address must be set. An incorrect cable is being used. It uses a single layer of interconnected peer servers to manage hostname-to-IP-address mappings Which statement is true about UDP? .
. the SYST LED on the front of the switch transitions from blinking green to amber. The switch is functioning properly. What is a characteristic of the EIGRP routing protocol? It has a hop count limitation that makes it suitable only for small. It builds the topology table based on all of the advertisements from its neighbors. UDP uses acknowledgments for reliable delivery. UDP provides windowing and flow control. It does not include subnet mask information in routing updates. The switch is in half-duplex mode. It maintains a full database of distant routers and the methods by which they interconnect. About a minute after the switch has started. The switch has failed POST and must be sent for service.UDP has less overhead than TCP has. simple networks that consist of fe than 15 hops. What is the meaning of the amber SYST LED? The switch has no configuration file in NVRAM. UDP uses sessions to keep track of conversations A Catalyst switch is used as a temporary replacement for another switch that needs to be repaired.
The service password-encryption command is preventing Telnet access. Identify all potential sources of EMI. What is the possible reason that a technician is unable to telnet into the HQ router and make configuration changes? A password is required for vty 0. Determine the locations of all network devices. What should be the first step in the project? Obtain an accurate floor plan. A password for line con 0 is required.Refer to the exhibit. Sketch the proposed network design. All five virtual interfaces must be configured before Telnet is possible. Why are port numbers included in the TCP header of a segment? to indicate the correct router interface that should be used to forward a segment to identify which switch ports should receive or forward the segment to determine which Layer 3 protocol should be used to encapsulate the data to enable a receiving host to forward the data to the appropriate application to allow the receiving host to assemble the packet in the proper order A network engineer has been asked to design a new structured cable system. .
68.Which protocol allows encryption of any application layer protocol? FTP FTPS HTTPS IPsec Telnet 1 How many host addresses may be assigned on each subnetwork when using the 130.0 network address with a subnet mask of 255.0? 30 256 2046 2048 4094 4096 2 Refer to the exhibit. The network administrator uses the command below to configure a default route on RTB: RTB(config)# ip route 0.0.0. However.248.0.255.0 fa0/0 A ping issued from PC3 is successful to RTB. echo request packets arrive at PC1 but .0.0.0 0.
Another default route should be configured on RTA with a next hop address of 10.2.168.1.201.7 locate connectivity problems along the route to 209. and system problems to design network enhancements that support the new technology requirements of the customer 6 A user reports being unable to access the Internet.201.165.1 address is the next hop address.5.1. The ip route command needs to be edited so that the next hop address is 10.1. Users only have access to resources that are necessary for their jobs.165.165.7 and return to the technician's workstatio 4 For the assignment of permissions to files and folders.7 measure the time that packets take to reach 209.165. what does the "principle of least privilege" imply? No user has more privileges than any other user.22.214.171.124 network. 3 Refer to the exhibit. What are two reasons to use this command? (Choose two. The ip route command should be removed from the RTB router configuration.7 identify ISPs that interconnect the NOC and remote host with IP 209.) map the path to 209. Permissions to files are given based on seniority. The help desk technician employs a bottom-up .1.the echo replies do not make it back to PC3.201.165. A NOC technician at an ISP enters the command c:\ping 209. 5 What is the primary function of a Level 1 support technician in an ISP help desk department with multiple levels of customer support? to install hardware replacements for the customer to accompany an on-site technician to provide additional technical support to diagnose and document the symptoms of hardware. The ip route command needs to be edited so that the 126.96.36.199.7 test reachability to 209.168. software.165. Users should be given no access to computer resources until they ask. What will fix this problem? RTA must be configured to forward packets to the 192.
3.255. The technician first has the user check the patch cable connection from the PC to the wall. and then has the user verify that the NIC has a green link light.255.3. 7 What is the primary function of the NOC at a large ISP? installing equipment at a customer site setting up customer accounts and passwords monitoring and testing customer network connections entering customer requirements in an order-tracking database 8 Refer to the graphic.approach to troubleshooting.0 192.168.0 192.5.255. Which command will configure a static route on Router A to direct traffic from LAN A that is destined for LAN C? RouterA(config)# ip route 192.255.168. Connect to the user home router to check firewall settings for blocked TCP ports.168.2 RouterA(config)# ip route 192.3.0 255.255. What will the technician have the user do next? Enter an IP address into the WWW browser address bar to see if DNS is at fault.2 RouterA(config)# ip route 192.0 9 .255.168.1 RouterA(config)# ip route 192.2 255.0 192.168.168.5.0 255.168.3.4.3.2 RouterA(config)# ip route 192.0 188.8.131.52.0 255.4. subnet.184.108.40.206 192. Verify the IP address.168. and gateway settings using ipconfig on the PC.255. Use traceroute to identify the device along the path to the ISP that may be at fault.0 255.
It allows multiple hosts on a single LAN to share globally unique IP addresses. 11 A company is developing an Internet store for its website. Which protocol should be used to transfer credit card information from customers to the company web server? FTPS HTTP HTTPS WEP2 TFTP 12 How does a switch interface that uses sticky port security handle MAC addresses? The addresses are configured manually and are saved in the running configuration. 10 What is a feature of PAT? It maps IP addresses to URLs. There is a mismatch of encapsulation methods. It displays private IP addresses to public networks. They are configured manually and are not saved in the running configuration. The routing protocols are not compatible. Based on the output of the show ip interface brief command. There is no communication between R1 and R2. It sends acknowledgments of received packets. A network administrator is troubleshooting the serial connection between R1 and R2.Refer to the exhibit. . what is the cause of the problem? There is a misconfiguration of IP addresses. The no shutdown command should be issued on R2.
13 Refer to the exhibit.220.127.116.11. Which two IP addresses could be assigned to the hosts in the diagram? (Choose two.65.) 192.168.31 192. They are configured dynamically and are not saved in the running configuration.168.63 192.32 192.65.They are configured dynamically and are saved in the running configuration.65.64 14 .60 18.104.22.168.35 192.
Refer to the exhibit. The host device is configured with a permanent outside global address. 17 . A one-to-one mapping is created between an inside local and outside global address. The router is forced to return the inside global address to the address pool when a session ends. Which type of physical cable connection is used for the connection between the Cisco 1841 routers R1 and R2? USB console DB-9 serial cable LAN crossover UTP LAN straight-through UTP 15 What is the purpose of the routing process? to encapsulate data that is used to communicate across a network to select the paths that are used to direct traffic to destination networks to convert a URL name into an IP address to provide secure Internet file transfer to forward traffic on the basis of MAC addresses 16 What occurs during a static NAT translation? Multiple local addresses are mapped to one global address.
which standardize applications supported within the model. It uses a single layer of interconnected peer servers to manage hostname-to-IP-address mappings. .) The router is connected to a router named Boise.168. It divides networking communications into multiple processes that are smaller and more manageabl 19 Which statement correctly describes the operation of DNS? It uses a local HOSTS file to resolve URLs to IP addresses for internal devices. The IP address of the router interface that is connected to router RTB is 192. It is used during troubleshooting to focus on the entire networking process instead of a single layer.2.6. The RTB router is connected to two Cisco devices by FastEthernet links. Router RTB is directly connected to two other routers. It references a central file that maps hostnames to IP addresses for all Internet hosts. Router RTB is connected to a Cisco 1841 router. What two conclusions can be drawn about router RTB? (Choose two.Refer to the exhibit. It uses a distributed hierarchy of servers to resolve hostnames to IP addresses. It defines the four lower layers. 18 Why is the OSI model useful in network design and assessment? It combines specific networking tasks into a complex format.
20 Which type of WAN connection uses packet-switched connections? T1 E1 ISDN Frame Relay 21 Refer to the exhibit. While configuring the serial interface of a router. 22 . the network administrator sees the highlighted error message. What is the reason for this? The serial interface is administratively down. The serial interface is already configured with an IP address. The network administrator has attempted to configure the serial interface with a broadcast addres The same IP address has been configured on another interface.
The configuration register was not set to 0x2142. The enable secret password was incorrectly entered. The no shutdown command must be entered under each interface section in the file being sent. The Transfer > Capture Text feature available through HyperTerminal has been used to capture the running configuration on a router. The startup-config is restored by using the captured file. but all interfaces on the router are shown as administratively down. The captured file should have restored the running configuration not the startup configuration. What could cause this problem? The enable password was incorrectly entered. 23 .Refer to the exhibit. The startup-configuration has been erased from the router followed by the issuing of the reload command.
The technician notices a higher than normal CRC count on the FastEthernet 0/0 interface that connects to the LAN. 24 Which technology is used for WAN connections and delivers up to 1. Too many collisions are occurring on the LAN. What is the most likely cause of the high value? The FastEthernet 0/0 interface is misconfigured in half-duplex mode.544 Mb/s of symmetrical bandwidth? DSL dialup T1 line T3 line 25 Which protocol allows encryption of any application layer protocol? FTP FTPS HTTPS IPsec .Refer to the exhibit. Too many packets smaller than 64 bytes are on the network. Users have been experiencing very poor performance rates to the Internet. Excessive noise is on the line. The FastEthernet0/0 interface is configured with the wrong encapsulation type.
Which routing protocol would likely be used to distribute routes between these routers? RIP BGP OSPF EIGRP .Telnet 26 Which scenario may require the use of a crossover UTP cable? connecting a host to a hub connecting a host to a switch connecting a router to a switch connecting a switch to another switch 27 Which question provides troubleshooting information about a problem at Layer 1 or Layer 2 of the OSI model? Can the server be reached through Telnet? Is there a firewall that is configured on the PC? Is there a link light on the network card? What addresses are configured in the TCP/IP settings? 28 Refer to the exhibit.
and blocks the packet from entering the inside network.1.29 A hacker attempts to reach confidential information that is stored on a server inside the corporate network.165. Host H1 is sending a datagram to host H2 across the Internet.226 . A network security solution inspects the entire packet.6 209. determines that it is a threat.1.17 209. Which security measure protected the network? an IDS an IPS a host-based firewall Anti-X software 30 Refer to the exhibit.22.214.171.124 209. Which address is considered the inside local address? 10.201.165.165.1 10.201. NAT will be configured on RTRC.
This action might not be possible to undo. Are you sure you want to continue?