You are on page 1of 10

1 A network engineer is at a customer site.

After resolving technical problems in the network, the engineer provides a training session for t support staff. Which job function best fits the activities of this network engineer? network designer account manager pre-sales engineer post-sales field engineer 2

A network administrator is integrating IPv6 into an IPv4 network by encapsulating one protocol packet within another protocol. Whic transition method is being used? dual stack Tunneling proxying and translation NAT with Protocol Translator

What can be broadcast over the wireless network to help a user connect to the network and use wireless services? SSID WEP keys VLAN parameters WPA encryption keys VPN authentication information

Refer to the exhibit. Which EIGRP configuration commands should a network administrator enter on router R1 to correctly advertise single summary route to router MAIN for the campus LAN?

What should be considered in the design of a wireless LAN on a corporate campus? the vendor of all employee wireless NICs the cables that are used for LAN connectivity the number of wireless NICs required on enterprise servers

the messaging features that are used on employee cell phones the location of the concrete pillars and walls between the offices 6 While configuring EIGRP on a router, the technician enters this command: Router(config-router)# variance 8 What is the effect of entering this command? It adjusts the cost of all EIGRP routes to 8. It enables unequal cost load balancing on the router. It restricts the number of EIGRP feasible successor routes to 8. It enables EIGRP equal cost load balancing over a maximum of 8 routes. It modifies the number of values used in the composite metric calculation. 7

Refer to the exhibit. A networking company designer is reviewing a diagram of a customer network. What are the two problems that need to be resolved in the topology that is shown? (Choose two.) The firewall router and ISP connection represent a single point of failure. If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable. A power supply failure of the server block switch will cause the entire IP telephony system to fail. Using Layer 3 switches to interconnect the server block servers to the IP phones introduces too much delay.

The IP phones need to be redundantly connected to the switches to prevent single points of failure at the access layer. 8 Why is it difficult for network designers to predict the patterns and behavior of file transfer traffic? The traffic is user initiated. File size is typically very small. Dedicated bandwidth is essential. All file transfer traffic is queued as high priority. 9

Refer to the exhibit. EIGRP has been configured as a routing protocol in the network. Users who are connected on LAN_1 and LAN can ping their default gateways. Users on LAN_1 complain that they are unable to access the resources on the file server that is connected to LAN_2. A technician issues the show ip interface brief command on R1 to verify the status of the interfaces. What information will help the technician troubleshoot the issue? Interface S0/0/1 line protocol is down. Interface Vlan1 is administratively down. Interface Fa0/1 is missing an IP address. Interface S0/0/0 is configured with an incorrect IP address.

10 In order for the IT staff of a company to understand the basic operation of VPNs, which two features or technologies must the netwo designer identify as training needs? (Choose two.) IPv6 tunneling QoS operation tunneling protocols VLAN configuration encryption algorithms 11 Which two technologies can provide data integrity in a VPN connection? (Choose two.)

ESP DES MD5 DH1 SHA-1 12 When implementing a security policy, which two actions should be included as part of the security checklist? (Choose two.) Disable all logging. Enable Telnet on TCP port 23. Use HTTP for web administration. Set timeouts and ACLs on VTY lines. Shut down any unused ports and interfaces.

13 Company XYZ needs a WAN connection between headquarters and branch offices that has a high level of security. The connection must provide high bandwidth to support VoIP and transactional data with as little overhead as possible. What is the best solution for WAN connectivity for company XYZ? DSL Cable cell relay PPP over a leased line

14 Company XYZ requires a WAN solution that provides flexible bandwidth options and supports one physical interface at the head off that would provide simultaneous connectivity to various remote sites. The distance from each site should not make the solution mor expensive. Which WAN technology meets the requirements of the company? DSL cable Frame Relay T1 leased line 15

Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of an access layer switch and connects three PCs. The engineer attempts to ping from each PC to the other connected PCs to test the configuration. Which statement describes the result of the last step? Host 1 can ping Host 2. Host 1 can ping Host 3. Host 2 can ping Host 3. No hosts can ping any other host. Showing 1 of 4 <Pre v Page:

Next >

16 A network administrator has configured Frame Relay on a serial interface and issued the show interfaces serial command. The output shows that the interface is up and the line protocol is up. However, pings to the remote router across the link fail. What should the next step be to ensure that the IP address of the remote router appears in the Frame Relay map table of the local router? Configure the router using the no inverse-arp command. Ensure that the LMI type is correct for the circuit. Configure the router using the frame-relay map ip command. Verify that the remote router has Frame Relay encapsulation enabled. 17

Refer to the exhibit. A network engineer applies the ACL that is shown in the exhibit to interface S0/0/0 on router R1 outbound. What impact will the ACL have on traffic that moves through interface S0/0/0? All traffic from the network will be permitted. All traffic from the network will be permitted. All traffic from the host with the IP address will be permitted. All traffic that is destined for the network will be permitted. All traffic that is destined for the host with the IP address will be permitted. 18

Refer to the exhibit. What can be concluded from the output that is shown? MDF_2811 has a MAC address of 2294:300F:0000. Device C3750-24_IDF2 is running Cisco IOS Software Release 12.3(23)SEE2. A Cisco 3750 switch is connected to the FastEthernet1/0/1 port on MDF_2811. MDF_2811 is installed in the main distribution facility on floor 28 of building 11. 19

Refer to the exhibit. An administrator installs a WIC-2T module into a Cisco 1841 router. Attempts to configure the S0/0/0 interface a unsuccessful. As a first step in troubleshooting the failure, the administrator issues the show version command. What is a possible reason for the failure? The WIC was not physically installed properly. The WIC was installed into slot 1 instead of slot 0. The interface type and number are invalid on an 1841. The configuration register is the wrong value for adding new modules. 20 Which technology will prioritize traffic based upon the technical requirements of IP telephony? PoE QoS RPC RTP VPN 21 Which statement is true about the pairing of services and transport layer protocols for FTP and VoIP? FTP applications and VoIP use TCP at the transport layer. FTP applications and VoIP use UDP at the transport layer. FTP applications use TCP at the transport layer while VoIP uses UDP at the transport layer. FTP applications use UDP at the transport layer while VoIP uses TCP at the transport layer. 22

Refer to the exhibit. The named ACL "Managers" already exists on the router. What will happen when the network administrator issu the commands that are shown in the exhibit? The commands overwrite the existing Managers ACL. The commands are added at the end of the existing Managers ACL.

The commands are added at the beginning of the existing Managers ACL. The network administrator receives an error that states that the ACL already exists. 23 During the boot process and assuming the default sequence, what is the second location where the router will look for the IOS? ROM flash NVRAM TFTP server 24

Refer to the exhibit. A customer has a problem with connectivity in the network. Based on the IP addressing scheme, what is causin problem? The WAN links need IP addresses from a different major network. The WAN link that connects R1 to R2 overlaps with the R3 LAN. The WAN links that connect R1 to R3 and R1 to R2 have incorrect masks. The R1 LAN is incorrect because subnet zero cannot be used with VLSM.

25 What is a signaling standard that is used for managing and maintaining the connection between a CPE router and the service provid Frame Relay switch? ARP CIR DLCI Inverse ARP LMI

26 A network administrator is asked to upgrade the enterprise network devices and to modify the addressing scheme to support VLSM route summarization. The current network infrastructure contains both Cisco and non-Cisco routers. The plan is to replace old route gradually with the latest Cisco routers. Which two routing protocols can the administrator use to support both upgrading requiremen (Choose two.) BGP

OSPF RIPv1 RIPv2 EIGRP 27 What type of system connects to the PSTN and uses a PBX to route calls via analog or digital lines? VPN VoIP IP telephony traditional telephony 28 In a converged network, which two types of traffic would be categorized as real-time traffic? (Choose two.) e-mail file transfer web browsing videoconferencing voice over IP video on demand

29 A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. The technician as the caller to talk to nearby users to see if other machines are affected. The caller reports that several immediate neighbors in the sa department have a similar problem and that they cannot ping each other. Those who are seated in other departments have connect What should the technician check as the first step in troubleshooting the issue? the power outlet to the PC that is used by the caller. the trunks between switches in the wiring closet. the status of the departmental workgroup switch in the wiring closet. the cable that connects the PC of the caller to the network jack. the cable connection between a PC and a network outlet that is used by a neighbor.

30 A company decides to deploy a virtual private network (VPN) to connect remote workers and branch offices to corporate headquarte What is the best description of the type of connectivity the company is ready to implement? a VPN that uses LANs to connect remote sites or users a VPN that uses a public network to connect remote sites or users a VPN that uses a wireless LAN over the Internet to connect remote sites or users a VPN that uses a dedicated connections, such as leased lines, to connect remote sites or users