This action might not be possible to undo. Are you sure you want to continue?
After resolving technical problems in the network, the engineer provides a training session for t support staff. Which job function best fits the activities of this network engineer? network designer account manager pre-sales engineer post-sales field engineer 2
A network administrator is integrating IPv6 into an IPv4 network by encapsulating one protocol packet within another protocol. Whic transition method is being used? dual stack Tunneling proxying and translation NAT with Protocol Translator
What can be broadcast over the wireless network to help a user connect to the network and use wireless services? SSID WEP keys VLAN parameters WPA encryption keys VPN authentication information
Refer to the exhibit. Which EIGRP configuration commands should a network administrator enter on router R1 to correctly advertise single summary route to router MAIN for the campus LAN?
5 What should be considered in the design of a wireless LAN on a corporate campus? the vendor of all employee wireless NICs the cables that are used for LAN connectivity the number of wireless NICs required on enterprise servers .
. A power supply failure of the server block switch will cause the entire IP telephony system to fail. A networking company designer is reviewing a diagram of a customer network. 7 Refer to the exhibit. It modifies the number of values used in the composite metric calculation. It enables EIGRP equal cost load balancing over a maximum of 8 routes. the technician enters this command: Router(config-router)# variance 8 What is the effect of entering this command? It adjusts the cost of all EIGRP routes to 8. If one of the Layer 3 switches fails. What are the two problems that need to be resolved in the topology that is shown? (Choose two. Using Layer 3 switches to interconnect the server block servers to the IP phones introduces too much delay. the Cisco Call Manager will be unreachable.the messaging features that are used on employee cell phones the location of the concrete pillars and walls between the offices 6 While configuring EIGRP on a router. It restricts the number of EIGRP feasible successor routes to 8. It enables unequal cost load balancing on the router.) The firewall router and ISP connection represent a single point of failure.
) . Users who are connected on LAN_1 and LAN can ping their default gateways. 10 In order for the IT staff of a company to understand the basic operation of VPNs. which two features or technologies must the netwo designer identify as training needs? (Choose two. Users on LAN_1 complain that they are unable to access the resources on the file server that is connected to LAN_2. Interface Fa0/1 is missing an IP address. A technician issues the show ip interface brief command on R1 to verify the status of the interfaces. Dedicated bandwidth is essential. All file transfer traffic is queued as high priority.The IP phones need to be redundantly connected to the switches to prevent single points of failure at the access layer. Interface S0/0/0 is configured with an incorrect IP address. What information will help the technician troubleshoot the issue? Interface S0/0/1 line protocol is down. 9 Refer to the exhibit. EIGRP has been configured as a routing protocol in the network. File size is typically very small.) IPv6 tunneling QoS operation tunneling protocols VLAN configuration encryption algorithms 11 Which two technologies can provide data integrity in a VPN connection? (Choose two. Interface Vlan1 is administratively down. 8 Why is it difficult for network designers to predict the patterns and behavior of file transfer traffic? The traffic is user initiated.
What is the best solution for WAN connectivity for company XYZ? DSL Cable cell relay PPP over a leased line 14 Company XYZ requires a WAN solution that provides flexible bandwidth options and supports one physical interface at the head off that would provide simultaneous connectivity to various remote sites. Enable Telnet on TCP port 23. 13 Company XYZ needs a WAN connection between headquarters and branch offices that has a high level of security. Which WAN technology meets the requirements of the company? DSL cable Frame Relay T1 leased line 15 . which two actions should be included as part of the security checklist? (Choose two. Shut down any unused ports and interfaces. The distance from each site should not make the solution mor expensive. The connection must provide high bandwidth to support VoIP and transactional data with as little overhead as possible.) Disable all logging.ESP DES MD5 DH1 SHA-1 12 When implementing a security policy. Set timeouts and ACLs on VTY lines. Use HTTP for web administration.
Following a test plan. Verify that the remote router has Frame Relay encapsulation enabled. pings to the remote router across the link fail. The engineer attempts to ping from each PC to the other connected PCs to test the configuration. Host 1 can ping Host 3. However. Which statement describes the result of the last step? Host 1 can ping Host 2. Showing 1 of 4 <Pre v Page: Introduction Next > 16 A network administrator has configured Frame Relay on a serial interface and issued the show interfaces serial command. Host 2 can ping Host 3. What should the next step be to ensure that the IP address of the remote router appears in the Frame Relay map table of the local router? Configure the router using the no inverse-arp command. the network systems engineer completes the configuration of an access layer switch and connects three PCs. 17 . The output shows that the interface is up and the line protocol is up.Refer to the exhibit. Configure the router using the frame-relay map ip command. No hosts can ping any other host. Ensure that the LMI type is correct for the circuit.
5.16. 19 .0. Device C3750-24_IDF2 is running Cisco IOS Software Release 12.0/24 network will be permitted. All traffic from the 172.16.3(23)SEE2. A Cisco 3750 switch is connected to the FastEthernet1/0/1 port on MDF_2811. What can be concluded from the output that is shown? MDF_2811 has a MAC address of 2294:300F:0000.5 will be permitted. 18 Refer to the exhibit. A network engineer applies the ACL that is shown in the exhibit to interface S0/0/0 on router R1 outbound. MDF_2811 is installed in the main distribution facility on floor 28 of building 11. All traffic that is destined for the 172.Refer to the exhibit.18.104.22.168.5 will be permitted. All traffic from the host with the IP address 172.0/16 network will be permitted. All traffic that is destined for the host with the IP address 172.16.16. What impact will the ACL have on traffic that moves through interface S0/0/0? All traffic from the 172.0/24 network will be permitted.
Refer to the exhibit. As a first step in troubleshooting the failure. . The commands are added at the end of the existing Managers ACL. The configuration register is the wrong value for adding new modules. An administrator installs a WIC-2T module into a Cisco 1841 router. What is a possible reason for the failure? The WIC was not physically installed properly. FTP applications and VoIP use UDP at the transport layer. FTP applications use UDP at the transport layer while VoIP uses TCP at the transport layer. FTP applications use TCP at the transport layer while VoIP uses UDP at the transport layer. The WIC was installed into slot 1 instead of slot 0. 20 Which technology will prioritize traffic based upon the technical requirements of IP telephony? PoE QoS RPC RTP VPN 21 Which statement is true about the pairing of services and transport layer protocols for FTP and VoIP? FTP applications and VoIP use TCP at the transport layer. 22 Refer to the exhibit. What will happen when the network administrator issu the commands that are shown in the exhibit? The commands overwrite the existing Managers ACL. the administrator issues the show version command. The named ACL "Managers" already exists on the router. Attempts to configure the S0/0/0 interface a unsuccessful. The interface type and number are invalid on an 1841.
The WAN links that connect R1 to R3 and R1 to R2 have incorrect masks. The plan is to replace old route gradually with the latest Cisco routers. A customer has a problem with connectivity in the network. The WAN link that connects R1 to R2 overlaps with the R3 LAN. Which two routing protocols can the administrator use to support both upgrading requiremen (Choose two. The network administrator receives an error that states that the ACL already exists. Based on the IP addressing scheme. The R1 LAN is incorrect because subnet zero cannot be used with VLSM.) BGP . 23 During the boot process and assuming the default sequence. what is the second location where the router will look for the IOS? ROM flash NVRAM TFTP server 24 Refer to the exhibit. what is causin problem? The WAN links need IP addresses from a different major network. 25 What is a signaling standard that is used for managing and maintaining the connection between a CPE router and the service provid Frame Relay switch? ARP CIR DLCI Inverse ARP LMI 26 A network administrator is asked to upgrade the enterprise network devices and to modify the addressing scheme to support VLSM route summarization. The current network infrastructure contains both Cisco and non-Cisco routers.The commands are added at the beginning of the existing Managers ACL.
the trunks between switches in the wiring closet.) e-mail file transfer web browsing videoconferencing voice over IP video on demand 29 A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. the cable that connects the PC of the caller to the network jack. such as leased lines. the status of the departmental workgroup switch in the wiring closet.OSPF RIPv1 RIPv2 EIGRP 27 What type of system connects to the PSTN and uses a PBX to route calls via analog or digital lines? VPN VoIP IP telephony traditional telephony 28 In a converged network. The technician as the caller to talk to nearby users to see if other machines are affected. which two types of traffic would be categorized as real-time traffic? (Choose two. Those who are seated in other departments have connect What should the technician check as the first step in troubleshooting the issue? the power outlet to the PC that is used by the caller. to connect remote sites or users . 30 A company decides to deploy a virtual private network (VPN) to connect remote workers and branch offices to corporate headquarte What is the best description of the type of connectivity the company is ready to implement? a VPN that uses LANs to connect remote sites or users a VPN that uses a public network to connect remote sites or users a VPN that uses a wireless LAN over the Internet to connect remote sites or users a VPN that uses a dedicated connections. The caller reports that several immediate neighbors in the sa department have a similar problem and that they cannot ping each other. the cable connection between a PC and a network outlet that is used by a neighbor.