This action might not be possible to undo. Are you sure you want to continue?
The network administrator can ping a remote router but is unable to telnet to it. At w does this error occur? physical network data link application
What should be the first step in a structured cable project? Locate all sources of EMI. Obtain an accurate floor plan. Identify the network backbone. Design efficient cable management systems.
When should an ISP helpdesk technician start documentation during the customer tr when the issue is resolved when the technician answers the initial call from the customer who reports a pro when it is necessary to create a work order so that the onsite technician can visit when the technician cannot resolve the issue and the case needs to be escalated t
Which action would a network security administrator take under the principle of lea Provide users with access to only necessary resources. Encrypt all data for transmission across unsecured networks. Restrict all users except administrators to the lowest privilege level. Require authentication for access to all resources including files and folders.
Which two statements are true about the c:\> ping command? (Choose two.) It tests the accessibility of an IP address. It sends a TCP packet to the destination IP address. It sends an ICMP echo request packet to the destination address. It traces the route of a data packet from the source to the destination. It determines where a packet was lost or delayed during transmission.
A network technician begins troubleshooting by checking the status of the light on th the web server. Which troubleshooting method is the technician using? top-down bottom-up divide-and-conquer from hardware to software
Refer to the exhibit. All hosts and router interfaces are configured correctly. Pings to the server from both H and H2 and pings between H1 and H2 are not successful. What is causing this problem? RIPv2 does not support VLSM. RIPv2 is misconfigured on router R1. RIPv2 is misconfigured on router R2. RIPv2 is misconfigured on router R3. RIPv2 does not support private IP addressing. 8 Why are port numbers included in the TCP header of a segment? to indicate the correct router interface that should be used to forward a segment to identify which switch ports should receive or forward the segment to determine which Layer 3 protocol should be used to encapsulate the data to enable a receiving host to forward the data to the appropriate application to allow the receiving host to assemble the packet in the proper order 9
During the process of upgrading the IOS image on a router, the network administrator notices that the downloaded image in flash is corrupt. If ROMMON is used to perform the upgrade process again, by defau which port on the router will be used to download the replacement image? AUX port console port first available LAN port first available serial port
10 Which routes are automatically added to the routing table on a neighbor router when routing protocols exch information about directly connected networks? dynamic routes static routes
default routes directly connected routes 11 Which two parameters are stored in the routing table? (Choose two.) the best route to reach remote networks the interfaces used to forward packets the ARP requests from connected routers the number of times a route has been used by the router the packets that are placed in the buffer before being forwarded
12 What is one purpose of the TCP three-way handshake? sending echo requests from the source to the destination host to establish the presence of the destination determining the IP address of the destination host in preparation for data transfer requesting the destination to transfer a binary file to the source synchronizing sequence numbers between source and destination in preparation for data transfer 13 Which notation is an example of a supernet? 192.168.1.0/24 172.16.1.0/25 10.0.0.0/8 192.168.0.0/19
14 Which AAA process requires users to prove their identity with a username and password to gain access to a network? accounting authorization authentication acknowledgment 15
Refer to the exhibit. The network administrator is validating a WAN connection design that supports authentication between the two routers. Which statement is true about the effect of the current configuratio The serial connection cannot be established. The configuration does not meet the design objective. The clock rate must be configured on both routers. The serial connection will be established and meet the design objective. Showing 2 of 4 Next> Page:
16 An experienced network technician has decided to use a divide-and-conquer approach to troubleshooting a network problem. What is an advantage to this approach? works well for simple problems quickly resolves user-related issues easiest to use in a multi-vendor environment targets the problem layer more quickly than other methods do
17 A Catalyst switch is used as a temporary replacement for another switch that needs to be repaired. About a minute after the switch has started, the SYST LED on the front of the switch transitions from blinking green amber. What is the meaning of the amber SYST LED? The switch has no configuration file in NVRAM. The switch has failed POST and must be sent for service. The switch is functioning properly. The switch is in half-duplex mode. 18 Which statement correctly describes the importance of an SLA? It outlines the range of services received by the ISP. It outlines the process to resolve planned incidents. It outlines the management, monitoring, and maintenance of a network. It outlines the termination costs according to the budget cycle of the customer.
Refer to the exhibit. The network administrator uses the exhibited commands to configure R1 and R2. The administrator confirms Layer 1 connectivity between the two routers is functioning properly. However, R1 unable to ping the serial interface of R2. What could be the reason for this problem? The subnet mask is incorrectly configured on both routers. A static route is not configured on both routers. Different encapsulations are configured on the two routers. The clock rate is not set on any of the router serial interfaces. 20 What are two reasons for issuing the show ip route command on a router? (Choose two.) It displays the routing activity in real time. It displays the length of time until the next routing update. It displays the directly connected networks. It displays all of the routing protocols that are configured on the neighboring routers. It displays the routing protocol that is receiving updates from the neighboring routers. 21 What is the purpose of using the copy tftp flash command on a router? to back up the current IOS image to a server to restore the IOS image from a server to back up the router configuration to a server to restore the router configuration from flash 22 A host has been properly cabled and configured with a unique hostname and valid IP address. Which two additional components should be configured to enable the host to access remote resources? (Choose two.) the subnet mask the MAC address the default gateway
the loopback IP address the DHCP server IP address 23
Refer to the exhibit. As part of the troubleshooting process, a network administrator wishes to determine the MAC address of H1. The administrator issues a successful ping to H1. Which Cisco IOS command can now used to gather the desired information? show arp show version show interfaces show cdp neighbors show ip interfaces brief 24
Refer to the exhibit. Based on the DHCP configuration commands, what is the reason that a PC is receiving IP address but is unable to communicate outside of the local network? The default gateway is misconfigured. Excluded addresses must be configured. The DNS server is on the incorrect network. There are not enough addresses to support the 28 hosts that are required for this LAN.
25 What contributes to the fact that transmitting a file using TCP will take longer than transmitting the same fi using UDP? UDP does not need to add a header to a data packet. UDP utilizes a more efficient error checking mechanism than TCP. The UDP authentication process is faster than the process that is used by TCP. The TCP verification process adds more transmissions during the file transfer.
26 A user is able to ping an FTP server across a WAN but is unable to download files from the server. What sh be checked to resolve this problem? the NIC drivers the IP configuration the LED status of the NIC firewall settings 27 What is the function of the forward lookup DNS zone in the DNS name resolution process? It resolves fully qualified domain names into IP addresses. It stores the information about the domain namespace structure. It forwards zone information updates to the secondary server. It maintains a database of ARP entries for all servers. 28
Refer to the exhibit. Which cable path segments require the use of crossover cables? A, D, F B, C, E B, D, E A, C, F
29 A new router is connected to an existing network. Which two tasks must be completed on the new router to include it in the dynamic routing process? (Choose two.) Enter the new network IP address on all existing routers. Assign an appropriate IP address and subnet mask to the serial interface. Update the ip host configuration information with the device name and new interface IP address. Configure a routing protocol with the directly connected network IP addresses. Configure a routing protocol to include all networks from all existing routers. 30 When does a router enter the setup mode? when the Cisco IOS is missing in flash when the configuration is missing in NVRAM
when the setup command is run from the user mode when the boot system command is missing in the configuration
31 Which WAN connection provides a dedicated circuit with fixed bandwidth available at all times? point-to-point circuit-switched packet-switched cable 32 What happens when a segment is encapsulated into a packet? Data is converted to bits for transmission. The destination port number is specified. A header with logical addresses is added. A session with a destination is established.
33 When troubleshooting a connectivity issue for the WAN connection between the headquarters and a branch office of a customer, the ISP technician verifies the router to ensure that the router configuration is not alter from the original configuration by the network administrator of the customer. What equipment type does th router represent? CPE POP IXP CSU/DSU 34 Which cable type provides a foil shielding to protect from outside electromagnetic interference? STP UTP coaxial fiber-optic
35 After an unsuccessful ping to the local router, the technician decides to investigate the router. The technicia observes that the lights and fan on the router are not operational. In which layer of the OSI model is the pro most likely occurring? transport network data link physical 36 What is the purpose of the debug ip rip command? shows the installed routing table allows RIP to advertise triggered updates displays routing update activity in real time
shows the administrative distance of all routes 37 What is the most commonly used exterior routing protocol? BGP RIP OSPF EIGRP
38 A network administrator is asked to design a system to allow simultaneous access to the Internet for 250 us The ISP can only supply five public IP addresses for this network. What technology can the administrator u accomplish this task? classful subnetting variable length subnet masks classless interdomain routing port-based Network Address Translation 39
Refer to the exhibit. There is no routing protocol configured on either router. Which command will create a default route on R1 to forward the traffic to R2? R1(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.1 R1(config)# ip route 0.0.0.0 0.0.0.0 192.168.0.2 R1(config)# ip route 0.0.0.0 0.0.0.0 192.168.0.1 R1(config)# ip route 0.0.0.0 0.0.0.0 S0/0/1 40
Refer to the exhibit. Which subnet mask would accommodate the number of hosts indicated for all subnets major network address was 192.168.25.0/24? 255.255.0.0 255.255.224.0 255.255.255.0 255.255.255.224 255.255.255.240 255.255.255.248 41
Refer to the exhibit. All cables are working and all devices have IP addresses. However, H1 cannot ping the server. What is the cause of the problem? The default gateway is incorrect on R1. The switch should be assigned an IP address. H1 and the server are on different subnetworks. H1 does not know the physical address of the server.
42 Which address does a switch use for implementing port security? the source IP address the source MAC address the destination IP address the destination MAC address
43 What function would a server running the RADIUS protocol provide to a router that is configured with AA It saves accounting information about who accessed what resource and at what time it was accessed. It contains the database that network devices use to authenticate users trying to gain access to the netwo It lists the commands that a particular user is authorized to execute on the network device. It contains the MIB that devices use to keep information about themselves and network performance. 44
Refer to the exhibit. What is the possible reason that a technician is unable to telnet into the HQ router and configuration changes? A password is required for vty 0. A password for line con 0 is required. All five virtual interfaces must be configured before Telnet is possible. The service password-encryption command is preventing Telnet access. 45 Which two statements are correct about the DNS hierarchy? (Choose two.) The root server maintains records for all servers in the Internet. DNS relies on a hierarchy of decentralized servers to maintain records. The root servers maintain records about how to reach top-level domain servers. All DNS servers manage databases that store name-to-IP mappings for the entire DNS structure.
A query requesting a name resolution starts from the client and is passed directly to the server at the top
the DNS hierarchy.
Showing 4 of 4 46
Refer to the exhibit. The network administrator has added networks A and B to router R1. Which two subnetwork numbers should be used to address networks A and B so that these networks use the same subn mask as networks C and D? (Choose two.) 192.168.1.32/26 192.168.1.64/26 192.168.1.96/26 192.168.1.160/26 192.168.1.192/26 47
Refer to the exhibit. A computer with the displayed IP settings is unable to access a server on the 192.168.2 network using the server IP address but can access hosts on the 192.168.1.0 network. What should the netw administrator do to troubleshoot this problem? Issue the ping 192.168.1.1 command on the host to determine if the host can communicate with the def gateway. Issue the ipconfig /all command to determine if a DNS server IP address was configured. Verify that the host has a link light.
Check the cabling of the host. 48
Refer to the exhibit. What two conclusions can be drawn about the exhibited command output? (Choose tw Router RTB is directly connected to a router and a switch. Router RTB is able to ping both of its directly connected neighbors. RTA is not connected to any other Cisco devices except RTB. Router RTB has Layer 2 connectivity with two neighboring devices. Router RTB is connected to two Cisco devices by FastEthernet links. 49 What is the function of the service password-encryption command in the Cisco IOS? encrypts passwords sent over serial interfaces validates encrypted passwords by the use of an authentication server encrypts passwords for transmission across insecure networks prevents passwords in configuration files from being easily read
50 Which protocol defines the types of messages that a client uses to request a web page and the messages a se uses to respond to those requests? FTP TCP HTTP HTML
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue listening from where you left off, or restart the preview.