1

Top of Form

Refer to the exhibit. The network administrator is validating a WAN connection design that supports authentication between the two routers. Which statement is true about the effect of the current configuration? The serial connection cannot be established. The configuration does not meet the design objective. The clock rate must be configured on both routers. The serial connection will be established and meet the design objective.
Bottom of Form

2

Top of Form

A small tire retailer requires a low-cost WAN connection to its headquarters in order to manage its inventory and process customer in real time. Which WAN connection type is best suited to its needs? SONET T3 T1 DSL leased line
Bottom of Form

3

Top of Form

1.100 default-router 192.1. Once DHCP is configured on a router with the Cisco SDM entries that are exhibited.0 network 192.255.) ip dhcp pool INTERNAL ip dhcp pool abc-widgets.1.0 255.255.168.168.168. the technician decides to investigate the router.1.100 255.Refer to the exhibit.1. The technician observes that the light and fan on the router are not operational.200 ip dhcp excluded-address 192.168. which three statements co network technician expect to see in the running configuration of the router? (Choose three.1.255.2 192.255.0 default-router 192.inc network 192.1 Bottom of Form 4 Top of Form After an unsuccessful ping to the local router.168. In which layer of the OSI model is the problem most likely occurring? Transport Network data link Physical Bottom of Form 5 Top of Form .168.

Router R1 has been configured with the commands that are displayed. Bottom of Form 7 Top of Form . The privileged EXEC mode password is “password1.” The router can support four Telnet sessions simultaneously. The router can be accessed from the console without using any password.What is the purpose of using the copy tftp flash command on a router? to back up the current IOS image to a server to restore the IOS image from a server to back up the router configuration to a server to restore the router configuration from flash Bottom of Form Top of Form 6 Refer to the exhibit. Which fact can be determined from the configuration? All passwords are encrypted.

255.25.248 Bottom of Form 8 Top of Form A network administrator is asked to design a system to allow simultaneous access to the Internet for 250 users.255.) Configure the appropriate line password to access the router.255. Enable the interface administratively.Refer to the exhibit. Configure the speed of the interface. A network administrator has just entered the interface configuration commands shown in the exhibit on a brand new router. What technology can the administrator use to accomplish this task? classful subnetting variable length subnet masks classless interdomain routing port-based Network Address Translation Bottom of Form 9 Top of Form Refer to the exhibit.255.255.255. To verify basic connectivity. The ISP can only supply five public IP addresses for this network.0 255.240 255.0 255.224 255. a ping is issued from Host A to R1.255. The ping is unsuccessful.0/24? 255.255.255.255. . Which subnet mask would accommodate the number of hosts indicated for all subnets if the major network address was 192. Which two configuration steps should be performed to solve this problem? (Choose two.168.0.224.0 255.

248.255. to exchang e and maintain routing information? static routes IGP protocols EGP protocols directly connected routes Bottom of Form 11 when the issue is resolved Top of Form When should an ISP helpdesk technician start documentation during the customer troubleshooting process? when the technician answers the initial call from the customer who reports a problem when it is necessary to create a work order so that the onsite technician can visit the customer site when the technician cannot resolve the issue and the case needs to be escalated to the next level technician Bottom of Form 12 Top of Form .255. and ISP3. ISP2. Configure the subnet mask on the router interface to 255. What method is most commonly employed by large ISPs. Modify the subnet mask on HostA to be the same as the Fa0/0 interface. Bottom of Form 10 Top of Form Refer to the exhibit.Configure a dynamic routing protocol on the router. such as ISP1.

The TCP verification process adds more transmissions during the file transfer. Top of Form Which two statements are correct about the UDP protocol? (Choose two.Which routes are automatically added to the routing table on a neighbor router when routing protocols exchang e information about directly connected networks? dynamic routes static routes default routes directly connected routes Bottom of Form 13 Top of Form Refer to the exhibit. The UDP authentication process is faster than the process that is used by TCP. Based on the DHCP configuration commands. Bottom of Form 14 UDP does not need to add a header to a data packet. There are not enough addresses to support the 28 hosts that are required for this LAN.) . The DNS server is on the incorrect network. Excluded addresses must be configured. It uses windowing. Top of Form What contributes to the fact that transmitting a file using TCP will take longer than transmitting the same file using UDP? UDP utilizes a more efficient error checking mechanism than TCP. what is the reason that a PC is receiving an IP address but is unable to communicate outside of the local network? The default gateway is misconfigured. Bottom of Form 15 It utilizes a flow control mechanism.

168.0 network using the server IP address but can access hosts on the 192. It verifies Layer 3 connectivity.It does not provide acknowledgment of receipt of data. A computer with the displayed IP settings is unable to access a server on the 192. HTTPS and HTTP use different client request-server response processes. Bottom of Form 18 Top of Form Refer to the exhibit.2. What should the network administrato r do to troubleshoot this problem? .1.168. Bottom of Form 16 Top of Form Which statement correctly describes the difference between HTTP and HTTPS? The maximum number of simultaneous connections that a server can support for HTTPS is more than for HTTP.) It guarantees datagram delivery. Bottom of Form Top of Form 17 Which two statements are correct about the ICMP packet that is used by the ping command? (Choose two. HTTPS authenticates and encrypts the data being transferred between the client and the web server. It acknowledges the receipt of TCP segments. It measures the time that elapses between when the request packet is sent and the response packet is received. It guarantees the sequential arrival of data packets. It determines where a packet is lost on the path from the source to the destination. It is a connectionless protocol.0 network. HTTPS specifies the rules for passing data between the physical layer and the data link layer.

C.242 in a command prompt window.168. which database will a DNS server search for the matching record? reverse lookup zones forward lookup zones domain name search zones domain address search zones Bottom of Form 21 Top of Form Which networking service is used to provide name to IP address mapping? . F B. Bottom of Form 19 Top of Form Refer to the exhibit.102.1 command on the host to determine if the host can communicate with the default gateway. Which cable path segments require the use of crossover cables? A. Check the cabling of the host. D.240. E B.1. E A. Verify that the host has a link light.Issue the ping 192. D. Issue the ipconfig /all command to determine if a DNS server IP address was configured. C. F Bottom of Form 20 Top of Form When a user issues the command ping –a 64.

Which troubleshooting method is the technician using? top-down bottom-up divide-and-conquer from hardware to software Bottom of Form 23 Top of Form Which protocol defines the types of messages that a client uses to request a web page and the messages a server uses to respond to those requests? FTP TCP HTTP HTML Bottom of Form 24 Top of Form Which two commands ensure that any password that permits access to the privileged EXEC mode is not shown in plain text when the configuration files are displayed? (Choose two.) Router(config)# enable secret cisco Router(config)# enable cisco Router(config)# encryption-password all Router(config)# enable login encrypted Router(config)# enable password encryption Router(config)# service password-encryption .DNS FTP NAT DHCP Bottom of Form 22 Top of Form A network technician begins troubleshooting by checking the status of the light on the network interface card on the web server.

It forwards zone information updates to the secondary server.Bottom of Form 25 Top of Form A network engineer is planning a new horizontal cable installation in an office building. It maintains a database of ARP entries for all servers. It stores the information about the domain namespace structure. No dynamic routing protocols have been configured. The network administrator has entered the commands that are shown in the exhibit. The interfaces on R1 and R2 have been properly configured with the IP addresses as shown. Bottom of Form 27 Top of Form Refer to the exhibit. Which two additional routes need to be configured to enable host A to access the Internet? (Choose two.) a default route on R1 using exit interface S0/0/0 . What advantage would UTP cable have over fiber optic cable for this installation? lower installation costs better protection from EMI higher transmission speeds longer unrepeated distance between endpoints Bottom of Form 26 Top of Form What is the function of the forward lookup DNS zone in the DNS name resolution process? It resolves fully qualified domain names into IP addresses.

1 using exit interface S0/0/0 a static route on R2 for network 10.1 a static route on R2 for network 192. The switch is in half-duplex mode.133.168.1. What is an advantage to this approach? works well for simple problems quickly resolves user-related issues easiest to use in a multi-vendor environment targets the problem layer more quickly than other methods do Bottom of Form 29 Top of Form A Catalyst switch is used as a temporary replacement for another switch that needs to be repaired.0 using exit interface S0/0/0 a static route on R2 for network 198.219. About a minute after the switch has started. Bottom of Form .1. What is the meaning of the amber SYST LED? The switch has no configuration file in NVRAM. It maintains a full database of distant routers and the methods by which they interconnect.1.219. Bottom of Form 30 What is a characteristic of the EIGRP routing protocol? Top of Form It has a hop count limitation that makes it suitable only for small. simple networks that consist of fewer than 15 hops. The switch is functioning properly.133. The switch has failed POST and must be sent for service. It builds the topology table based on all of the advertisements from its neighbors.0 using exit interface S0/0/0 Bottom of Form 28 Top of Form An experienced network technician has decided to use a divide-and-conquer approach to troubleshooting a network problem. the SYST LED on the front of the switch transitions from blinking green to amber. It does not include subnet mask information in routing updates.a default route on R1 using exit interface S0/0/1 a default route on R1 using exit IP address 198.

It measures the time that elapses between when the request packet is sent and the response packet is received.Top of Form All contents copyright 1992-2011 Cisco Systems. Bottom of Form 17 It guarantees datagram delivery. What should the network administrator do to troubleshoot this problem? Issue the ping 192. Top of Form 16 Top of Form Which statement correctly describes the difference between HTTP and HTTPS? The maximum number of simultaneous connections that a server can support for HTTPS is more than for HTTP. HTTPS and HTTP use different client request-server response processes. HTTPS specifies the rules for passing data between the physical layer and the data link layer. It acknowledges the receipt of TCP segments. Privacy Statement and Trademarks.1 command on the host to determine if the host can communicate with the default gateway. Issue the ipconfig /all command to determine if a DNS server IP address was configured. It verifies Layer 3 connectivity. A computer with the displayed IP settings is unable to access a server on the 192.168.0 network using the server IP address but can access hosts on the 192. .1. Bottom of Form 18 Top of Form Refer to the exhibit. Inc.0 network. Top of Form Which two statements are correct about the ICMP packet that is used by the ping command? (Choose two. HTTPS authenticates and encrypts the data being transferred between the client and the web server.) It determines where a packet is lost on the path from the source to the destination.168.1.168.2.

Bottom of Form 19 Top of Form Refer to the exhibit.242 in a command prompt window. D.Verify that the host has a link light. which database will a DNS server search for the matching record? reverse lookup zones forward lookup zones domain name search zones domain address search zones Bottom of Form 21 DNS FTP Top of Form Which networking service is used to provide name to IP address mapping? .102. C. F B. Check the cabling of the host. C. E B. Which cable path segments require the use of crossover cables? A.240. F Bottom of Form 20 Top of Form When a user issues the command ping –a 64. E A. D.

Which troubleshooting method is the technician using? top-down bottom-up divide-and-conquer from hardware to software Bottom of Form 23 Top of Form Which protocol defines the types of messages that a client uses to request a web page and the messages a server uses to respond to those requests? FTP TCP HTTP HTML Bottom of Form 24 Top of Form Which two commands ensure that any password that permits access to the privileged EXEC mode is not shown in plain text when the configuration files are displayed? (Choose two.) Router(config)# enable secret cisco Router(config)# enable cisco Router(config)# encryption-password all Router(config)# enable login encrypted Router(config)# enable password encryption Router(config)# service password-encryption Bottom of Form 25 Top of Form A network engineer is planning a new horizontal cable installation in an office building. What advantage would UTP cable have over fiber optic cable for this installation? .NAT DHCP Bottom of Form 22 Top of Form A network technician begins troubleshooting by checking the status of the light on the network interface card on the web server.

The network administrator has entered the commands that are shown in the exhibit. Bottom of Form 27 Top of Form Refer to the exhibit. No dynamic routing protocols have been configured. It forwards zone information updates to the secondary server. It maintains a database of ARP entries for all servers. The interfaces on R1 and R2 have been properly configured with the IP addresses as shown .219. Which two additional routes need to be configured to enable host A to access the Internet? (Choose two. It stores the information about the domain namespace structure.133.) a default route on R1 using exit interface S0/0/0 a default route on R1 using exit interface S0/0/1 a default route on R1 using exit IP address 198.1 .lower installation costs better protection from EMI higher transmission speeds longer unrepeated distance between endpoints Bottom of Form 26 Top of Form What is the function of the forward lookup DNS zone in the DNS name resolution process? It resolves fully qualified domain names into IP addresses.

the SYST LED on the front of the switch transitions from blinking green to amber. About a minute after the switch has started.133.1. The switch has failed POST and must be sent for service. simple networks that consist of fewer than 15 hops. Bottom of Form 30 What is a characteristic of the EIGRP routing protocol? Top of Form It has a hop count limitation that makes it suitable only for small.1 using exit interface S0/0/0 a static route on R2 for network 10.a static route on R2 for network 192. It maintains a full database of distant routers and the methods by which they interconnect. What is an advantage to this approach? works well for simple problems quickly resolves user-related issues easiest to use in a multi-vendor environment targets the problem layer more quickly than other methods do Bottom of Form 29 Top of Form A Catalyst switch is used as a temporary replacement for another switch that needs to be repaired. What is the meaning of the amber SYST LED? The switch has no configuration file in NVRAM. Top of Form . It builds the topology table based on all of the advertisements from its neighbors. The switch is in half-duplex mode.219. It does not include subnet mask information in routing updates.0 using exit interface S0/0/0 a static route on R2 for network 198.1.168. The switch is functioning properly.1. Bottom of Form 46 What should be the first step in a structured cable project? Locate all sources of EMI.0 using exit interface S0/0/0 Bottom of Form 28 Top of Form An experienced network technician has decided to use a divide-and-conquer approach to troubleshooting a network problem.

It listens to network traffic and sends an alert to a management station to track which applications are used and the length of time for which they are used. the router will forward it to the next hop? a default route a directly connected route . Bottom of Form 49 point-to-point circuit-switched packet-switched cable Top of Form Which WAN connection provides a dedicated circuit with fixed bandwidth available at all times? Bottom of Form 50 Top of Form What needs to be configured on a router to ensure that when the router receives a packet with an unknown destination. Identify the network backbone. Design efficient cable management systems.Obtain an accurate floor plan. Bottom of Form 47 connecting a host to a hub connecting a host to a switch connecting a router to a switch connecting a switch to another switch Top of Form Which scenario may require the use of a crossover UTP cable? Bottom of Form 48 What is a characteristic of Syslog? Top of Form It requires users to prove their identity with the use of a username and password before users can access network resources. It provides users the rights to access specific resources and perform specific tasks. It enables devices to send information to a daemon that runs on a management station.

Top of Form 4 Bottom of Form Bottom of Form Bottom of Form Bottom of Form . Inc.a dynamically updated route a static route to the destination network Bottom of Form Top of Form Showing 4 of 4 <Prev 4 Page: Bottom of Form Next> Close Window All contents copyright 1992-2011 Cisco Systems. Privacy Statement and Trademarks.

Sign up to vote on this title
UsefulNot useful

Master Your Semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master Your Semester with a Special Offer from Scribd & The New York Times

Cancel anytime.