CCNA Discovery 2: Working at a Small-to-Medium Business or ISP Practice Final Exam

Which commands will configure a management interface on a LAN switch? Switch(config)# ip default-gateway 192.168.1.1 255.255.255.0 Switch(config)# interface vlan 1 Switch(config-if)# ip address 192.168.1.2 255.255.255.0 Switch(config)# interface fa0/1 Switch(config-if)# description Management Interface Switch(config-if)# ip address 192.168.1.254 255.255.255.0 Switch(config)# interface fa0/1 Switch(config-if)# switchport access vlan 1 A network administrator is asked to design a system to allow simultaneous access to the Internet for 250 users. The ISP can only supply five public IP addresses for this network. What technology can the administrator use to accomplish this task? classful subnetting variable length subnet masks classless interdomain routing port-based Network Address Translation

Refer to the exhibit. A network administrator has just entered the interface configuration commands shown in the exhibit on a brand new router. To verify basic connectivity, a ping is issued from Host A to R1. The ping is unsuccessful. Which two configuration steps should be performed to solve this problem? (Choose two.) Configure the appropriate line password to access the router. Configure the speed of the interface. Enable the interface administratively. Configure a dynamic routing protocol on the router. Configure the subnet mask on the router interface to 255.255.255.248. Modify the subnet mask on HostA to be the same as the Fa0/0 interface.

A network administrator is planning the wiring for a new installation and wants to connect three separate buildings that are 250 meters apart.Refer to the exhibit. It is connected to a device with a 100 Mb/s port that is set to full-duplex. Which type of cable should be used to connect the buildings? STP UTP serial coaxial fiber optic A switch with 10/100/1000 Gigabit Ethernet ports is configured for autonegotiation. What speed and duplex setting will the switch use? 100 Mb/s and full-duplex 100 Mb/s and half-duplex 1000 Mb/s and full-duplex 1000 Mb/s and half-duplex .

The operating system of the computer is unresponsive.2/16. It references a central file that maps hostnames to IP addresses for all Internet hosts. Which IOS feature should be implemented on router EXTRA? ACLs CDP IDS IPS A computer is configured to receive an IP address dynamically. It uses a distributed hierarchy of servers to resolve hostnames to IP addresses.254. A network technician then determines that the computer has an IP address of 169. The TCP/IP stack on the local computer is corrupted. the computer cannot communicate with other hosts on the network. The DNS server is not responding to discovery messages.Refer to the exhibit. However.0. A network administrator has an extra router and wishes to use it as shown to passively monitor network traffic. What is a possible cause for this problem? The DHCP server pool is exhausted. Which statement correctly describes the operation of DNS? It uses a local HOSTS file to resolve URLs to IP addresses for internal devices. It uses a single layer of interconnected peer servers to manage hostname-to-IP-address mappings. .

Which storage media type is most commonly selected if cost effectiveness.1.When would TFTP in ROM monitor mode be used to restore a Cisco IOS image to a router? when a console connection is the only available connection to the router when the TFTP server software is incompatible with the router IOS version when the router is set to boot from flash. large capacity. The enable password has not been set on the remote router.2. and transportability are the key factors being considered during implementation of a backup scheme? digital tape solid-state storage optical media discs storage area networks network-attached storage . The enable secret password has not been set on the remote router. The VTY password has not been set on the remote router. The session has been opened and closed successfully by the remote router. What does the message indicate about the Telnet session? The console password has not been set on the remote router. but the Cisco IOS image in flash is corrupt or has been erased when the current Cisco IOS on the router requires a feature upgrade Refer to the exhibit. A technician tries to telnet to a router with the IP address of 172.16.

PC1. Sw3. Sw2. which devices will appear in the output if all devices use the Cisco IOS and have CDP enabled? RTA. Sw2. RTC RTA. RTC. PC2 Which transport layer protocol will allow segments to be exchanged between two hosts with low overhead and no mechanism for retransmission? IP FTP TCP UDP SMTP At which layer of the OSI model is the Ethernet family of technologies defined? Layer 1 Layer 2 Layer 3 Layer 4 Layer 5 Layer 6 Layer 7 .Refer to the exhibit. RTC. If the show cdp neighbors command is issued on RTB. RTC. Sw1. Sw3 RTA. Sw2 RTA. Sw1.

Restrict all users except administrators to the lowest privilege level. Require authentication for access to all resources including files and folders. Encrypt all data for transmission across unsecured networks. What is an advantage to this approach? works well for simple problems quickly resolves user-related issues easiest to use in a multi-vendor environment targets the problem layer more quickly than other methods do Which action would a network security administrator take under the principle of least privilege? Provide users with access to only necessary resources. .At which layer of the OSI model is the Ethernet family of technologies defined? Layer 1 Layer 2 Layer 3 Layer 4 Layer 5 Layer 6 Layer 7 Wireless radio waves are associated with which layer of the OSI model? Layer 1 Layer 2 Layer 3 Layer 4 Layer 5 Layer 6 Layer 7 What is the maximum unrepeated distance set by industry standards for UTP cable? 10 meters 75 meters 100 meters 325 meters An experienced network technician has decided to use a divide-and-conquer approach to troubleshooting a network problem.

A session with a destination is established. What is the function of the service password-encryption command in the Cisco IOS? encrypts passwords sent over serial interfaces validates encrypted passwords by the use of an authentication server encrypts passwords for transmission across insecure networks prevents passwords in configuration files from being easily read Which routing algorithm does EIGRP use to calculate the best path to a destination within a network? link-state DUAL Dijkstra shortest path first . The destination port number is specified.What is the purpose of the debug ip rip command? shows the installed routing table allows RIP to advertise triggered updates displays routing update activity in real time shows the administrative distance of all routes What happens when a segment is encapsulated into a packet? Data is converted to bits for transmission. A header with logical addresses is added.

All hosts and router interfaces are configured correctly.Refer to the exhibit. RIPv2 is misconfigured on router R1. RIPv2 is misconfigured on router R2. RIPv2 does not support private IP addressing. RIPv2 is misconfigured on router R3. What is causing this problem? RIPv2 does not support VLSM. Which question provides troubleshooting information about a problem at Layer 1 or Layer 2 of the OSI model? Can the server be reached through Telnet? Is there a firewall that is configured on the PC? Is there a link light on the network card? What addresses are configured in the TCP/IP settings? Which application can be delivered using UDP? FTP DNS HTTP SMTP . Pings to the server from both H1 and H2 and pings between H1 and H2 are not successful.

The switch should be assigned an IP address. When does a router enter the setup mode? when the Cisco IOS is missing in flash when the configuration is missing in NVRAM when the setup command is run from the user mode when the boot system command is missing in the configuration . H1 does not know the physical address of the server. However. What is the cause of the problem? The default gateway is incorrect on R1. H1 and the server are on different subnetworks.What routing protocol would be appropriate to use for exchanging routes between ISPs? RIPv2 BGP OSPF EIGRP Refer to the exhibit. H1 cannot ping the server. All cables are working and all devices have IP addresses.

168.255 has been configured for the serial0/0/0 interface.1. A computer with the displayed IP settings is unable to access a server on the 192.1 command on the host to determine if the host can communicate with the default gateway.Refer to the exhibit.0 network using the server IP address but can access hosts on the 192. Refer to the exhibit.0 network. Check the cabling of the host. Verify that the host has a link light. Subnet mask 255. . What should the network administrator do to troubleshoot this problem? Issue the ping 192. What fact can be determined from the exhibited output? PPP is enabled on this router. Issue the ipconfig /all command to determine if a DNS server IP address was configured.255.168.1. The bandwidth setting of the interfaces is consistent with a T1 connection. The default encapsulation is set for the serial0/0/0 interface.168. The serial0/0/0 interface is administratively down.2.255.

A host has been properly cabled and configured with a unique hostname and valid IP address. Which layer of the OSI model is the administrator troubleshooting? application layer network layer data link layer physical layer . Router R1 has been configured with the commands that are displayed. Which two additional components should be configured to enable the host to access remote resources? (Choose two. the network administrator checks the encapsulation settings on the serial interfaces of both routers. Which password will be used to access the EXEC privileged mode of the router? password1 password2 password3 password4 While troubleshooting a connectivity issue between two directly connected routers.) the subnet mask the MAC address the default gateway the loopback IP address the DHCP server IP address Refer to the exhibit.

It stores the information about the domain namespace structure. HTTPS and HTTP use different client request-server response processes. HTTPS authenticates and encrypts the data being transferred between the client and the web server. R1 is unable to ping the serial interface of R2. A static route is not configured on both routers. Different encapsulations are configured on the two routers. What could be the reason for this problem? The subnet mask is incorrectly configured on both routers. Which statement correctly describes the difference between HTTP and HTTPS? The maximum number of simultaneous connections that a server can support for HTTPS is more than for HTTP. However. The administrator confirms Layer 1 connectivity between the two routers is functioning properly. The network administrator uses the exhibited commands to configure R1 and R2. HTTPS specifies the rules for passing data between the physical layer and the data link layer.Refer to the exhibit. What is the function of the forward lookup DNS zone in the DNS name resolution process? It resolves fully qualified domain names into IP addresses. It forwards zone information updates to the secondary server. It maintains a database of ARP entries for all servers. The clock rate is not set on any of the router serial interfaces. .

It has an administrative distance of 1. one for control and one for data. It is identified by the prefix C in the routing table. It guarantees the sequential arrival of data packets. Which statement describes a route that has been learned dynamically? It is automatically updated and maintained by routing protocols.Which statement is true about FTP implementations? The protocol interpreter (PI) function engages once the data transfer process (DTP) function is complete. It is unaffected by changes in the topology of the network.) It utilizes a flow control mechanism. It is a connectionless protocol. Both the PI and the DTP close automatically when the transfer is complete. It uses windowing. The DTP function is responsible for the login sequence. . It does not provide acknowledgment of receipt of data. FTP requires two connections. Which two statements are correct about the UDP protocol? (Choose two.

0.0.0.0.0.0.0 0.168. No password has been configured on the VTY lines.0. Which command will create a default route on R1 to forward the traffic to R2? R1(config)# ip route 0. why is the Telnet session failing? Telnet has not been configured on the console line.0.Refer to the exhibit.0.0.0 S0/0/1 Refer to the exhibit. .2 R1(config)# ip route 0. The login command has not been issued on the console line.0 192. There is no routing protocol configured on either router.0.1.0.0 192.0.0 10.0 0.0 0.0.0. but the connection is failing.0. Based on the output of theshow running-config command on router RTB. A user who is connected to RTA is trying to telnet to RTB.0.0.1 R1(config)# ip route 0.0 0.1 R1(config)# ip route 0. A session limit has not been configured for Telnet.1.168.

About a minute after the switch has started. What is the meaning of the amber SYST LED? The switch has no configuration file in NVRAM. Which WAN connection type is best suited to its needs? SONET T3 T1 DSL leased line Refer to the exhibit. The switch is functioning properly. A ping 192. Workstation A will send an ICMP echo request message to workstation B. A small tire retailer requires a low-cost WAN connection to its headquarters in order to manage its inventory and process customer sales in real time. the SYST LED on the front of the switch transitions from blinking green to amber.) The router will reply to the echo request with a proxy ping response.20 command is issued on workstation A to determine if workstation B can be reached. Workstation B will send a UDP ping reply message to the router. The switch is in half-duplex mode. Workstation B will send an ICMP echo reply message to workstation A.A Catalyst switch is used as a temporary replacement for another switch that needs to be repaired. . The switch has failed POST and must be sent for service. What two events will occur if this command is successful? (Choose two. The router will send a TCP acknowledgment message to workstation A.1. Workstation A will send a UDP ping request message to workstation B.168.

crossover. C . Which combination of cables and symbols is correct? A . B -straight-through.crossover.255.255.0 255.255. B -crossover.192. C . C .0. C .straight-through A .straight-through.192.straight-through.straight-through. C . B .0.240 255.0 255.) Syslog Telnet HTTP HTTPS SNMP .0 255.0.straight-through.rollover.) 255. B . B .straight-through A .crossover A .straight-through.0 240.0 Refer to the exhibit.0.straight-through.rollover.straight-through A .straight-through Which two protocols allow network devices to report their status and events to a centralized network management device? (Choose two. B .0.Which two subnet masks could be used when subnetting a Class B IP address? (Choose two.straight-through A . C .255.0.

248.255.0 network address with a subnet mask of 255.0.68.What is one purpose of the TCP three-way handshake? sending echo requests from the source to the destination host to establish the presence of the destination determining the IP address of the destination host in preparation for data transfer requesting the destination to transfer a binary file to the source synchronizing sequence numbers between source and destination in preparation for data transfer How many host addresses may be assigned on each subnetwork when using the 130.0? 30 256 2046 2048 4094 4096 What is used by a routing protocol to determine the best path to include in the routing table? Convergence time Default distance Metric Type of router .