You are on page 1of 8

Refer to the exhibit.

Router R1 no longer receives routing updates from other EIGRP n the output in the exhibit, what could be the cause of this problem
Interface !astEthernet "#" has been configured as a passive interface. Interface !astEthernet "#" has not been configured to support authentication. Interface !astEthernet "#" is administrativel$ shut down. %he EIGRP peer has not been configured to support authentication. %here are no valid EIGRP neighbors connected to interface !astEthernet "#".

&hat is the first step in troubleshooting connectivit$ issues in a secured networ' environment
(etermine when the connectivit$ problem first appeared. (etermine if the connectivit$ problem is affecting all users. (etermine if disabling all securit$ features on the networ' re)establishes connectivit$. (etermine if an$ access lists were added or modified immediatel$ prior to the reporting of the connectivit$ problems. (etermine if the user should have connectivit$ based on the securit$ polic$ of the organi*ation and the t$pe of traffic being generated.

&hich technolog$ prevents +P, overloading of infrastructure

devices
-imple .etwor' /anagement Protocol +isco Express !orwarding +ontrol Plane Policing 0ccess +ontrol 1ists

&hich three control plane protocols influence the data structures used b$ the data plane to forward unicast pac'ets in the core networ' 2+hoose three.3
($namic 4ost +onfiguration Protocol 2(4+P3 !irst 4op Redundanc$ Protocols 2!4RP3 0ddress Resolution Protocol 20RP3 multicast routing protocols unicast routing protocols -panning %ree Protocol 2-%P3

&hat would be the outcome of the no service passwordrecovery command enabled on the router
%he secret password can be recovered but not the original configuration. %he original configuration of the device can be recovered but not the secret password. %he original configuration and passwords of the device can be recovered using the password recover$ procedure. %he original configuration and passwords of the device cannot be recovered using the password recover$ procedure.

Refer to the exhibit. 0 networ' technician has 5ust configured router East to establish a tunnel to router &est. 0fter the configuration is applied, tunnel 1 is flapping. &hat needs to be done to stop this flapping
/a'e tunnel 1 on router East an EIGRP passive interface. -et the default gatewa$ of +omputer1 to 167.1"8.669.:". 0dd a static route on router East out -"#"#" to 197.1;;.619.6:. +hange the configuration on router East such that the destination of tunnel 1 is 196.1<7.".6.

&hen audit trails are enabled with the ip inspect audittrail command, which messages will appear in the s$slog
all pac'ets that enter the specified interface all %+P pac'ets all stateful inspection sessions all pac'ets that match an 0+1

&hich two securit$ features could be implemented in the networ' control plane 2+hoose two.3
which devices will exchange routing updates who can alter the configuration of a networ' device which locations can alter the configuration of networ' devices which device will become the root device in an -%P selection process who can access networ' device operational logs and interface statistics

Refer to the exhibit. 0n administrator has implemented a stateful I=firewall configuration that allows internal users access to Internet websites. 4owever, users have reported that the$ cannot do so.

Based on the configuration in the exhibit, what change should be made to allow the firewall to function as planned
R12config3> interface Fa0/1 R12config)if3> no ip access-group DENY out R12config)if3> ip access-group DENY in R12config3> no ip inspect name FWA R12config3> ip inspect name DENY !ttp R12config3> interface Fa0/1 R12config)if3> no ip inspect FWA R12config)if3> ip inspect FWA in out !ttp

R12config3> no ip access-list e"tended DENY R12config3> ip access-list e"tended DENY R12config)ext)nacl3> permit ip any any

Refer to the exhibit. Based on the de#ug aaa aut!entication and de#ug tacacs outputs, which statement is true
%he authentication process verifies the user credentials to the local database. %he first method defined b$ the default authentication method list is %0+0+-?. %he user with the IP address 186.;1.<".1: has been authori*ed to use privileged E@E+ mode. %he attempt of a remote user with the IP address 186.;1.<".1: to log in to the router is unsuccessful.

0 networ' administrator has received a report from a user about being unable to access the server that houses emplo$ee records. %he server is on a restricted A10. and the user wor'station is not assigned to this A10.. &hat step should the administrator ta'e next
/ove the wor'station to a port that is configured for the A10.. 0dd the port connected to the wor'station to the A10. and test connectivit$.

/ove the server to a trun' lin' so that multiple A10.s can access the records. Review the securit$ polic$ to determine if the user should have access to the A10..

Refer to the exhibit. Based on the provided de#ug aaa aut!ori$ation and de#ug tacacscommand output, which statement is true
%he authori*ation method used for user 0dmin was %0+0+-?. %he user 0dmin attempted to gain %elnet access to the device. %he 000 securit$ server authori*ed the user 0dmin to perform the reBuested command. %he 000 securit$ server has authori*ed the user 0dmin to use privilege level 1: E@E+ commands.

Refer to the exhibit. %he networ' administrator has decided to create an IPsec tunnel between the 4C and BR0.+4 routers. &hat two changes must be made to the existing 0+1 in order to allow the formation of the tunnel 2+hoose two.3
I+/P must be denied. ,(P port :"" must be permitted. %+P ports :" and :1 must be permitted. %he E-P and 04 protocols must be permitted. IP must be permitted between the two ends of the tunnel. %he esta#lis!ed 'e$word must be removed from statement 1".

&hich two features should be enabled to secure (4+P and 0RP 2+hoose two.3
(4+P -nooping BP(, Guard

Private A10.s BP(, !iltering IP -ource Guard ($namic 0RP Inspection

Refer to the exhibit. 0 networ' administrator is attempting to connect a branch office to headBuarters through a AP. tunnel. %he tunnel is reported as being active at both ends, but the 1".6.6."#6D networ' is not appearing in the routing table at the branch end. %he administrator has determined that the problem is with the branch office configuration. Based on the output as shown, wh$ is the 1".6.6."#6D networ' not appearing in the routing table
%he tunnel protocol is improperl$ set. %he tunnel 'e$ has been improperl$ configured. %he tunnel encapsulation is improperl$ configured. %he tunnel bandwidth is insufficient for EIGRP updates. %he tunnel destination end point has been improperl$ configured.

&hat is considered a control plane issue


0 wrong 'e$ is used b$ =-P!. 0n 0+1 is bloc'ing %+P traffic to a server. --4 is not enabled on the A%E lines of a switch. %he networ' administrator account is disabled on the R0(I,- server.

Refer to the exhibit. &hich statement about the de#ug radius aut!entication output is correct
%he R0(I,- server is unreachable.

%he user raduser has been authenticated. %he IP address of the R0(I,- server is 1".1.:".6:6. %he user raduser is on a device with the IP address of 1".1.:".1.

Refer to the exhibit. 0 legitimate user experienced a problem while attempting to gain access to the router E@E+ shell. %o investigate the situation, a networ' administrator issued de#ug tacacs and de#ug aaa aut!entication commands on the router. Based on the provided output, what could be the problem
%he user credentials are re5ected b$ the %0+0+-? server. %he user credentials stored in the local database do not match the credentials on the %0+0+-? server. %he user fails the authentication because the %0+0-? server does not have a profile set up to authori*e +40P. %he user fails the authentication because router R1 cannot connect to the %0+0+-? server.

Refer to the exhibit. 0 networ' administrator issued the s!ow ip inspect sessions command on R1 to investigate the status of the firewall. &hat two facts can be determined from the output 2+hoose two.3
%he limit of one 4%%P session has been reached. %he firewall has been configured to monitor -I- traffic. %he session will be bloc'ed because of the .0% configuration on R1. %he firewall is trac'ing an 4%%P session that was initiated b$ an internal trusted host. Return traffic from the untrusted Internet host on port 7" will be permitted.

Refer to the exhibit. &hat is the expected behavior of the configured firewall when internal hosts attempt to access web sites on the Internet
%he rule !&011 will inspect all 4%%P traffic for viruses before allowing the traffic through. 4osts from the Internet will be allowed to initiate sessions with internal hosts that are using 4%%P. Because all IP traffic is bloc'ed b$ the access)list (E.E, internal hosts cannot reach Internet hosts. 4%%P sessions that are initiated from internal hosts to Internet hosts will be trac'ed and allowed, until closed or when the idle timer expires.

You might also like