Professional Documents
Culture Documents
Refer to the exhibit. The network administrator has added a route by using the ip route 10.13.13.0
255.255.255.0 192.168.1.1 command on R1. Hosts on the 10.12.12.0 network cannot communicate with h
the 10.13.13.0 network. What is the reason for this?
The gateway of last resort is not set.
2 Top of Form
What is the effect of issuing the hostname RouterA command on a router?
A description will be configured on the router interfaces identifying them as belonging to RouterA.
The router will attempt to establish a connection to the host with the name RouterA.
3 Top of Form
Refer to the exhibit. A network administrator is troubleshooting the serial connection between R1 and R2
is no communication between R1 and R2. Based on the output of the show ip interface brief command,
the cause of the problem?
There is a misconfiguration of IP addresses.
4 Top of Form
Wireless radio waves are associated with which layer of the OSI model?
Layer 1
Layer 2
Layer 3
Layer 4
Layer 5
Layer 6
Layer 7
Bottom of Form
5 Top of Form
Which statement correctly describes the function of AAA?
It prevents unauthorized access to a network.
BGP
OSPF
EIGRP
Bottom of Form
7 Top of Form
Which statement correctly describes an SLA?
It lists the terms of the agreement between the user and the manufacturer of the system.
8 Top of Form
What is a characteristic of a scalable network?
100% uptime
redundant links
easy expansion
9 Top of Form
A user is attempting to do an http://www.cisco.com/ without success. Which two configuration values mu
set on the host to allow this access? (Choose two.)
DNS server
WINS server
HTTP server
default gateway
Netbios
Bottom of Form
10 Top of Form
Which two commands ensure that any password that permits access to the privileged EXEC mode is not s
in plain text when the configuration files are displayed? (Choose two.)
Router(config)# enable secret cisco
12 Top of Form
When a field technician visits a customer site and resolves the issue that was opened in a trouble ticket, w
should the technician do?
assess the network design of the customer site
survey users at the customer site for further needs
discuss further problems that are identified during the visit and offer cost estimates
Bottom of Form
13 Top of Form
What happens when a segment is encapsulated into a packet?
Data is converted to bits for transmission.
14 Top of Form
What should be the first step in a structured cable project?
Locate all sources of EMI.
15 Top of Form
Refer to the exhibit. What two addresses are the broadcast addresses for network A and network B? (Cho
two.)
Network A broadcast address 192.168.1.32
Top of Form
16 Top of Form
A network administrator is planning new cable installations for an automated manufacturing facility. The
solution must be scalable and function reliably in an environment subject to electromagnetic interference.
two cable solutions should the administrator consider? (Choose two.)
STP
UTP
coaxial
fiber optic
wireless
Bottom of Form
17 Top of Form
Refer to the exhibit. A ping 192.168.1.20 command is issued on workstation A to determine if workstatio
can be reached. What two events will occur if this command is successful? (Choose two.)
The router will reply to the echo request with a proxy ping response.
18 Top of Form
Which statement best describes the operation of a Layer 2 switch?
functions at the network layer of the OSI model
directs traffic from one port to another based on the destination MAC address
19 Top of Form
Refer to the exhibit. What is the possible reason that a technician is unable to telnet into the HQ router an
configuration changes?
A password is required for vty 0.
20 Top of Form
To manage a Cisco switch using Telnet, where would the management IP address be configured on the sw
VLAN 1 interface
console port
Users only have access to resources that are necessary for their jobs.
22 Top of Form
A network administrator wants to configure six subnets for a Class C network. Which subnet mask will su
the maximum number of hosts on each subnet?
255.255.255.248
255.255.255.240
255.255.255.224
255.255.255.192
Bottom of Form
23 Top of Form
Refer to the exhibit. The Transfer > Capture Text feature available through HyperTerminal has been used
capture the running configuration on a router. The startup-configuration has been erased from the router
followed by the issuing of the reload command. The startup-config is restored by using the captured file,
interfaces on the router are shown as administratively down. What could cause this problem?
The enable password was incorrectly entered.
The no shutdown command must be entered under each interface section in the file being sent.
The captured file should have restored the running configuration not the startup configuration.
Bottom of Form
24 Top of Form
Which statement describes a feature of TCP?
It provides low overhead data delivery.
25 Top of Form
Refer to the exhibit. Hosts that belong to the IT department use 10.10.55.33/27 as a default gateway. Whe
this IP address be located in the network?
A
F
Bottom of Form
26 Top of Form
Which protocol allows secure in-band management so that a network administrator can monitor and conf
network devices without fear of any passwords being compromised?
SSH
HTTP
SNMP
Telnet
Bottom of Form
27 Top of Form
In an IPv4 environment, what information is used by the router to forward data packets from one interfac
router to another?
destination network address
28 Top of Form
Which is the best description of the operation of a Layer 2 LAN switch?
A switch forwards data packets from one port to another based on the destination IP address within th
packet.
A switch forwards frames between multiple devices on a LAN by broadcasting all received frames ou
ports.
A switch directs a stream of frames from one port to another based on the destination MAC address w
the frame.
A switch breaks a network into multiple local networks by using subnets and thus restricts the size of
broadcast domains.
Bottom of Form
29 Top of Form
When a router learns two paths to the same destination network, which two factors determine the path tha
be included in the routing table? (Choose two.)
route metric
administrative distance
Bottom of Form
30 Top of Form
A large company wants to ensure its connection to a remote branch office. The connection must be able to
support equally high upstream and downstream traffic. The service provider must also provide an SLA wi
guarantee of specific uptime and security. What type of connection best suits the needs of the company?
DSL connection
cable connection
dialup connection
Bottom of Form
31 Top of Form
What is the primary function of a Level 1 support technician in an ISP help desk department with multipl
of customer support?
to install hardware replacements for the customer
to diagnose and document the symptoms of hardware, software, and system problems
to design network enhancements that support the new technology requirements of the customer
Bottom of Form
32 Top of Form
Refer to the exhibit. A network administrator is unable to ping H1 from the router and is checking the cab
along the network. Which segment is incorrectly cabled?
Segment A
Segment B
Segment C
Segment D
Bottom of Form
33 Top of Form
Refer to the exhibit. Host H1 is sending a datagram to host H2 across the Internet. NAT will be configure
RTRC. Which address is considered the inside local address?
10.1.1.1
10.1.1.6
209.165.201.2
209.165.201.17
209.165.200.226
Bottom of Form
34 Top of Form
Which application can be delivered using UDP?
FTP
DNS
HTTP
SMTP
Bottom of Form
35 Top of Form
Refer to the exhibit. What two facts can be determined from the output of the show ip protocols comman
(Choose two.)
The routing protocol in use on RTA is RIPv1.
RTA will receive the next update from its neighbor in 30 seconds.
The routing protocol is only sending updates out the serial interface.
Bottom of Form
36 Top of Form
A tracert command is run on a host to determine if another host can be reached across a network. Which
events will occur if connectivity with the other host is unsuccessful? (Choose two.)
The command will display all the successful hops a packet makes before it is lost.
The command will calculate the time between successful and unsuccessful packets.
The host on which the command is run will send a UDP request message to the other host.
The command helps to determine where a packet was lost on the path from the source to the destinati
All hops between the two hosts display !!!!! to signify success.
Bottom of Form
37 Top of Form
What can be gained by using a caching-only DNS server?
The DNS server will use more WAN bandwidth.
38 Top of Form
Which statement is correct about passive data connections in the FTP protocol?
The server initiates the data transfer connection.
The server forwards its IP address and a random port number to the FTP client through the control str
The firewalls do not permit passive data connections to hosts that are located within the network.
39 Top of Form
A hacker attempts to reach confidential information that is stored on a server inside the corporate network
network security solution inspects the entire packet, determines that it is a threat, and blocks the packet fr
entering the inside network. Which security measure protected the network?
an IDS
an IPS
a host-based firewall
Anti-X software
Bottom of Form
40 Top of Form
Refer to the exhibit. Which type of link is supported by this interface module?
LAN
WAN
WLAN
VLAN
Bottom of Form
41 Top of Form
Refer to the exhibit. Which two statements describe the data conversation shown? (Choose two.)
The data conversation was started by the HTTP application process running on the client.
The Internet server will send data to port 8547 on the client.
Bottom of Form
42 Top of Form
The IT department of a company implements a backup plan which includes a daily backup on Monday th
Saturday. Only files that were modified during each day are backed up. Which backup method is being us
full backup
normal backup
differential backup
incremental backup
Bottom of Form
43 Top of Form
Refer to the exhibit. While configuring the serial interface of a router, the network administrator sees the
highlighted error message. What is the reason for this?
The serial interface is administratively down.
The network administrator has attempted to configure the serial interface with a broadcast address.
44 Top of Form
When does a router enter the setup mode?
when the Cisco IOS is missing in flash
45 Top of Form
In a structured cable system, which term describes the cable that connects the wall jack in the user work a
the patch panel in the wiring closet?
patch cable
vertical cable
horizontal cable
backbone cable
Bottom of Form
46 Top of Form
What is the default encapsulation for serial interfaces on Cisco routers?
PPP
SLIP
HDLC
Frame Relay
Bottom of Form
47 Top of Form
Refer to the exhibit. A new branch office has been added to the corporate network and a new router is to b
installed to allow branch office users to access the database server at headquarters. How should the serial
interface of the new branch office router be configured to connect to the headquarters router?
branch_23(config-if)# ip address 192.168.5.19 255.255.255.240
branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation hdlc
branch_23(config-if)# ip address 192.168.5.25 255.255.255.240
branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation ppp
branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation ppp
branch_23(config-if)# ip address 192.168.5.33 255.255.255.240
branch_23(config-if)# encapsulation ppp
branch_23(config-if)# ip address 192.168.5.21 255.255.255.240
branch_23(config-if)# no shutdown
Bottom of Form
48 Top of Form
A network technician is using a network management station to gather data about the performance of dev
and links within the ISP. Which application layer protocol makes this possible?
SNMP
FTP
DHCP
SMTP
Bottom of Form
49 Top of Form
A user reports being unable to access the Internet. The help desk technician employs a bottom-up approac
troubleshooting. The technician first has the user check the patch cable connection from the PC to the wa
then has the user verify that the NIC has a green link light. What will the technician have the user do next
Enter an IP address into the WWW browser address bar to see if DNS is at fault.
Use traceroute to identify the device along the path to the ISP that may be at fault.
Verify the IP address, subnet, and gateway settings using ipconfig on the PC.
Connect to the user home router to check firewall settings for blocked TCP ports.
Bottom of Form
50 Top of Form
What needs to be configured on a router to ensure that when the router receives a packet with an unknow
destination, the router will forward it to the next hop?
a default route