Senin, 17 Januari 2011


1. What is a characteristic of a scalable network?
100% uptime
redundant links
*easy expansion
multiple backup devices

2. In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another?
*destination network address
source network address
source MAC address
well known port destination address

3. When a router learns two paths to the same destination network, which two factors determine the path that will be included in the routing table? (Choose two.)
*route metric
the MAC address of the neighboring router
the source IP address in data packets
the IP address of the next hop router
*administrative distance

4. What needs to be configured on a router to ensure that when the router receives a packet with an unknown destination, the router will forward it to the next hop?
*a default route
a directly connected route
a dynamically updated route
a static route to the destination network

5. What routing protocol would be appropriate to use for exchanging routes between ISPs?

6. Wireless radio waves are associated with which layer of the OSI model?
*Layer 1
Layer 2
Layer 3
Layer 4
Layer 5
Layer 6
Layer 7

7. What happens when a segment is encapsulated into a packet?
Data is converted to bits for transmission.
The destination port number is specified.
*A header with logical addresses is added.
A session with a destination is established.

8. Refer to the exhibit. Hosts that belong to the IT department use as a default gateway. Where can this IP address be located in the network?

9. A network administrator wants to configure six subnets for a Class C network. Which subnet mask will support the maximum number of hosts on each subnet?

10. Which two subnet masks can be used when subnetting a Class A IP address? (Choose two.)

11. A user is attempting to do an without success. Which two configuration values must be set on the host to allow this access? (Choose two.)
*DNS server
WINS server
HTTP server
*default gateway

12. Refer to the exhibit. What two addresses are the broadcast addresses for network A and network B? (Choose two.)
Network A broadcast address
*Network A broadcast address
Network A broadcast address
*Network B broadcast address
Network B broadcast address
Network B broadcast address

13. Refer to the exhibit. A network administrator is troubleshooting the serial connection between R1 and R2. There is no communication between R1 and R2. Based on the output of the show ip interface brief command, what is the cause of the problem?
*There is a misconfiguration of IP addresses.
There is a mismatch of encapsulation methods.
The no shutdown command should be issued on R2.
The routing protocols are not compatible.

14. Refer to the exhibit. Host H1 is sending a datagram to host H2 across the Internet. NAT will be configured on RTRC. Which address is considered the inside local address?

15. Refer to the exhibit. What two facts can be determined from the output of the show ip protocols command? (Choose two.)
*The routing protocol in use on RTA is RIPv1.
RTA is directly connected to four neighbor routers.
*The administrative distance of the routing protocol is 120.
RTA will receive the next update from its neighbor in 30 seconds.
The routing protocol is only sending updates out the serial interface.

16. How does a switch interface that uses sticky port security handle MAC addresses?
The addresses are configured manually and are saved in the running configuration.
They are configured manually and are not saved in the running configuration.
*They are configured dynamically and are saved in the running configuration.
They are configured dynamically and are not saved in the running configuration.

17. Which statement best describes the operation of a Layer 2 switch?
functions at the network layer of the OSI model
forwards traffic from one local IP network to another
*directs traffic from one port to another based on the destination MAC address
dynamically creates a forwarding table that maps IP addresses to MAC addresses

18. To manage a Cisco switch using Telnet, where would the management IP address be configured on the switch?
*VLAN 1 interface
first vty port
first trunk port
console port
FastEthernet 0/1 interface

19. Refer to the exhibit. A ping command is issued on workstation A to determine if workstation B can be reached. What two events will occur if this command is successful? (Choose two.)
The router will reply to the echo request with a proxy ping response.
Workstation A will send a UDP ping request message to workstation B.
The router will send a TCP acknowledgment message to workstation A.
Workstation B will send a UDP ping reply message to the router.
*Workstation A will send an ICMP echo request message to workstation B.
*Workstation B will send an ICMP echo reply message to workstation A.

20. A tracert command is run on a host to determine if another host can be reached across a network. Which two events will occur if connectivity with the other host is unsuccessful? (Choose two.)
*The command will display all the successful hops a packet makes before it is lost.
The command will calculate the time between successful and unsuccessful packets.
The host on which the command is run will send a UDP request message to the other host.
*The command helps to determine where a packet was lost on the path from the source to the destination.
All hops between the two hosts display !!!!! to signify success.

21. Which protocol allows secure in-band management so that a network administrator can monitor and configure network devices without fear of any passwords being compromised?

22. Refer to the exhibit. A network administrator is unable to ping H1 from the router and is checking the cabling along the network. Which segment is incorrectly cabled?
Segment A
Segment B
Segment C
*Segment D

23. When does a router enter the setup mode?
when the Cisco IOS is missing in flash
*when the configuration is missing in NVRAM
when the setup command is run from the user mode
when the boot system command is missing in the configuration

24. Which two commands ensure that any password that permits access to the privileged EXEC mode is not shown in plain text when the configuration files are displayed? (Choose two.)
*Router(config)# enable secret cisco
Router(config)# enable cisco
Router(config)# encryption-password all
Router(config)# enable login encrypted
Router(config)# enable password encryption
*Router(config)# service password-encryption

25. What is the effect of issuing the hostname RouterA command on a router?
A description will be configured on the router interfaces identifying them as belonging to RouterA.
The router will attempt to establish a connection to the host with the name RouterA.
The router will map an IP address to the domain name RouterA.
*The router prompt will change from Router(config)# to RouterA(config)#

26. Refer to the exhibit. What is the possible reason that a technician is unable to telnet into the HQ router and make configuration changes?
*A password is required for vty 0.
A password for line con 0 is required.
All five virtual interfaces must be configured before Telnet is possible.
The service password-encryption command is preventing Telnet access.

27. Refer to the exhibit. Which type of link is supported by this interface module?

28. Refer to the exhibit. While configuring the serial interface of a router, the network administrator sees the highlighted error message. What is the reason for this?
The serial interface is administratively down.
The serial interface is already configured with an IP address.
*The network administrator has attempted to configure the serial interface with a broadcast address.
The same IP address has been configured on another interface.

29. Refer to the exhibit. The network administrator has added a route by using the ip route command on R1. Hosts on the network cannot communicate with hosts on the network. What is the reason for this?
The gateway of last resort is not set.
The destination prefix mask is incorrectly configured.
The routing protocol has not been configured on R1.
*The static route has not been configured correctly.

30. A network administrator is planning new cable installations for an automated manufacturing facility. The cabling solution must be scalable and function reliably in an environment subject to electromagnetic interference. Which two cable solutions should the administrator consider? (Choose two.)
*fiber optic

31. In a structured cable system, which term describes the cable that connects the wall jack in the user work area to the patch panel in the wiring closet?
patch cable
vertical cable
*horizontal cable
backbone cable

32. What should be the first step in a structured cable project?
Locate all sources of EMI.
*Obtain an accurate floor plan.
Identify the network backbone.
Design efficient cable management systems.

33. What can be gained by using a caching-only DNS server?
The DNS server will use more WAN bandwidth.
The DNS server will only answer recursive queries.
The DNS server will be authoritative for only one zone.
*The DNS server will resolve most queries more quickly.

34. Refer to the exhibit. Which two statements describe the data conversation shown? (Choose two.)
*The data conversation was started by the HTTP application process running on the client.
The data conversation is identified by TCP port 80 on the client.
The user started the data conversation by sending an e-mail.
The IP address of the Internet server is
*The Internet server will send data to port 8547 on the client.

35. Which statement describes a feature of TCP?
It provides low overhead data delivery.
*It acknowledges the receipt of packets.
It does not provide error checking.
It is a connectionless protocol.

36. Which application can be delivered using UDP?

37. Which statement is correct about passive data connections in the FTP protocol?
The server initiates the data transfer connection.
*The server forwards its IP address and a random port number to the FTP client through the control stream.
The firewalls do not permit passive data connections to hosts that are located within the network.
The client forwards data to port 21 of the server.

38. A hacker attempts to reach confidential information that is stored on a server inside the corporate network. A network security solution inspects the entire packet, determines that it is a threat, and blocks the packet from entering the inside network. Which security measure protected the network?
an IDS
*an IPS
a host-based firewall
Anti-X software

39. For the assignment of permissions to files and folders, what does the "principle of least privilege" imply?
No user has more privileges than any other user.
Permissions to files are given based on seniority.
*Users only have access to resources that are necessary for their jobs.
Users should be given no access to computer resources until they ask.

40. Refer to the exhibit. A new branch office has been added to the corporate network and a new router is to be installed to allow branch office users to access the database server at headquarters. How should the serial 0/0/0 interface of the new branch office router be configured to connect to the headquarters router?
branch_23(config-if)# ip address
branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation hdlc
branch_23(config-if)# ip address
branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation ppp
branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation ppp
branch_23(config-if)# ip address
*branch_23(config-if)# encapsulation ppp
branch_23(config-if)# ip address
branch_23(config-if)# no shutdown

41. What is the default encapsulation for serial interfaces on Cisco routers?
Frame Relay

42. A large company wants to ensure its connection to a remote branch office. The connection must be able to support equally high upstream and downstream traffic. The service provider must also provide an SLA with a guarantee of specific uptime and security. What type of connection best suits the needs of the company?
DSL connection
cable connection
dialup connection
*point-to-point leased line connection

43. Refer to the exhibit. The Transfer > Capture Text feature available through HyperTerminal has been used to capture the running configuration on a router. The startup-configuration has been erased from the router followed by the issuing of the reload command. The startup-config is restored by using the captured file, but all interfaces on the router are shown as administratively down. What could cause this problem?
The enable password was incorrectly entered.
The configuration register was not set to 0x2142.
The enable secret password was incorrectly entered.
*The no shutdown command must be entered under each interface section in the file being sent.
The captured file should have restored the running configuration not the startup configuration.

44. The IT department of a company implements a backup plan which includes a daily backup on Monday through Saturday. Only files that were modified during each day are backed up. Which backup method is being used?
full backup
normal backup
differential backup
*incremental backup

45. Which statement correctly describes an SLA?
It lists the terms of the agreement between the user and the manufacturer of the system.
*It outlines the management, monitoring, and maintenance of a network.
It specifies the software and hardware configurations of a system.
It describes the operation of a system.

Tidak ada komentar:

Posting Komentar