p4s-pdf3
TRANSCRIPT
-
8/13/2019 p4s-PDF3
1/148
1
Topic 5Ciscos Wireless Technologies (12 questions)
-
8/13/2019 p4s-PDF3
2/148
2
-
8/13/2019 p4s-PDF3
3/148
3
-
8/13/2019 p4s-PDF3
4/148
4
-
8/13/2019 p4s-PDF3
5/148
5
-
8/13/2019 p4s-PDF3
6/148
6
-
8/13/2019 p4s-PDF3
7/148
7
-
8/13/2019 p4s-PDF3
8/148
8
Topic 6Identify Network Security (6 questions)
-
8/13/2019 p4s-PDF3
9/148
9
-
8/13/2019 p4s-PDF3
10/148
10
-
8/13/2019 p4s-PDF3
11/148
11
-
8/13/2019 p4s-PDF3
12/148
12
Topic 7NAT and ACLs(37 questions)
-
8/13/2019 p4s-PDF3
13/148
13
-
8/13/2019 p4s-PDF3
14/148
14
-
8/13/2019 p4s-PDF3
15/148
15
-
8/13/2019 p4s-PDF3
16/148
16
-
8/13/2019 p4s-PDF3
17/148
-
8/13/2019 p4s-PDF3
18/148
18
Answer :
-
8/13/2019 p4s-PDF3
19/148
19
-
8/13/2019 p4s-PDF3
20/148
20
-
8/13/2019 p4s-PDF3
21/148
21
-
8/13/2019 p4s-PDF3
22/148
-
8/13/2019 p4s-PDF3
23/148
23
-
8/13/2019 p4s-PDF3
24/148
24
-
8/13/2019 p4s-PDF3
25/148
25
-
8/13/2019 p4s-PDF3
26/148
26
-
8/13/2019 p4s-PDF3
27/148
27
-
8/13/2019 p4s-PDF3
28/148
28
-
8/13/2019 p4s-PDF3
29/148
-
8/13/2019 p4s-PDF3
30/148
30
-
8/13/2019 p4s-PDF3
31/148
31
-
8/13/2019 p4s-PDF3
32/148
32
-
8/13/2019 p4s-PDF3
33/148
33
-
8/13/2019 p4s-PDF3
34/148
34
-
8/13/2019 p4s-PDF3
35/148
35
-
8/13/2019 p4s-PDF3
36/148
36
-
8/13/2019 p4s-PDF3
37/148
37
-
8/13/2019 p4s-PDF3
38/148
38
-
8/13/2019 p4s-PDF3
39/148
39
-
8/13/2019 p4s-PDF3
40/148
40
-
8/13/2019 p4s-PDF3
41/148
41
-
8/13/2019 p4s-PDF3
42/148
42
-
8/13/2019 p4s-PDF3
43/148
43
-
8/13/2019 p4s-PDF3
44/148
44
-
8/13/2019 p4s-PDF3
45/148
45
-
8/13/2019 p4s-PDF3
46/148
46
Topic 8Implement and verify WAN links (26 questions)
-
8/13/2019 p4s-PDF3
47/148
47
-
8/13/2019 p4s-PDF3
48/148
48
-
8/13/2019 p4s-PDF3
49/148
49
-
8/13/2019 p4s-PDF3
50/148
50
-
8/13/2019 p4s-PDF3
51/148
51
-
8/13/2019 p4s-PDF3
52/148
52
-
8/13/2019 p4s-PDF3
53/148
53
-
8/13/2019 p4s-PDF3
54/148
54
-
8/13/2019 p4s-PDF3
55/148
55
-
8/13/2019 p4s-PDF3
56/148
56
-
8/13/2019 p4s-PDF3
57/148
57
-
8/13/2019 p4s-PDF3
58/148
58
-
8/13/2019 p4s-PDF3
59/148
59
-
8/13/2019 p4s-PDF3
60/148
60
-
8/13/2019 p4s-PDF3
61/148
61
-
8/13/2019 p4s-PDF3
62/148
62
-
8/13/2019 p4s-PDF3
63/148
63
-
8/13/2019 p4s-PDF3
64/148
64
-
8/13/2019 p4s-PDF3
65/148
65
-
8/13/2019 p4s-PDF3
66/148
66
-
8/13/2019 p4s-PDF3
67/148
67
-
8/13/2019 p4s-PDF3
68/148
68
-
8/13/2019 p4s-PDF3
69/148
69
Topic 9Network Case (18 questions)
-
8/13/2019 p4s-PDF3
70/148
70
-
8/13/2019 p4s-PDF3
71/148
71
-
8/13/2019 p4s-PDF3
72/148
72
-
8/13/2019 p4s-PDF3
73/148
73
-
8/13/2019 p4s-PDF3
74/148
74
-
8/13/2019 p4s-PDF3
75/148
75
-
8/13/2019 p4s-PDF3
76/148
76
-
8/13/2019 p4s-PDF3
77/148
77
-
8/13/2019 p4s-PDF3
78/148
78
-
8/13/2019 p4s-PDF3
79/148
79
-
8/13/2019 p4s-PDF3
80/148
80
-
8/13/2019 p4s-PDF3
81/148
81
-
8/13/2019 p4s-PDF3
82/148
82
-
8/13/2019 p4s-PDF3
83/148
83
-
8/13/2019 p4s-PDF3
84/148
84
-
8/13/2019 p4s-PDF3
85/148
85
-
8/13/2019 p4s-PDF3
86/148
86
-
8/13/2019 p4s-PDF3
87/148
87
-
8/13/2019 p4s-PDF3
88/148
88
-
8/13/2019 p4s-PDF3
89/148
89
-
8/13/2019 p4s-PDF3
90/148
90
-
8/13/2019 p4s-PDF3
91/148
91
-
8/13/2019 p4s-PDF3
92/148
92
-
8/13/2019 p4s-PDF3
93/148
93
-
8/13/2019 p4s-PDF3
94/148
94
-
8/13/2019 p4s-PDF3
95/148
95
-
8/13/2019 p4s-PDF3
96/148
96
-
8/13/2019 p4s-PDF3
97/148
97
-
8/13/2019 p4s-PDF3
98/148
98
-
8/13/2019 p4s-PDF3
99/148
99
-
8/13/2019 p4s-PDF3
100/148
100
-
8/13/2019 p4s-PDF3
101/148
101
-
8/13/2019 p4s-PDF3
102/148
102
-
8/13/2019 p4s-PDF3
103/148
-
8/13/2019 p4s-PDF3
104/148
104
-
8/13/2019 p4s-PDF3
105/148
105
-
8/13/2019 p4s-PDF3
106/148
106
-
8/13/2019 p4s-PDF3
107/148
107
-
8/13/2019 p4s-PDF3
108/148
108
-
8/13/2019 p4s-PDF3
109/148
109
-
8/13/2019 p4s-PDF3
110/148
110
Topic 10Update (32 questions)
-
8/13/2019 p4s-PDF3
111/148
-
8/13/2019 p4s-PDF3
112/148
112
-
8/13/2019 p4s-PDF3
113/148
113
-
8/13/2019 p4s-PDF3
114/148
114
-
8/13/2019 p4s-PDF3
115/148
115
-
8/13/2019 p4s-PDF3
116/148
116
-
8/13/2019 p4s-PDF3
117/148
117
-
8/13/2019 p4s-PDF3
118/148
118
-
8/13/2019 p4s-PDF3
119/148
119
-
8/13/2019 p4s-PDF3
120/148
-
8/13/2019 p4s-PDF3
121/148
121
-
8/13/2019 p4s-PDF3
122/148
122
-
8/13/2019 p4s-PDF3
123/148
123
-
8/13/2019 p4s-PDF3
124/148
124
-
8/13/2019 p4s-PDF3
125/148
125
-
8/13/2019 p4s-PDF3
126/148
126
-
8/13/2019 p4s-PDF3
127/148
127
-
8/13/2019 p4s-PDF3
128/148
-
8/13/2019 p4s-PDF3
129/148
129
-
8/13/2019 p4s-PDF3
130/148
130
-
8/13/2019 p4s-PDF3
131/148
131
Answer :B DThis question is to examine the differences between RIPv1 and RIPv2.
RIPv1A classful distance vector routing protocol
Does not support VLSM
Routing updates are broadcast
Support auto-summarization.RIPv2
A classless distance vector routing protocol
Support VLSM
Routing updates are multicastSupport manual route summarization.
-
8/13/2019 p4s-PDF3
132/148
132
Answer: BThis question is to examine the use of ACL.
According to the information provided in the exhibit, 172.16.16.0 can reach SVR by using SSH. SVR can reach 172.16.16.0 by using telnet.
So the correct answer is B.
-
8/13/2019 p4s-PDF3
133/148
133
This question is to examine the show version command.
By using the show version command, you can display information such as Cisco IOS software version, hardware platform, flash and
memory size.
So the correct answer is D.
This question is to examine the DHCP-related knowledge.
To display address conflicts found by a Dynamic Host Configuration Protocol (DHCP) server when addresses are offered to the client, use
the show ip dhcp conflict command in privileged EXEC mode.The server uses ping to detect conflicts. The client uses gratuitous Address Resolution Protocol (ARP) to detect clients. If an address
conflict is detected, the address is removed from the pool and the address is not assigned until an administrator resolves the conflict.
The correct answer is A..
-
8/13/2019 p4s-PDF3
134/148
134
This question is to examine the BPDU Guard
To prevent loops from occurring in a network, the PortFast mode is supported only on nontrunking access ports because these portstypically do not transmit or receive BPDUs. The most secure implementation of PortFast is to enable it only on ports that connect end
stations to switches. Because PortFast can be enabled on nontrunking ports connecting two switches, spanning tree loops can occur
because BPDUs are still being transmitted and received on those ports.
The PortFast BPDU guard feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on thatport. When the BPDU guard feature is enabled on the switch, spanning tree shuts down PortFast-configured interfaces that receive BPDUs,
instead of putting them into the spanning tree blocking state. In a valid configuration, PortFast-configured interfaces do not receive
BPDUs. If a PortFast-configured interface receives a BPDU, an invalid configuration exists, such as connection of an unauthorized device.
The BPDU guard feature provides a secure response to invalid configurations because the administrator must manually put the interfaceback in service.So the correct answer is D.
This question is to check the trunking protocol.
IGP is an interior gateway protocol and also a routing protocol, such as OSPF and EIGRP.
802.1q and ISL are trunking protocols which can be used to carry the traffic of multiple VLANs over a single link. ISL is a Cisco proprietaryprotocol.
802.3u (100Base-T) is 100 Mbps Ethernet standard.Andswer B D
-
8/13/2019 p4s-PDF3
135/148
135
This question is to examine the data link layer protocols.
LAPB: Link Access Procedure Balanced for x.25PPP: Point-to-Point Protocol
HDLC: High-Level Data Link Control
Frame-relay and the three protocols above are data link layer protocols. HDLC is the default serial encapsulation protocol.The correct answer is C.
This question is to examine the command show arp.
The show arp command is used to check the corresponding relationship between IP address and MAC address of a device.
So the correct answer is B.
-
8/13/2019 p4s-PDF3
136/148
136
This question is to examine the CDP protocol configuration.
Cisco Discovery Protocol (CDP) is primarily used to obtain protocol addresses of neighboring devices and discover the platform of those
devices.
The cdp run command is used to enable CDP globally on the router.To enable CDP on an interface, use the cdp enable command.The correct answer is C.
This question is to examine the STP protocol.STP (802.1d) is used to prevent Layer 2 loops.
802.1q is a Frame Relay protocol which belongs to VLAN.SAP is a concept of the OSI model.
So the correct answers are A and D.
-
8/13/2019 p4s-PDF3
137/148
137
This question is to examine the concept of the private IP address.
Class A: 10.0.0.0 --10.255.255.255
Class B: 172.16.0.0--172.31.255.255
Class C: 192.168.0.0--192.168.255.255The three classes of addresses shown above cannot be used on the Internet, they can only be used for the interior LAN addressing
scheme. Because of the practical exhaustion of the IPv4 address space, private IP addresses are generated to save the address resources.
The correct answer is C.
This question is to examine the OSI model.
Two hosts are communicating through Internet. The communication process includes encapsulation and de-encapsulation.
From down to top, de-encapsulation is required.
From top to down, encapsulation is required.So the correct answer is C.
-
8/13/2019 p4s-PDF3
138/148
138
This question is to examine the IP addressing scheme.
According to this question, we can know that the real examination point is the valid IP address range of the 192.168.5.32/28 network,which is 192.168.5.33~192.168.5.46.
The correct answer is C.
This question is to examine the static route-related concept.
ip route 172.16.3.0 255.255.255.0 192.168.2.4
This is a static route configuration command. 172.16.3.0 is the destination network, 192.168.2.4 is the next hop.
The administrative distance is not configured, so the default administrative distance is used.The correct answers are A and D.
-
8/13/2019 p4s-PDF3
139/148
139
This question is to examine the Cisco IOS management.
Prior to backing up an IOS image to a TFTP server, the following actions should be taken:
Ensure the accessibility between the TFTP server and the device.Use the show version command to examine the IOS information to ensure that the network server has adequate space for the IOS image.
So we choose A, C, D.
This question is to examine the trace route command.When checking the network connectivity, we often use the ping command or the trace route command. And the trace route command can
also trace the network path of Internet routers that packets take as they are forwarded from your computer to a destination address.The correct answer is C.
-
8/13/2019 p4s-PDF3
140/148
140
This question is to examine the network addressing scheme.
When designing a network, Cisco recommends three layers structure: Core Layer, Convergence Layer and Access Layer. IP addresses willbe assigned to different subnets.
The benefits by doing this are: ease of management and troubleshooting, reducing routing table entries and router's burden after
continuous IP addresses are summarized.The correct answers are A and D.
This question is to examine QoS.
Quality of Service is a network security mechanism, which is used to resolve the network delay problem. This mechanism is essential to
multimedia application. When the network is overloaded, QoS will prevent a possible delay in the important data transmission and ensure
the efficient operation of the network.
The correct answer is B.
-
8/13/2019 p4s-PDF3
141/148
141
This question is to examine the OSI reference model.
The Application layer is responsible for identifying and establishing the availability of the intended communication partner and determining
whether sufficient resources for the intended communication exist.The correct answer is D.
This question is to examine the use of NAT.
A global address pool is defined here.
ip nat pool pool_name start-ip end-ip IP prefix-length number
According to this question, the subnet mask is /21.The correct answer is A.
-
8/13/2019 p4s-PDF3
142/148
142
This question is to examine the show ip arp command.
To display the Address Resolution Protocol (ARP) cache, where SLIP addresses appear as permanent ARP table entries, use the show iparp EXEC command.
Age in minutes of the cache entry. A hyphen (-) means the address is local.The correct answer is B.
This question is to examine the concept of the distance vector routing protocol.After a distance-vector routing protocol is started on each router, the routing tables are updated with all route information gathered from
neighbor routers and send periodic updates regardless of topology changes. For example, RIP updates are sent every 30 seconds by
default. The correct answers are A and D.
-
8/13/2019 p4s-PDF3
143/148
143
This question is to examine the ARP working principle.When Host A doesn'tknowthe MAC address of Host B,the ARP request will be broadcast so that all hosts on the LAN can see this
request. If the IP is not local,the router will check its routing table to see whether there is a route to the destination network.If there is
,the router will reply with its own MAC address.
So C is correct.
This question is to examine the MAC address structure.The MAC address is expressed as a 48-bit hexadecimal number. The first 24-bit number is to identify the vendor/manufacturer, also calledOUI. The latter 24-bit is assigned by the vendor.The correct answer is C.
-
8/13/2019 p4s-PDF3
144/148
-
8/13/2019 p4s-PDF3
145/148
145
This question is to examine the layer 2 port security.According to the exhibit, we know that the port security is configured to restrict the interface in the event of a violation. So A is wrong.
The port security should be enabled on the interface, not globally.So the correct answers are B and D.
-
8/13/2019 p4s-PDF3
146/148
146
This question is to examine the IP addressing scheme.In the serial port network, only two IP addresses can be assigned. In order to save IP addresses, we often use the /30 subnet mask.
So the correct answer is D.
-
8/13/2019 p4s-PDF3
147/148
-
8/13/2019 p4s-PDF3
148/148