revision for final exam 4

29
Take Assessment - DCompNtwk Practice Final - CCNA Discovery: Designing and Supporting Computer Networks (Version 4.0) 1 In configuring CHAP authentication for PPP, what is important to know about the format of usernames and passwords? Only the passwords are case sensitive. The usernames and passwords are case sensitive. Neither the usernames nor the passwords are case sensitive. The usernames are case sensitive but the passwords are not. 2 Refer to the exhibit. A NetworkingCompany designer is reviewing a diagram of a customer network. What two or issues can be identified in the topology that is shown? (Choose two.) The firewall router and ISP connection represent a single point of failure. A failure of the switch that connects the Cisco Call Manager to the network will cause the entire IP telephony system to fail. Using Layer 3 switches to interconnect the data center servers to the IP phones introduces too much d The IP phones need to be redundantly connected to the switches to prevent single points of failure at access layer. If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable. 3 What is a benefit of using CIDR to summarize multiple classful networks into a single network? It reduces the number of entries in routing tables. It allows RIPv1 to function as a classless routing protocol.

Upload: shahid-shah

Post on 07-Sep-2014

151 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Revision for Final Exam 4

Take Assessment - DCompNtwk Practice Final - CCNA Discovery: Designing and Supporting Computer Networks (Version 4.0)

1 In configuring CHAP authentication for PPP, what is important to know about the format of usernames and passwords?

Only the passwords are case sensitive.

The usernames and passwords are case sensitive.

Neither the usernames nor the passwords are case sensitive.

The usernames are case sensitive but the passwords are not.

2

Refer to the exhibit. A NetworkingCompany designer is reviewing a diagram of a customer network. What two risks or issues can be identified in the topology that is shown? (Choose two.)

The firewall router and ISP connection represent a single point of failure.

A failure of the switch that connects the Cisco Call Manager to the network will cause the entire IP telephony system to fail.

Using Layer 3 switches to interconnect the data center servers to the IP phones introduces too much delay.

The IP phones need to be redundantly connected to the switches to prevent single points of failure at the access layer.

If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable.

3 What is a benefit of using CIDR to summarize multiple classful networks into a single network?

It reduces the number of entries in routing tables.

It allows RIPv1 to function as a classless routing protocol.

It allows the routing protocol to define a more accurate best path selection.

It increases the amount of information transmitted in routing protocol updates.

Page 2: Revision for Final Exam 4

4 When designing a prototype network for a new server farm, a network designer chooses to use redundant links to connect to the rest of the network. Which business goal will be addressed by this choice?

security

scalability

availability

manageability

5 A router has been removed from the network for maintenance. A new Cisco IOS software image has been successfully downloaded to a server and copied into the flash of the router. What should be done before placing the router back into service?

Back up the new image.

Copy the running configuration to NVRAM.

Delete the previous version of the Cisco IOS software from flash.

Restart the router and verify that the new image starts successfully.

6 A company has an IT staff that is not highly trained. What two features or technologies must the network designer identify as training needs in order for the staff to understand the basic operation of VPNs? (Choose two.)

access control lists

encryption algorithms

Frame Relay configuration

QoS operation

tunneling protocols

VLAN configuration

7 What is meant by "tunneling" in the context of migrating from IPv4 to IPv6?

obtaining IPv6 addresses from an IPv4 DHCP server

allowing both protocol stacks to run on the same network device

encapsulating one protocol packet within another protocol

enabling direct communication between hosts that use different versions of the IP protocol

8 During a review of the proposed bill of materials, the ABC Networking Company account manager realizes that the systems engineer included a lower cost, less capable switch model for the access layer connectivity than was specified by the network designer. When questioned, the systems engineer responds that the switches that were recommended by the designer cannot be purchased within the budget limitations of the customer. Which action should the account manager take?

Inform the customer that the project cannot be completed given the unreasonable budget constraints.

Communicate any risks that are associated with the equipment substitution and obtain customer approval to proceed.

Because the customer is probably aware that the budget limitations will require lower cost, less capable equipment, the account manager should do nothing.

Inform the customer that the project budget must be increased.

9 A school district decides to use the 172.30.0.0/16 network for its LAN networks. The network administrator must create an addressing scheme to support 500 users in the admin office, 200 at the high school, 60 at the elementary school and 28 at the district office. Which VLSM addressing scheme will correctly address the network with minimal waste?

172.30.0.0/20 admin172.30.1.0/21 high school172.30.1.8/22 elementary172.30.1.12/26 district172.30.0.0/22 admin172.30.4.0/23 high school172.30.5.0/24 elementary172.30.6.0/26 district172.30.0.0/23 admin172.30.2.0/24 high school172.30.3.0/26 elementary172.30.3.64/27 district172.30.0.0/23 admin172.30.2.0/24 high school172.30.3.0/25 elementary 172.30.3.127/26 district

10 A customer has asked a network engineer to prototype the new IP addressing and summarization strategy for a large, multisite network implementation.

Page 3: Revision for Final Exam 4

Which tool is appropriate for testing the complete addressing scheme?

Cisco SDM

network simulation tool

actual network equipment in a lab

current network of the customer

11 What can be broadcast over the wireless network to help a user connect to the network and use wireless services?

SSID

WPA encryption keys

voice VLAN parameters

IP address of the access point

management VLAN parameters

12

Refer to the exhibit. A network associate is configuring a new router to provide routing between VLANs. The associate removes the router from the box and connects the Fa0/0 interface to a trunking port on the switch. After the configuration is applied to the router, the traffic between VLANs still fails. What is causing this to occur?

The router needs a routing protocol configured.

The router needs additional Fast Ethernet interfaces installed.

The subinterfaces of the router should have IP addresses applied.

All the subinterfaces of the router should be configured in the same VLAN.

The subinterfaces must be the same value as the VLAN ID that they are routing for.

13

Page 4: Revision for Final Exam 4

Refer to the exhibit. What is the purpose of this configuration?

auditing the network traffic with NBAR

monitoring the network traffic with NetFlow

capturing network traffic to send to a syslog server

applying the named ACLs egress and ingress to the Ethernet interfaces

14 A company has just transitioned from traditional telephony to an IP Telephony solution for their voice requirements. What statement describes a characteristic of the new system?

connects through a PBX to the PSTN

replaces a digital system with an analog one

combines data and voice into a converged network

requires manual configuration for adding, moving or changing phones

enables web applications and phone directories to be available to every PC on the network

15 What is a characteristic of voice traffic in a converged network?

It is assigned secondary priority to data traffic.

It is processed in real time and cannot be retransmitted.

It consists of large packets with long, irregular data flows.

It uses the error-checking features of TCP to ensure good voice quality.

Showing 1 of 4 <Prev Page:

Next>

Close Window

All contents copyright 1992-2012 Cisco Systems, Inc. Privacy Statement and Trademarks.

1

1

Page 5: Revision for Final Exam 4

Close Window

Assessment System

1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - DCompNtwk Practice Final - CCNA Discovery: Designing and Supporting Computer Networks (Version 4.0)

Time Remaining: 4070884

01:07:51

Page 6: Revision for Final Exam 4

16 What are two suggested best practices to implement when securing network devices? (Choose two.)

Configure VLAN 1 as the native VLAN.

Disable unused ports on switches.

Enable SSH and disable Telnet.

Consolidate guest traffic and internal employee traffic.

Ensure that logs are stored locally on routers.

17

Refer to the exhibit. The routers are configured with RIPv2 with default configurations. When attempting to communicate with other networks, hosts from 10.0.11.0/24 are experiencing connectivity issues. What could be done to resolve this issue?

Change to a public IP addressing scheme.

Use EIGRP with its default configuration as the routing protocol.

Change the subnet mask on the link between R2 and R3 to 255.255.255.0.

Disable automatic route summarization on all routers in the network.

18 To reduce unwanted incoming traffic from the outside, a network technician is tasked with establishing the filtering rules for the network firewall. Which traffic should be allowed?

incoming ICMP traffic

all incoming connections to internal servers

incoming responses to traffic that is generated from the inside

incoming connections from the outside that duplicate inside addresses

19

Page 7: Revision for Final Exam 4

Refer to the exhibit. Based on the show cdp neighbors detail command, which interface on Switch1 is connected to Router1?

FastEthernet0/1

FastEthernet0/2

Serial0/0

Serial0/0/1

20 A network administrator is determining which network address can be assigned to a new remote site with thirty-one users. The logical topology documentation is referenced and it is concluded that the 172.24.32.0/19 and 172.24.128.0/25 address blocks are available. Which network address could be assigned to the new remote site while wasting the fewest addresses?

172.24.32.0/27

172.24.48.0/26

172.24.64.64/26

172.24.128.64/27

172.24.160.32/27

172.24.192.0/26

21 The main office of a NetworkingCompany customer currently connects to three branch offices via three separate point-to-point T1 circuits. The customer network uses RIPv2 as the routing protocol within both the LAN and the WAN. The account manager proposes a change to a Frame Relay network because the costs are lower. A single local loop connection can be installed at the main office with three separate PVCs to connect the branch offices. How can the main office edge router be configured to enable the customer to continue to use RIP as the WAN routing protocol?

Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote routers.

To prevent the Frame Relay network from causing a routing loop, disable split horizon on the serial interface.

Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP address to each one.

Configure the serial interface with a single interface DLCI number and create frame-relay map statements for each remote site address.

22 What is the main purpose of the access layer in a hierarchically designed network?

perform routing and packet manipulation

supply redundancy and failover protection

Page 8: Revision for Final Exam 4

provide a high-speed, low-latency backbone

serve as a network connection point for end-user devices

23 Which IOS command can a network designer use to help document the active routing status of an existing network?

show vlan

show ip route

show running-config

show cdp neighbors detail24 What best describes the function of QoS in data networks?

prioritizes data traffic over all other types of traffic

increases bandwidth on a link to ensure voice quality

provides preferred service to specified network traffic

automatically assigns the highest priority to web and database traffic

25 After a WIC is installed in a two-slot router, the network engineer issues the show running-config command, but the newly installed interfaces in the WIC cannot be seen in the router output. What is a possible reason why the newly installed interfaces are not shown?

The new interfaces are in a shutdown state.

The WIC was put into slot 0 instead of slot 1.

The WIC was not pushed completely into the slot.

The show running-config command cannot be used to validate the presence of installed interfaces.

26 While configuring a router with EIGRP, a technician enters the EIGRP command:

Router(config-router)# variance 3

What is the effect of entering this command?

It enables unequal cost load balancing.

It adjusts the cost of all EIGRP routes to 3.

It restricts the number of EIGRP feasible successor routes to 3.

It enables EIGRP equal cost load balancing over a maximum of 3 routes.

27 A small bookstore would like to offer wireless connectivity for customers with laptops. Which wireless components or devices will provide connectivity to the Internet for the customers with the least possible cost to the bookstore?

wireless LAN controllers

standalone access points

wireless network cards for an ad hoc WLAN

lightweight access point and wireless LAN controller

28 A network designer must select a routing protocol for the network of a customer. The currently installed network contains both Cisco and non-Cisco routers, and there is no budget to replace them. The designer plans on implementing both VLSM and route summarization in the new network design. Which two protocols can provide the necessary functionality for this LAN? (Choose two.)

RTP

RSTP

RIPv1

RIPv2

EIGRP

OSPF

29

Page 9: Revision for Final Exam 4

Refer to the exhibit. What result can be expected for STP in VLAN1?

DSW1 is the root bridge. DSW3 would become root upon failure of DSW1.

DSW2 is the root bridge. DSW3 would become root upon failure of DSW2.

DSW3 is the root bridge. DSW1 would become root upon failure of DSW3.

DSW3 is the root bridge. DSW2 would become root upon failure of DSW3.

30 A network administrator needs to transfer an IOS image to a router using a TFTP server. What should be verified prior to beginning the transfer process?

The TFTP server must connect to the router via a serial connection.

Connectivity between the TFTP server and the router should have been established.

The TFTP server and the router must be on different networks for the transfer.

The TFTP server software must be the same version as the Cisco IOS software.

Showing 2 of 4 <Prev Page:

Next>

Close Window

All contents copyright 1992-2012 Cisco Systems, Inc. Privacy Statement and Trademarks.

2

2

Page 10: Revision for Final Exam 4

Close Window

Assessment System

1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - DCompNtwk Practice Final - CCNA Discovery: Designing and Supporting Computer Networks (Version 4.0)

Time Remaining:

31

4016417

01:06:57

Page 11: Revision for Final Exam 4

Refer to the exhibit. A customer has a problem with connectivity in the network. Based on the IP addressing scheme, what is causing the problem?

The WAN link that connects R1 to R3 has an incorrect mask.

The WAN links need IP addresses from a different major network.

The WAN link that connects R1 to R2 overlaps with the R3 LAN.

The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM.

32 During prototype testing, a LAN switch fails. As the switch re-initializes using the default parameters, a port that has a PC attached transitions to the forwarding state within one second. What protocol would support this feature?

STP

RIP

BGP

VTP

RSTP

33 What is the result of implementing a Frame Relay service with a CIR value of zero?

Data will not cross the Frame Relay WAN.

All frames that enter the Frame Relay WAN will be marked as DE.

Only frames that exceed the local access rate will be marked as DE.

CIR is disabled, which allows all data traffic to pass through the Frame Relay WAN.

34 What supports the ability of streaming video to be sent to a group of viewers simultaneously without congesting the entire network?

traffic queues

multicast

multiple Layer 4 sessions

high priority from QoS

35 Which IOS component can be used for classification and protocol discovery of network traffic and applications in use?

CDP

NBAR

ACL logging

Network Assistant

36 When should a network designer specify that a dedicated firewall appliance be used at the perimeter of the network rather than a router with a Cisco IOS

Page 12: Revision for Final Exam 4

software-based firewall feature set?

There are multiple servers in the DMZ.

The network is large in size and network traffic can overload the device.

Traffic filtering is needed on the internal network.

Multiple levels of access to the network are needed.

37 A configuration file needs to be loaded into the RAM of a router from a TFTP server. What should an administrator know before accomplishing this task?

the router IP address and the operating system that is used by the TFTP server

the TFTP server IP address and the name of the configuration file on the server

the router IP address and the name of the router configuration file in NVRAM

the TFTP server IP address and the value of the configuration register on the router

38

Refer to the exhibit. An extended ACL has been created to deny traffic from the 192.168.30.0/24 network to the web server with IP address 209.165.201.30. According to Cisco best practices, where should the ACL be applied?

R3 Fa0/0 inbound

R3 S0/0/1 outbound

R2 S0/0/1 inbound

ISP Fa0/0 outbound

39 An HWIC-4ESW, four-port switch module needs to be installed in a Cisco 1841 router that currently has a WIC-2T module in slot 0. What should the network technician do first?

Install the hot-swappable option module.

Turn off the power to the router before installing the new module.

Remove the WIC-2T module so that the new module can be installed in slot 0.

Shut down all Fast Ethernet ports on the router until the switch module installation is complete.

Configure the Cisco IOS software to support an internal trunk link between the switch and router module.

40 While troubleshooting a Frame Relay link, the network administrator executes the show ip interface brief command on both sides of the PVC link. All interfaces show a configured IP address and that the line protocol is up. Further investigation reveals that the IP address of the remote router does not appear in the Frame Relay table. Which step would solve this problem?

Change the LMI type on the local router.

Verify that the DLCI number is the same on both sides of the PVC.

Page 13: Revision for Final Exam 4

Configure the router using the frame-relay map ip command.

Verify that the remote router has Frame Relay encapsulation enabled.

41

Refer to the exhibit. Before the encapsulation was changed to Frame Relay, the administrator verified physical connectivity by successfully pinging the remote router. After the encapsulation was changed, the administrator attempted to ping the remote router on the Frame Relay circuit but was not successful. A show frame-relay pvc command was issued. What could be the problem?

The DLCI is incorrect.

The IP address is incorrect.

The interface needs to be re-enabled after the encapsulation is changed.

The network is not included in the routing table.

42 Which protocol allows redundant Layer 2 links without switching loops?

DHCP

HSRP

MPLS

RSTP

43

Refer to the exhibit. A network technician wishes to allow all traffic to internal LANs except traffic from network 10.0.0.0/10 that enters the router on its leased-line Internet connection. What will be apparent once these commands are entered into the router?

The wild card mask is wrong.

The required objective will have been achieved.

The access-list is applied in the wrong direction.

All traffic that enters the router on s0/0/0 will be blocked.

44 A web-based retail company is considering updating its WAN connection with new technologies that are offered by the ISP. What testing platform should be used by the network team of the company to validate the performance and capacity of the new technology using real world data?

pilot

prototype

emulation software

simulation software

45

Page 14: Revision for Final Exam 4

Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of an access layer switch and connects three PCs to test the configuration. The engineer attempts to ping from each PC to the other connected PCs. Which three statements describe the expected results of pinging from one host to another? (Choose three.)

Host 1 can ping Host 2.

Host 1 cannot ping Host 2.

Host 2 cannot ping Host 3.

Host 3 can ping Host 1.

Host 3 can ping Host 2.

Host 3 cannot ping Host 1.

Showing 3 of 4 <Prev Page:

Next>

Close Window

All contents copyright 1992-2012 Cisco Systems, Inc. Privacy Statement and Trademarks.

Close Window

3

3

Page 15: Revision for Final Exam 4

Assessment System

1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - DCompNtwk Practice Final - CCNA Discovery: Designing and Supporting Computer Networks (Version 4.0)

Time Remaining:

46 What are two accurate descriptors of a DLCI? (Choose two.)

Frame Relay Layer 2 address

one DLCI allowed per local loop

locally significant circuit endpoint

signaling standard between DTE and DCE

establishes the data transfer rate through a Frame Relay network

47 Which component in a Frame Relay WAN would set the BECN bit in the Frame Relay header if congestion is experienced?

source DTE device

Frame Relay switch

destination DTE device

router through which communication was first initiated

48 What is the advantage of choosing EasyVPN for a new VPN implementation?

to provide encryption algorithms unavailable in other systems

to ensure that remote workers actually use the VPN for connectivity

to allow a greater variety of network devices to be used for VPN connections

to simplify the configuration tasks for the device that is used as the VPN server

49

3984279

01:06:25

Page 16: Revision for Final Exam 4

Refer to the exhibit. A pre-sales system engineer receives a diagram of the current WAN from a customer. EIGRP is the routing protocol that is used on the WAN. Based on the default operation of EIGRP, which statement is true about the routing table on router RE?

There is a single route to the 172.18.20.0/24 LAN via the T1 connection.

There is a single route to the 172.18.20.0/24 LAN via the DSL connection.

EIGRP installs all three routes to the 172.18.20.0/24 LAN and load balances the traffic.

There is a single route to the 172.18.20.0/24 LAN via the 10 Mb Ethernet connection.

50 What are two advantages of using Layer 3 devices instead of Layer 2 switches at the distribution layer of a hierarchical network? (Choose two.)

allows connectivity between different VLANs

provides reliable connectivity to the end user

reduces the number of required redundant links

results in fewer IP subnets to configure and manage

enables traffic filtering that is based on subnet addresses

Showing 4 of 4 <Prev Page:

Next>

Close Window

All contents copyright 1992-2012 Cisco Systems, Inc. Privacy Statement and Trademarks.

Take Assessment – DCompNtwk Final Exam – CCNA Discovery: Designing and Supporting Computer Networks (Version 4.0) – Answers – 2011 – 2012

1. Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of an access layer switch and connects three PCs. The engineer attempts to ping from each PC to the other connected PCs to test the configuration.

4

4

Page 17: Revision for Final Exam 4

Which statement describes the result of the last step?Host 1 can ping Host 2.Host 1 can ping Host 3.Host 2 can ping Host 3.No hosts can ping any other host.

2. Refer to the exhibit. Based on the EIGRP configuration that is shown, what can the field engineer conclude about the EIGRP authentication between RouterA and RouterB?Authentication will fail because only one key is configured.Authentication will fail because the key chain names do not match.Authentication will succeed and EIGRP updates can be exchanged.Authentication will fail because the key chain names must match the router names.

3. What is a characteristic of FTP traffic flows?low-volume trafficpredictable bandwidth usagelarge packet sizes for transferslow throughput with high response-time requirements

4. If a router is unable to find a suitable IOS to load into RAM, in what mode does the boot process end?setup modeuser moderommon modeprivileged mode

5. In a converged network, which two types of traffic would be categorized as real-time traffic? (Choose two.)e-mailfile transferweb browsingvideoconferencingvoice over IPvideo on demand

6. A company uses the Frame Relay network to establish a VPN connection between headquarters and the branch office. The company wants to add a backup link in case the Frame Relay connection fails. The backup link will use the business DSL connection through another ISP. How should the router be configured to include the backup link?Create a static route with the administrative distance of 1.Create a floating static route.Add a new route to the routing protocol configuration.Create a second default route for the backup path.

7. Refer to the exhibit. What is the spanning-tree role of all the enabled interfaces of SW11?alternatebackup

Page 18: Revision for Final Exam 4

designatedroot

8. A WIC-1T module needs to be installed in a Cisco 1841 router that currently has a WIC-2T module in slot 0. What should the network technician do first?Install the hot-swappable option module.Turn off the power to the router before installing the new module.Remove the WIC-2T module so that the new module can be installed in slot 0.Shut down all Fast Ethernet ports on the router until the new WIC module installation is complete.Configure the Cisco IOS software to support an internal trunk link between the two WIC modules.

9. During prototype testing, a LAN switch fails. As the switch re-initializes using the default parameters, a port that has a PC attached transitions to the forwarding state within one second. What protocol would support this feature?STPRIPBGPVTPRSTP

10. What are two accurate descriptors of a DLCI? (Choose two.)Frame Relay Layer 2 addressone DLCI allowed per local looplocally significant circuit endpointsignaling standard between DTE and DCEestablishes the data transfer rate through a Frame Relay network

11. A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. The technician asks the caller to talk to nearby users to see if other machines are affected. The caller reports that several immediate neighbors in the same department have a similar problem and that they cannot ping each other. Those who are seated in other departments have connectivity. What should the technician check as the first step in troubleshooting the issue?the power outlet to the PC that is used by the caller.the trunks between switches in the wiring closet.the status of the departmental workgroup switch in the wiring closet.the cable that connects the PC of the caller to the network jack.the cable connection between a PC and a network outlet that is used by a neighbor.

12. A NetworkingCompany engineer is on a support call resolving technical problems for a client network. After the issue is resolved, the engineer also provides a training session for the network support staff. What role is the engineer filling on the networking company team?post-sales field engineerpre-sales engineernetwork designeraccount manager

Page 19: Revision for Final Exam 4

13. Refer to the exhibit. The network administrator has used the Cisco Feature Navigator to choose a Cisco IOS image to install on a router. Given the exhibited output of the show version command, which statement is true about the capacity of the router to use this Cisco IOS image?There is enough DRAM and flash.There is not enough DRAM and flash.There is enough DRAM but not enough flash.There is not enough DRAM but enough flash.

14. Refer to the exhibit. The named ACL “Managers” already exists on the router. What will happen when the network administrator issues the commands that are shown in the exhibit?The commands overwrite the existing Managers ACL.The commands are added at the end of the existing Managers ACL.The commands are added at the beginning of the existing Managers ACL.The network administrator receives an error that states that the ACL already exists.

15. Refer to the exhibit. A company with four servers in its server farm has not enabled PVRST on the switches that connect to the server farm segment. What will happen within the network if a primary link goes down?Access to the the servers will be lost.Convergence time will be slow and possibly cause applications to time out.Routing protocols will not send the triggered updates in the event of a failure of the root bridge.Switches that connect the servers to the network will not be found by other switches in the network.

16. What type of ACL permits outbound traffic, but permits inbound traffic only if it is a response to the traffic that is initiated from inside the network?DynamicReflexiveStandardExtendedtime-based

17. A network administrator has configured Frame Relay on a serial interface and issued the show interfaces serial command. The output shows that the interface is up and the line protocol is up. However, pings to the remote router across the link fail. What should the next step be to ensure that the IP address of the remote router appears in the Frame Relay map table of the local router?Configure the router using the no inverse-arp command.Ensure that the LMI type is correct for the circuit.Configure the router using the frame-relay map ip command.Verify that the remote router has Frame Relay encapsulation enabled.

18. Refer to the exhibit. A pre-sales systems engineer receives a diagram of the exhibited WAN implementation from a customer. EIGRP is the routing protocol that is used on the WAN. None of the parameters for EIGRP metric calculation have been modified in any router configurations. Which statement is true about the routing table on router RM?

Page 20: Revision for Final Exam 4

There is a single route to the 192.168.24.0/24 LAN using the T1 connection.There is a single route to the 192.168.24.0/24 LAN using the DSL connection.There is a single route to the 192.168.24.0/24 LAN using the Metro Ethernet connection.EIGRP installs all three routes to the 192.168.24.0/24 LAN and load balances the traffic.

19. Refer to the exhibit. A network administrator is configuring a new router to provide routing between VLANs. The administrator removes the router from the box and connects the Fa0/0 interface to a trunking port on the switch. After the configuration is applied to the router, as shown in the exhibit, the traffic between VLANs fails. What is causing this to occur?The R1 router needs a routing protocol configured.The subinterfaces of the R1 router should have IP addresses applied.The R1 router needs three additional Fast Ethernet interfaces installed.The subinterfaces of the R1 router should be configured in the same VLAN.

20. A bank is planning to add a secure, authenticated WAN connection to a rural branch office. The connection must provide bandwidth of up to 10 Mb/s with QoS supporting VoIP. Which WAN connection type should the network designer recommend?DSLISDNleased lineFrame Relay

21. A company has branch offices at several locations across the country. Which security implementation would provide a cost-effective, secure, and authenticated connection to centralized internal resources that are located at company headquarters, without requiring configuration for individual employees at the branch offices?leased line with PPP authenticationsite-to-site VPNaccess control listremote-access VPN

22. Refer to the exhibit. An extended ACL has been created to deny traffic from the 192.168.35.0/24 network to the web server with IP address 209.165.201.15. According to Cisco best practices, where should the ACL be applied?RTB Fa0/0 inboundRTC S0/0/1 inboundRTD Fa0/0 outboundRTC S0/1/0 outbound

23. Refer to the exhibit. Which EIGRP configuration commands should a network administrator enter on router R1 to correctly advertise a single summary route to router MAIN for the campus LAN?

24. Refer to the exhibit. What is an accurate description of the first neighbor that is displayed in the output?24 port 2950 switch with a non-default native VLAN24 port 2950 switch that is connected to Fa0/0 on Router1

Page 21: Revision for Final Exam 4

24 port 2950 switch that is assigned to the administrator-defined VTP domain24 port 2950 switch with interface GigabitEthernet0/1 that is operating at 1000 Mb/s

25. During prototype testing, the network designer performs a test to determine the ability of the network to recover from a link or device failure. Which design goal is validated if the test is a success?scalabilitymanageabilityavailabilitysecurity

26 A network designer has chosen to specify the use of a dedicated firewall appliance at the perimeter o a large network. Why would the designer use a dedicated firewall rather than using the Cisco IOS firewall feature set on the existing router?Traffic filtering is needed on the internal LAN.Multiple levels of access to the network are needed.The DMZ requires packet filtering and port blocking.Heavy network traffic will be handled best by using a dedicated device.

27. A company has help desk staff that is not highly trained in VPNs. What two features or technologies must the network designer identify as training needs in order for the help desk to support secure remote access for teleworkers? (Choose two.)QoS operationVLAN configurationtunneling protocolsIPv6 and IPv4 dual stackencryption algorithmsFrame Relay configuration

28. What is a function that is associated with the access layer in a hierarchically designed network?performs routing and packet manipulationsupplies redundancy and failover protectionprovides a high-speed, low-latency backboneserves as a network connection point for IP telephony devices

29. A network engineer is prototyping a new IP addressing and summarization strategy for a new network that will be integrated into the existing infrastructure. Which method is appropriate for testing the addressing scheme?using the production network of the customerusing actual network equipment in a labusing the Cisco Network Assistantusing a network simulation tool

30. At the distribution layer of a hierarchical network, what are two advantages of using Layer 3 devices instead of Layer 2 switches? (Choose two.)provides reliable connectivity to end userscreates fewer IP subnets to configure and managereduces the number of redundant links required

Page 22: Revision for Final Exam 4

provides connectivity between different VLANsenables traffic filtering based on subnet addresses

31. Refer to the exhibit. Access list 100 is applied inbound to interface serial 0/0/0 on the SOHO Router1. Which traffic will be denied by the configuration?DNS traffic from host A to the InternetFTP traffic from host A to the InternetICMP traffic from the ISP to server 1traffic from the ISP to the server on port 23

32. What supports the ability of streaming video to be sent to a group of viewers simultaneously without congesting the entire network?traffic queuesmulticastmultiple Layer 4 sessionshigh priority from QoS

33. What functionality does NBAR provide to network technicians?provides data which can be used to create a network diagramallows for monitoring and managing network devicesallows for classification and monitoring of network trafficdisplays the IOS versions and IP addresses on neighboring devices

34. When implementing a security policy, which two actions should be included as part of the security checklist? (Choose two.)Disable all logging.Enable Telnet on TCP port 23.Use HTTP for web administration.Set timeouts and ACLs on VTY lines.Shut down any unused ports and interfaces.

35. Refer to the exhibit. The routers are configured with RIPv2 with default configurations. When attempting to communicate with other networks, hosts from 172.16.2.0/24 are experiencing connectivity issues. What could be done to resolve this issue?Change to a public IP address scheme.Disable automatic route summarization.Change the IP network address on R3 Fa0/0 to 172.16.1.128 /26.Change the subnet mask on the link between R2 and R3 to 255.255.255.0.

36. Refer to the exhibit. A customer has a problem with connectivity in the network. Based on the IP addressing scheme, what is causing the problem?The WAN links need IP addresses from a different major network.The WAN link that connects R1 to R2 overlaps with the R3 LAN.The WAN links that connect R1 to R3 and R1 to R2 have incorrect masks.The R1 LAN is incorrect because subnet zero cannot be used with VLSM.

37. The network designer recommends using RSTP in the design of a new data center. There are multipl redundant Layer 2 switches and links contained in the new design. What is the benefit of using RSTP rather than STP in this situation?

Page 23: Revision for Final Exam 4

Redundant links are not blocked.Routing tables converge more quickly.Spanning Tree convergence times are reduced.Fewer redundant links are required to maintain connectivity.

38. What can be broadcast over the wireless network to help a user connect to the network and use wireless services?SSIDWEP keysVLAN parametersWPA encryption keysVPN authentication information

39. Refer to the exhibit. A new host needs to be connected to the switch and be assigned to VLAN 2. Router RA is attached to the switch via a trunk and is configured as shown. What IP address should be assigned to this new host?192.168.1.1 /26192.168.1.22 /28192.168.1.32 /28192.168.1.44 /28192.168.1.47 /28192.168.1.55 /28

40. Refer to the exhibit. A technician at the ISP site asks the network administrator at the client site to change the CHAP password as part of the routing security maintenance. After the administrator makes the change and reboots the router, the technician issues a show interfaces serial 0/0/0 command. According to the output, what can be concluded about the serial connection between the client site and ISP site?The router at the client site is still in the process of rebooting.The administrator probably configured the wrong password.The administrator has not issued a no shut command on the serial interface.The administrator probably configured the wrong IP address for the serial interface.

41. A network administrator of a middle-sized company is asked to upgrade the routing protocol of the network to support VLSM and route summarization. The current company network contains both Cisc and non-Cisco routers. Which routing protocol should be used for the upgrade?BGPRIPv1RIPv2EIGRP

42 Which two technologies can provide data integrity in a VPN connection? (Choose two.)ESPDESMD5DH1SHA-1

Page 24: Revision for Final Exam 4

43. A company establishes a Frame Relay connection between corporate headquarters and a branch office. The CIR for the connection is set at 4 Mb/s. Which statement is true about this WAN connection?The company will not be able to send data faster than 4 Mb/s.If the company sends data faster than 4 Mb/s, some of the data frames will be flagged with a DE bit.If the company sends data faster than 4 Mb/s, the TSP will change the CIR to zero.When the company sends data faster than 4 Mb/s, the Frame Relay switch will set the BECN bit t 1 on the frames that are headed to the company.

44. Which two statements are true about the enhancements IPv6 has over IPv4? (Choose two.)IPv6 does not support broadcasts.IPv6 uses a simplified header structure.IPv6 does not require private addresses.IPv6 uses fixed length address strings.IPsec for IPv6 is not compatible with IPsec for IPv4.

45. As part of network monitoring, a network administrator receives an alert that the CPU usage of the core router reaches 90% several times a day. Which protocol is in use to monitor the network performance?DNSSNMPSMTPDHCPTFTP

46. A company plans to establish Frame Relay connections between corporate headquarters and severa branch offices. The network designer recommends using one physical interface on the edge router to support the new Frame Relay connections. The company currently uses RIPv2 for routing and plans no changes to the RIPv2 configuration. What should be done to ensure that each branch office link is a separate subnet and that routing updates are successful between corporate headquarters and the branch offices?Configure multipoint subinterfaces on the physical interface.Configure point-to-point subinterfaces on the physical interface.Configure a single subinterface to establish multiple PVC connections.Configure the physical interface to share one DLCI to multiple remote sites and their connections.

47. The network infrastructure at the headquarters of an organization consists of Cisco network devices that are running RIPv1. As part of an upgrade project, a portion of the company backbone will be increased to 10 Gb/s and needs to support unequal cost load balancing between routers. The IP addressing scheme is also changing and needs to support VLSM and CIDR. Which routing protocol should be selected for the network?BGPEIGRPOSPFRIPv2

Page 25: Revision for Final Exam 4

48. What Cisco VPN solution allows for simple configuration of VPNs on the laptops of remote and mobile employees?EasyVPN ServerEasyVPN RemoteEasyVPN ClientEasyVPN Remote-Access

49. Which two processes allow a smooth transition from IPv4 to IPv6? (Choose two.)IPSectunnelingdual stackauthenticationanycast addressingheader simplification

50. How should a network engineer determine if a router module is hot-swappable?Insert the module with the power on, then check to see if the associated LED is lit.Check the router and interface module data sheets on CCO to determine hot-swappability.Insert the module with the power on, then issue the show running-config command to verify that all new interfaces are recognized.Power off the router, insert the module, then verify new interfaces using the show running-config command after powering up.

51 Which two pieces of information are needed before an IOS image may be loaded on a router from a TFTP server? (Choose two.)the IP address of the TFTP serverthe current name of the IOS image on the routerthe operating system of the TFTP serverthe name of the configuration file in NVRAMthe name of the IOS image on the TFTP serverencapsulation of the router interface that is connected to the TFTP server

52. Refer to the exhibit. A networking company designer is reviewing a diagram of a customer network. What are the two problems that need to be resolved in the topology that is shown? (Choose two.)The firewall router and ISP connection represent a single point of failure.If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable.A power supply failure of the server block switch will cause the entire IP telephony system to fail.Using Layer 3 switches to interconnect the server block servers to the IP phones introduces too much delay.The IP phones need to be redundantly connected to the switches to prevent single points of failure at the access layer.