CISCO Review

98 Questions | Attempts: 179
Share

SettingsSettingsSettings
CISCO Review - Quiz

Review for CCNA Discovery 4.


Questions and Answers
  • 1. 

    A pre-sales systems engineer receives a diagram of the exhibited WAN implementation from a customer. EIGPR is the routing protocol that is used on the WAN. None of the parameters for EIGRP metric calculation have been modified in any router configurations. Which statement is true about the routing table on router RM?

    • A.

      There is a single route to the 192.168.24.0/24 LAN using the T1 connection.

    • B.

      There is a single route to the 192.168.24.0/24 LAN using the DSL connection.

    • C.

      There is a single route to the 192.168.24.0/24 LAN using the Metro Ethernet connection.

    • D.

      EIGRP installs all three routes to the 192.168.24.0/24 LAN and load balances the traffic

    • E.

      Fewer redundant links are required to maintain connectivity.

    Correct Answer
    C. There is a single route to the 192.168.24.0/24 LAN using the Metro Ethernet connection.
  • 2. 

    What best describes the function of QoS in data networking?

    • A.

      Prioritizes data traffic over all other types of traffic

    • B.

      Increases bandwidth on a link to ensure voice quality traffic

    • C.

      Provides preferred service to specified network traffic

    • D.

      Automatically assigns the highest priority to web and database traffic

    Correct Answer
    C. Provides preferred service to specified network traffic
  • 3. 

    What are two suggested best practices to implement when securing network devices? (Choose two.)

    • A.

      Configure VLAN 1 as the native VLAN

    • B.

      Disable unused ports on switches

    • C.

      Enable SSH and disable Telnet

    • D.

      Consolidate guest traffic and internal employee traffic

    • E.

      Ensure that logs are stored locally on routers

    Correct Answer(s)
    B. Disable unused ports on switches
    C. Enable SSH and disable Telnet
  • 4. 

    A new WIC is installed in an available router slot. At what point during the router startup process does the router test the card for hardware problems?

    • A.

      After the configuration from NVRAM is loaded into RAM

    • B.

      After the configuration form NVRAM is loaded into ROM

    • C.

      When the bootstrap program is loaded into RAM

    • D.

      During the POST

    Correct Answer
    D. During the POST
  • 5. 

    Which two statements accurately describe the result of entering the command BRT(config-if)# frame-relay map ip 10.1.10.1 35 on a router? (Choose two.)

    • A.

      The remote router updates the Frame Relay map table with DLCI 35 to reach the 10.1.10.0 network.

    • B.

      Inverse ARP is used to add an entry for the 10.1.10.1 into the Frame Relay map table via the use of DLCI 5.

    • C.

      DLCI 35 replaces the MAC address in the ARP table for entry 10.1.10.1.

    • D.

      A Layer 2 address is statically mapped to a Layer 3 address.

    • E.

      Router BRT uses DLCI 35 to forward data to 10.1.10.1.

    Correct Answer(s)
    D. A Layer 2 address is statically mapped to a Layer 3 address.
    E. Router BRT uses DLCI 35 to forward data to 10.1.10.1.
  • 6. 

    A customer of a large multisite organization has asked a network engineer to compare a new IPv4 addressing strategy with an IPv6 strategy for their new network implementation. Which tool is appropriate for testing and comparing both addressing schemes?

    • A.

      NBAR

    • B.

      Cisco SDM

    • C.

      Network Assistant

    • D.

      Network simulation tool

    Correct Answer
    D. Network simulation tool
  • 7. 

    Which statement best describes the VPN feature called split tunneling?

    • A.

      It creates separate pathways for different VLANs.

    • B.

      It creates two tunnels, one for user traffic and one for management traffic such as CDP and SNMP.

    • C.

      It allows user traffic that is destined for the corporate network to travel across the VPN tunnel, while traffic destined for the Internet travels through the local LAN of the VPN client.

    • D.

      It allows separate tunnels so that high priority traffic, such as voice and video, uses the higher bandwidth tunnel, while all other user traffic travels on the lower bandwidth tunnel.

    Correct Answer
    C. It allows user traffic that is destined for the corporate network to travel across the VPN tunnel, while traffic destined for the Internet travels through the local LAN of the VPN client.
  • 8. 

    During the boot process and assuming the default sequence, what is the second location where the router will look for the IOS?

    • A.

      ROM

    • B.

      Flash

    • C.

      NVRAM

    • D.

      TFTP server

    Correct Answer
    D. TFTP server
  • 9. 

    A network designer recommends using RSTP in the design of a new data center. There are multiple redundant Layer 2 switches and links contained in the new design. What is the benefit of using RSTP rather than STP in this situation?

    • A.

      Redundant links are not blocked.

    • B.

      Routing tables converge more quickly.

    • C.

      Spanning Tree convergence times are reduced.

    Correct Answer
    C. Spanning Tree convergence times are reduced.
  • 10. 

    A large company plans to add several servers and requires that the servers be reachable directly from the Internet. Which action will help the company accomplish this goal?

    • A.

      Assign to each server a static internal IP address that is mapped statically to a public IP address.

    • B.

      Place all servers in their own class C private subnet.

    • C.

      Provide a private address to each server using DHCP.

    • D.

      Assign addresses from a pool of public Class B addresses using DHCP.

    Correct Answer
    A. Assign to each server a static internal IP address that is mapped statically to a public IP address.
  • 11. 

    A network associate is configuring a new router to provide routing between VLANs. The associate removes the router from the box and connects the Fa0/0 interface to a trunking port on the switch. After the configuration is applied to the router, the traffic between VLANs still fails. what is causing this to occur?

    • A.

      The router needs a routing protocol configured.

    • B.

      The router needs additional Fast Ethernet interfaces installed.

    • C.

      The subinterfaces of the router should have IP addresses applied.

    • D.

      All the subinterfaces of the router should be configured in the same VLAN.

    • E.

      The subinterfaces must be the same value as the VLAN ID that they are routing for.

    Correct Answer
    C. The subinterfaces of the router should have IP addresses applied.
  • 12. 

    What does the TOR router do with traffic that is destined for a web server with an IP address of 172.18.10.24?

    • A.

      The router sends the traffic out Serial 0/0/0.

    • B.

      The router sends the traffic out all interfaces other than the one it came in on.

    • C.

      The router places the packets into a queue until a better route is discovered via RIP.

    • D.

      The router sends a request to neighbouring routers for paths to the 172.18.10.0 network.

    Correct Answer
    A. The router sends the traffic out Serial 0/0/0.
  • 13. 

    An administrator installs a WIC-2T module into a Cisco 1841 router. Attempts to configure the S0/0/0 interface are unsuccessful. As a first step in troubleshooting the failure, the administrator issues the show version command. What is a possible reason for the failure?

    • A.

      The WIC was not physically installed properly.

    • B.

      The WIC was installed into slot 1 instead of slot 0.

    • C.

      The interface type and number are invalid on an 1841.

    • D.

      The configuration register is the wrong value for adding new modules.

    Correct Answer
    A. The WIC was not physically installed properly.
  • 14. 

    In order for the IT staff of a company to understand the basic operation of VPNs, which two features or technologies must the network designer identify as training needs? (Choose two.)

    • A.

      IPv6 tunneling

    • B.

      QoS operation

    • C.

      Tunneling protocols

    • D.

      VLAN configuration

    • E.

      Encryption algorithms

    Correct Answer(s)
    C. Tunneling protocols
    E. Encryption algorithms
  • 15. 

    The routers are configured with RIPv2 and utilize the default configuration. When attempting to communicate with other networks, hosts from 172.31.1.0/24 are experiencing connectivity issues. What could be done to resolve this issue?

    • A.

      Change to a public IP address scheme.

    • B.

      Ensure that automatic route summarization has been disabled on all routers in the network.

    • C.

      Change the IP address for the Router3 LAN to be 192.168.7.0/24.

    • D.

      Change the subnet mask on the link between Router2 and Router3 to 255.255.555.0.

    Correct Answer
    B. Ensure that automatic route summarization has been disabled on all routers in the network.
  • 16. 

    Which two processes allow a smooth transition from IPv4 to IPv6? (Choose two.)

    • A.

      IPSec

    • B.

      Tunneling

    • C.

      Dual stack

    • D.

      Authentication

    • E.

      Anycast addressing F. header simplification

    Correct Answer(s)
    B. Tunneling
    C. Dual stack
  • 17. 

    A technician at the ISP site asks the network administrator at the client site to change the CHAP password as part of the routing security maintenance. After the administrator makes the change and reboots the router, the technician issues a show interfaces serial 0/0/0 command. According to the output, what can be concluded about the serial connection between the client site and ISP site?

    • A.

      The router at the client site is still in the process of rebooting.

    • B.

      The administrator probably configured the wrong password.

    • C.

      The administrator has not issued a not shut command on the serial interface.

    • D.

      The administrator probably configured the wrong IP address for the serial interface.

    Correct Answer
    B. The administrator probably configured the wrong password.
  • 18. 

    The network administrator has used the Cisco Feature Navigator to choose a Cisco IOS image to install on a router. Given the exhibited output of the show version command, which statement is true about the capacity of the router to use this Cisco IOS image?

    • A.

      There is enough DRAM and flash.

    • B.

      There is not enough DRAM and flash.

    • C.

      There is enough DRAM but not enough flash.

    • D.

      There is not enough DRAM but enough flash.

    Correct Answer
    D. There is not enough DRAM but enough flash.
  • 19. 

    A small bookstore would like to offer wireless connectivity for customers with laptops. Which wireless components or devices will provide connectivity to the Internet for the customers with the least possible cost to the bookstore?

    • A.

      Wireless LAN controllers

    • B.

      Standalone access points

    • C.

      Wireless network cards for an ad hoc WLAN

    • D.

      Lightweight access point and wireless LAN controller

    Correct Answer
    B. Standalone access points
  • 20. 

    A networking company designer is reviewing a diagram of a customer network. What are the two problems that need to be resolved in the topology that is shown? (Choose two.)

    • A.

      The firewall router and ISP connection represent a single point of failure.

    • B.

      If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable.

    • C.

      A power supply failure of the server block switch will cause the entire IP telephony system to fail.

    • D.

      Using Layer 3 switches to interconnect the server block servers to the IP phones introduces too much delay.

    • E.

      The IP phones need to be redundantly connected to the switches to prevent single points of failure at the access layer.

    Correct Answer(s)
    A. The firewall router and ISP connection represent a single point of failure.
    C. A power supply failure of the server block switch will cause the entire IP telephony system to fail.
  • 21. 

    Which EIGRP configuration commands should a network administrator enter on router R1 to correctly advertise a single summary route to router MAIN for the campus LAN?

    • A.

      Router eigrp 11 network 10.5.0.0 network 192.168.0.0 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252

    • B.

      Router eigrp 11 network 192.168.0.0 0.0.3.255 network 192.168.8.0 0.0.3.255 network 10.5.0.0 0.0.0.3 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252

    • C.

      Router eigrp 11 network 10.5.0.0 0.0.0.3 network 192.168.0.0 0.0.3.255 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252 ip summary-address eigrp 11 192.168.0.0 255.255.252.0

    • D.

      Router eigrp 11 network 10.5.0.0 0.0.0.3 network 192.168.8.0 network 192.168.28.0 network 192.168.20.0 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252 ip summary-address eigrp 11 192.168.0.0 255.255.224.0

    Correct Answer
    D. Router eigrp 11 network 10.5.0.0 0.0.0.3 network 192.168.8.0 network 192.168.28.0 network 192.168.20.0 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252 ip summary-address eigrp 11 192.168.0.0 255.255.224.0
  • 22. 

    The network infrastructure at the headquarters of an organization consists of Cisco network devices that are running RIPv1. As part of an upgrade project, a portion of the company backbone will be increased to 10 Gb/s and needs to support unequal cost load balancing between routers. The IP addressing scheme is also changing and needs to support VLSM and CIDR. Which routing protocol should be selected for the network?

    • A.

      BGP

    • B.

      EIGRP

    • C.

      OSPF

    • D.

      RIPv2

    Correct Answer
    B. EIGRP
  • 23. 

    What can the field engineer conclude about the EIGRP authentication between RouterA and RouterB?

    • A.

      Authentication will fail because only one key is configured.

    • B.

      Authentication will fail because the key chain names do not match.

    • C.

      Authentication will succeed and EIGRP updates can be exchanged.

    • D.

      Authentication will fail because the key chain names must match the router names.

    Correct Answer
    B. Authentication will fail because the key chain names do not match.
  • 24. 

    An administrator is adding voice and video service capabilities to an existing network. What design requirement is being satisfied by this situation?

    • A.

      Availability

    • B.

      Manageability

    • C.

      Security

    • D.

      Scalability

    Correct Answer
    D. Scalability
  • 25. 

    While configuring EIGRP on a router, the technician enters his command: Router(config-router)# variance 8What is the effect of entering this command?

    • A.

      It adjusts the cost of all EIGRP routes to 8.

    • B.

      It enables unequal cost load balancing on the router.

    • C.

      It restricts the number of EIGRP feasible successor routes to 8.

    • D.

      It enables EIGRP equal cost load balancing over a maximum of 8 routes.

    • E.

      It modifies the number of values used in the composite metric calculation.

    Correct Answer
    B. It enables unequal cost load balancing on the router.
  • 26. 

    On a Monday morning the help desk at a large company receives an unusually high number of calls reporting no connectivity to the Internet or to any other network resources. Otherwise the PCs are functioning normally. Help desk technicians note that all the calls are from a single department, and all affected users are on the same floor of a single building. Where should the help desk technicians suspect that the problem lies?

    • A.

      Workgroup switch

    • B.

      PC power supplies

    • C.

      Patch cords from PCs to network jacks

    • D.

      Cabling from the network jack to the wiring closet

    Correct Answer
    A. Workgroup switch
  • 27. 

    Which three characteristics are associated with the core layer of the Cisco hierarchical network design? (Choose three.)

    • A.

      Packet filtering

    • B.

      High availability

    • C.

      Monitoring of DMZ traffic

    • D.

      Use of EtherChannel

    • E.

      Redundant components

    Correct Answer(s)
    B. High availability
    D. Use of EtherChannel
    E. Redundant components
  • 28. 

    A network administrator is asked to upgrade the enterprise network devices and to modify the addressing scheme to support VLSM and route summarization. The current network infrastructure contains both Cisco and non-Cisco routers. The plan is to replace old routers gradually with the latest Cicso routers. Which two routing protocols cna the administrator use to support both upgrading requirements? (Choose two.)

    • A.

      BGP

    • B.

      OSPF

    • C.

      RIPv1

    • D.

      RIPv2

    • E.

      EIGRP

    Correct Answer(s)
    B. OSPF
    D. RIPv2
  • 29. 

    Which IOS component can be used for classification and protocol discovery of network traffic and applications in use?

    • A.

      CDP

    • B.

      NBAR

    • C.

      ACL logging

    • D.

      Network Assistant

    Correct Answer
    B. NBAR
  • 30. 

    What is meant by "tunneling" in the context of migrating from IPv4 to IPv6?

    • A.

      Obtaining IPv6 addresses from an IPv4 DHCP server

    • B.

      Allowing both protocol stacks to run on the same network device

    • C.

      Encapsulating one protocol packet within another protocol

    • D.

      Enabling direct communication between hosts that use different versions of the IP protocol

    Correct Answer
    C. Encapsulating one protocol packet within another protocol
  • 31. 

    What are two advantages of using a simulation tool to test an IP addressing scheme? (Choose two.)

    • A.

      Address configuration errors can be corrected using out-of-band connections.

    • B.

      Placement of subnets and route summarization can be verified.

    • C.

      An engineer can test physical security without leaving the office or lab.

    • D.

      The addressing scheme can be tested for scalability.

    • E.

      The effects of combining new with existing infrastructure can be measured.

    Correct Answer(s)
    B. Placement of subnets and route summarization can be verified.
    D. The addressing scheme can be tested for scalability.
  • 32. 

    While troubleshooting a Frame Relay link, the network administrator executes the show ip interface brief command on both sides of the PVC link. All interfaces show a configured IP address and that the line protocol is up. Further investigation reveals that the IP address of the remote router does not appear in the Frame Relay table. Which step would solve this problem?

    • A.

      Change the LMI type on the local router.

    • B.

      Verify that the DLCI number is the same on both sides of the PVC.

    • C.

      Configure the router using the frame-relay map ip command.

    • D.

      Verify that the remote router has Frame Relay encapsulation enabled.

    Correct Answer
    C. Configure the router using the frame-relay map ip command.
  • 33. 

    During a review of the proposed bill of materials, an account manager of the network solution company realizes that the systems engineer included a switch with lower cost and reduced capabilities for the access layer that was originally specified by the network designer. When questioned, the systems engineer responds that the switches specified by the designer cannot be purchased within the budget limitations of the customer. Which action should the account manager take?

    • A.

      Inform the customer that the project budget must be increased.

    • B.

      Inform the customer that the project cannot be completed given the unreasonable budget constraints.

    • C.

      Communicate any risks that are associated with the equipment substitution and obtain customer approval to proceed.

    • D.

      Because the customer is probably aware that the budget limitations will require lower cost, less capable equipment, the account manager should do nothing.

    Correct Answer
    C. Communicate any risks that are associated with the equipment substitution and obtain customer approval to proceed.
  • 34. 

    Which two pieces of information are needed before an IOs image maty be loaded on a router from a TFTP server? (Choose two.)

    • A.

      The IP address of the TFTP server

    • B.

      The current name of the IOS image on the router

    • C.

      The operating system of the TFTP server

    • D.

      The name of the configuration file in NVRAM

    • E.

      The name of the IOS image on the TFTP server

    Correct Answer(s)
    A. The IP address of the TFTP server
    E. The name of the IOS image on the TFTP server
  • 35. 

    A network designer has chosen to specify the use of a dedicated firewall appliance at the perimeter of a large network. Why would the designer use a dedicated firewall rather than using the Cisco IOS firewall feature set on the existing router?

    • A.

      Traffic filtering is needed on the internal LAN.

    • B.

      Multiple levels of access to the network are needed.

    • C.

      The DMZ requires packet filtering and port blocking.

    • D.

      Heavy network traffic will be handled best by using a dedicated device.

    Correct Answer
    D. Heavy network traffic will be handled best by using a dedicated device.
  • 36. 

    What are two advantages of using Layer 3 devices instead of Layer 2 switches at the distribution layer of a hierarchical network? (Choose two.)

    • A.

      Allows connectivity between different VLANs

    • B.

      Provides reliable connectivity to the end user

    • C.

      Reduces the number of required redundant links

    • D.

      Results in fewer IP subnets to configure and manage

    • E.

      Enables traffic filtering that is based on subnet addresses

    Correct Answer(s)
    A. Allows connectivity between different VLANs
    E. Enables traffic filtering that is based on subnet addresses
  • 37. 

    A network engineer is at a customer site. After resolving technical problems in the network, the engineer provides a training session for the support staff. Which job function best fits the activities of this network engineer?

    • A.

      Network designer

    • B.

      Account manager

    • C.

      Pre-sales engineer

    • D.

      Post-sales field engineer

    Correct Answer
    D. Post-sales field engineer
  • 38. 

    An extended ACL has been create d to deny traffic from the 192.168.35.0/24 network to the web server with IP address 209.165.201.15. According to Cisco best practices, where should the ACL be applied?

    • A.

      RTB Fa0/0 inbound

    • B.

      RTC S0/0/1 inbound

    • C.

      RTD Fa0/0 outbound

    • D.

      RTC S0/1/0 outbound

    Correct Answer
    A. RTB Fa0/0 inbound
  • 39. 

    What is the spanning-tree role of all the enabled interfaces of SW11?

    • A.

      Alternate

    • B.

      Backup

    • C.

      Designated

    • D.

      Root

    Correct Answer
    C. Designated
  • 40. 

    The named ACL "Managers" already exists on the router. What will happen when the network administrator issues the commands that are shown in the exhibit?

    • A.

      The commands overwrite the existing Managers ACL.

    • B.

      The commands are added at the end of the existing Managers ACL.

    • C.

      The commands are added at the beginning of the existing Managers ACL.

    • D.

      The network administrator receives an error that states that the ACL already exists.

    Correct Answer
    B. The commands are added at the end of the existing Managers ACL.
  • 41. 

    What are two accurate descriptors of a DLCI? (Choose two.)

    • A.

      Frame Relay Layer 2 address

    • B.

      One DLCI allowed per local loop

    • C.

      Locally significant circuit endpoint

    • D.

      Signaling standard between DTE and DCE

    • E.

      Establishes the data transfer rate through a Frame Relay network

    Correct Answer(s)
    A. Frame Relay Layer 2 address
    C. Locally significant circuit endpoint
  • 42. 

    A new host needs to be connected to the switch and be assigned to VLAN 3. Router R1 is attached to the switch via a trunk and is configured as shown. What IP address should be assigned to this new host?

    • A.

      192.168.1.1/26

    • B.

      192.168.1.31/28

    • C.

      192.168.1.32/28

    • D.

      192.168.1.44/28 E. 192.168.1.63/28

    • E.

      F. 192.168.1.55/28

    Correct Answer
    E. F. 192.168.1.55/28
  • 43. 

    Which task would typically only require services that are located at the access layer of the hierarchical design model?

    • A.

      Placing a VoIP call to a business associate in anoth er country

    • B.

      Connecting to the corporate web server to update sales figures

    • C.

      Using a VPN from home to send data to the main office server farm

    • D.

      Responding to an e-mail from a co-worker in another department

    • E.

      Printing a meeting agenda on a local departmental network printer

    Correct Answer
    E. Printing a meeting agenda on a local departmental network printer
  • 44. 

    What is a function that is associated with the access layer in a hierarchically designed network?

    • A.

      Performs routing and packet manipulation

    • B.

      Supplies redundancy and failover protection

    • C.

      Provides a high-speed, low-latency backbone

    • D.

      Serves as a network connection point for IP telephony devices

    Correct Answer
    D. Serves as a network connection point for IP telephony devices
  • 45. 

    The main office of a NetworkingCompany customer currently connects to three branch offices via three separate point-to-point T1 circuits. The customer network uses RIPv2 as the routing protocol within both the LAN and the WAN. The account manager proposes a change to a Frame Relay network because the costs are lower. A single local loop connection can be installed at the main office with three separate PVCs to connect the branch offices. How can the main office edge router be configured to enable the customer to continue to use RIP as the WAN routing protocol?

    • A.

      Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote routers.

    • B.

      To prevent the Frame Relay net work from causing a routing loop, disable split horizon on the serial interface.

    • C.

      Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP address to each one.

    • D.

      Configure the serial interface with a single i nterface DLCI number and create frame -relay map statements for each remote site address.

    Correct Answer
    C. Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP address to each one.
  • 46. 

    A customer has a problem with connectivity in the network. Based on the IP addressing scheme, what is causing the problem?

    • A.

      The WAN link that connects R1 to R3 has an incorrect mask.

    • B.

      The WAN links need IP addresses from a different major network.

    • C.

      The WAN link that connects R1 to R2 overlaps with the R3 LAN.

    • D.

      The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM.

    Correct Answer
    C. The WAN link that connects R1 to R2 overlaps with the R3 LAN.
  • 47. 

    What can be concluded from the output that is shown?

    • A.

      MDF_R1 has a MAC address of 2294:300F:0000.

    • B.

      MDF_R1 is connected through FastEthernet0/1 to C2960 -24TT-L_IDF1.

    • C.

      Device C2960-24TT-L_IDF1 is running Cisco IOS Software Release 12.2(25)SEE2.

    • D.

      MDF_R1 is installed in the ma in distribution facility on floor 24 of building L.

    Correct Answer
    B. MDF_R1 is connected through FastEthernet0/1 to C2960 -24TT-L_IDF1.
  • 48. 

    A networking engineer is characterizing an existing network for a new customer. The engineer issues a show running-config command on the R1 router to gather configuration information. What is the engineer able to determine as a result of viewing the output of this command?

    • A.

      The R1 router has two specific routes to the main office LANs in the routing table.

    • B.

      The default route for the R1 router points to the Edge1 router.

    • C.

      The R1 router will load-balance traffic to the main office LANs by using both DSL and Frame Relay.

    • D.

      A connection through ISP-1 will be used to reach the main office LAN s if the Frame Relay network is unavailable.

    Correct Answer
    D. A connection through ISP-1 will be used to reach the main office LAN s if the Frame Relay network is unavailable.
  • 49. 

    What can be broadcast over the wireless network to help a user connect to the network and use wireless services?

    • A.

      SSID

    • B.

      WPA encryption keys

    • C.

      Voice VLAN parameters

    • D.

      IP address of the access point

    • E.

      Management VLAN parameters

    Correct Answer
    A. SSID
  • 50. 

    A network administrator has removed a router from the network for maintenance. A new Cisco IOS software image has been successfully downloaded to a server and copied into the flash of the router. What should the administrator do before placing t he router back into service?

    • A.

      Delete the previous version of the Cisco IOS software from flash.

    • B.

      Copy the new IOS into NVRAM to create a backup copy.

    • C.

      Restart the router and verify that the new image starts successfully.

    • D.

      Verify the free space available on the router to store the new IOS image.

    Correct Answer
    C. Restart the router and verify that the new image starts successfully.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 17, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 02, 2009
    Quiz Created by
    Asdfasdf22026
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.