CISCO Review

101 Questions  I  By Asdfasdf22026
Please take the quiz to rate it.

 CISCO review
Review for CCNA Discovery 4.

  
Changes are done, please start the quiz.


Questions and Answers

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
  • 1. 

    A pre-sales systems engineer receives a diagram of the exhibited WAN implementation from a customer. EIGPR is the routing protocol that is used on the WAN. None of the parameters for EIGRP metric calculation have been modified in any router configurations. Which statement is true about the routing table on router RM?
    • A. 

      There is a single route to the 192.168.24.0/24 LAN using the T1 connection.

    • B. 

      There is a single route to the 192.168.24.0/24 LAN using the DSL connection.

    • C. 

      There is a single route to the 192.168.24.0/24 LAN using the Metro Ethernet connection.

    • D. 

      EIGRP installs all three routes to the 192.168.24.0/24 LAN and load balances the traffic

    • E. 

      Fewer redundant links are required to maintain connectivity.


  • 2. 
    What best describes the function of QoS in data networking?
    • A. 

      Prioritizes data traffic over all other types of traffic

    • B. 

      Increases bandwidth on a link to ensure voice quality traffic

    • C. 

      Provides preferred service to specified network traffic

    • D. 

      Automatically assigns the highest priority to web and database traffic


  • 3. 
    What are two suggested best practices to implement when securing network devices? (Choose two.)
    • A. 

      Configure VLAN 1 as the native VLAN

    • B. 

      Disable unused ports on switches

    • C. 

      Enable SSH and disable Telnet

    • D. 

      Consolidate guest traffic and internal employee traffic

    • E. 

      Ensure that logs are stored locally on routers


  • 4. 
    A new WIC is installed in an available router slot. At what point during the router startup process does the router test the card for hardware problems?
    • A. 

      After the configuration from NVRAM is loaded into RAM

    • B. 

      After the configuration form NVRAM is loaded into ROM

    • C. 

      When the bootstrap program is loaded into RAM

    • D. 

      During the POST


  • 5. 
    Which two statements accurately describe the result of entering the command BRT(config-if)# frame-relay map ip 10.1.10.1 35 on a router? (Choose two.)
    • A. 

      The remote router updates the Frame Relay map table with DLCI 35 to reach the 10.1.10.0 network.

    • B. 

      Inverse ARP is used to add an entry for the 10.1.10.1 into the Frame Relay map table via the use of DLCI 5.

    • C. 

      DLCI 35 replaces the MAC address in the ARP table for entry 10.1.10.1.

    • D. 

      A Layer 2 address is statically mapped to a Layer 3 address.

    • E. 

      Router BRT uses DLCI 35 to forward data to 10.1.10.1.


  • 6. 
    A customer of a large multisite organization has asked a network engineer to compare a new IPv4 addressing strategy with an IPv6 strategy for their new network implementation. Which tool is appropriate for testing and comparing both addressing schemes?
    • A. 

      NBAR

    • B. 

      Cisco SDM

    • C. 

      Network Assistant

    • D. 

      Network simulation tool


  • 7. 
    Which statement best describes the VPN feature called split tunneling?
    • A. 

      It creates separate pathways for different VLANs.

    • B. 

      It creates two tunnels, one for user traffic and one for management traffic such as CDP and SNMP.

    • C. 

      It allows user traffic that is destined for the corporate network to travel across the VPN tunnel, while traffic destined for the Internet travels through the local LAN of the VPN client.

    • D. 

      It allows separate tunnels so that high priority traffic, such as voice and video, uses the higher bandwidth tunnel, while all other user traffic travels on the lower bandwidth tunnel.


  • 8. 
    During the boot process and assuming the default sequence, what is the second location where the router will look for the IOS?
    • A. 

      ROM

    • B. 

      Flash

    • C. 

      NVRAM

    • D. 

      TFTP server


  • 9. 
    What type of system connects to the PSTN and uses a PBX to route calls via analog or digital lines?
    • A. 

      VPN

    • B. 

      VoIP

    • C. 

      IP telephony

    • D. 

      Traditional telephony


  • 10. 
    A network designer recommends using RSTP in the design of a new data center. There are multiple redundant Layer 2 switches and links contained in the new design. What is the benefit of using RSTP rather than STP in this situation?
    • A. 

      Redundant links are not blocked.

    • B. 

      Routing tables converge more quickly.

    • C. 

      Spanning Tree convergence times are reduced.


  • 11. 
    A large company plans to add several servers and requires that the servers be reachable directly from the Internet. Which action will help the company accomplish this goal?
    • A. 

      Assign to each server a static internal IP address that is mapped statically to a public IP address.

    • B. 

      Place all servers in their own class C private subnet.

    • C. 

      Provide a private address to each server using DHCP.

    • D. 

      Assign addresses from a pool of public Class B addresses using DHCP.


  • 12. 

    A network associate is configuring a new router to provide routing between VLANs. The associate removes the router from the box and connects the Fa0/0 interface to a trunking port on the switch. After the configuration is applied to the router, the traffic between VLANs still fails. what is causing this to occur?
    • A. 

      The router needs a routing protocol configured.

    • B. 

      The router needs additional Fast Ethernet interfaces installed.

    • C. 

      The subinterfaces of the router should have IP addresses applied.

    • D. 

      All the subinterfaces of the router should be configured in the same VLAN.

    • E. 

      The subinterfaces must be the same value as the VLAN ID that they are routing for.


  • 13. 

    What does the TOR router do with traffic that is destined for a web server with an IP address of 172.18.10.24?
    • A. 

      The router sends the traffic out Serial 0/0/0.

    • B. 

      The router sends the traffic out all interfaces other than the one it came in on.

    • C. 

      The router places the packets into a queue until a better route is discovered via RIP.

    • D. 

      The router sends a request to neighbouring routers for paths to the 172.18.10.0 network.


  • 14. 

    An administrator installs a WIC-2T module into a Cisco 1841 router. Attempts to configure the S0/0/0 interface are unsuccessful. As a first step in troubleshooting the failure, the administrator issues the show version command. What is a possible reason for the failure?
    • A. 

      The WIC was not physically installed properly.

    • B. 

      The WIC was installed into slot 1 instead of slot 0.

    • C. 

      The interface type and number are invalid on an 1841.

    • D. 

      The configuration register is the wrong value for adding new modules.


  • 15. 
    In order for the IT staff of a company to understand the basic operation of VPNs, which two features or technologies must the network designer identify as training needs? (Choose two.)
    • A. 

      IPv6 tunneling

    • B. 

      QoS operation

    • C. 

      Tunneling protocols

    • D. 

      VLAN configuration

    • E. 

      Encryption algorithms


  • 16. 

    The routers are configured with RIPv2 and utilize the default configuration. When attempting to communicate with other networks, hosts from 172.31.1.0/24 are experiencing connectivity issues. What could be done to resolve this issue?
    • A. 

      Change to a public IP address scheme.

    • B. 

      Ensure that automatic route summarization has been disabled on all routers in the network.

    • C. 

      Change the IP address for the Router3 LAN to be 192.168.7.0/24.

    • D. 

      Change the subnet mask on the link between Router2 and Router3 to 255.255.555.0.


  • 17. 
    Which two processes allow a smooth transition from IPv4 to IPv6? (Choose two.)
    • A. 

      IPSec

    • B. 

      Tunneling

    • C. 

      Dual stack

    • D. 

      Authentication

    • E. 

      Anycast addressing F. header simplification


  • 18. 

    A technician at the ISP site asks the network administrator at the client site to change the CHAP password as part of the routing security maintenance. After the administrator makes the change and reboots the router, the technician issues a show interfaces serial 0/0/0 command. According to the output, what can be concluded about the serial connection between the client site and ISP site?
    • A. 

      The router at the client site is still in the process of rebooting.

    • B. 

      The administrator probably configured the wrong password.

    • C. 

      The administrator has not issued a not shut command on the serial interface.

    • D. 

      The administrator probably configured the wrong IP address for the serial interface.


  • 19. 

    The network administrator has used the Cisco Feature Navigator to choose a Cisco IOS image to install on a router. Given the exhibited output of the show version command, which statement is true about the capacity of the router to use this Cisco IOS image?
    • A. 

      There is enough DRAM and flash.

    • B. 

      There is not enough DRAM and flash.

    • C. 

      There is enough DRAM but not enough flash.

    • D. 

      There is not enough DRAM but enough flash.


  • 20. 
    A small bookstore would like to offer wireless connectivity for customers with laptops. Which wireless components or devices will provide connectivity to the Internet for the customers with the least possible cost to the bookstore?
    • A. 

      Wireless LAN controllers

    • B. 

      Standalone access points

    • C. 

      Wireless network cards for an ad hoc WLAN

    • D. 

      Lightweight access point and wireless LAN controller


  • 21. 

    A networking company designer is reviewing a diagram of a customer network. What are the two problems that need to be resolved in the topology that is shown? (Choose two.)
    • A. 

      The firewall router and ISP connection represent a single point of failure.

    • B. 

      If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable.

    • C. 

      A power supply failure of the server block switch will cause the entire IP telephony system to fail.

    • D. 

      Using Layer 3 switches to interconnect the server block servers to the IP phones introduces too much delay.

    • E. 

      The IP phones need to be redundantly connected to the switches to prevent single points of failure at the access layer.


  • 22. 

    Which EIGRP configuration commands should a network administrator enter on router R1 to correctly advertise a single summary route to router MAIN for the campus LAN?
    • A. 

      Router eigrp 11 network 10.5.0.0 network 192.168.0.0 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252

    • B. 

      Router eigrp 11 network 192.168.0.0 0.0.3.255 network 192.168.8.0 0.0.3.255 network 10.5.0.0 0.0.0.3 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252

    • C. 

      Router eigrp 11 network 10.5.0.0 0.0.0.3 network 192.168.0.0 0.0.3.255 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252 ip summary-address eigrp 11 192.168.0.0 255.255.252.0

    • D. 

      Router eigrp 11 network 10.5.0.0 0.0.0.3 network 192.168.8.0 network 192.168.28.0 network 192.168.20.0 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252 ip summary-address eigrp 11 192.168.0.0 255.255.224.0


  • 23. 
    The network infrastructure at the headquarters of an organization consists of Cisco network devices that are running RIPv1. As part of an upgrade project, a portion of the company backbone will be increased to 10 Gb/s and needs to support unequal cost load balancing between routers. The IP addressing scheme is also changing and needs to support VLSM and CIDR. Which routing protocol should be selected for the network?
    • A. 

      BGP

    • B. 

      EIGRP

    • C. 

      OSPF

    • D. 

      RIPv2


  • 24. 

    What can the field engineer conclude about the EIGRP authentication between RouterA and RouterB?
    • A. 

      Authentication will fail because only one key is configured.

    • B. 

      Authentication will fail because the key chain names do not match.

    • C. 

      Authentication will succeed and EIGRP updates can be exchanged.

    • D. 

      Authentication will fail because the key chain names must match the router names.


  • 25. 
    An administrator is adding voice and video service capabilities to an existing network. What design requirement is being satisfied by this situation?
    • A. 

      Availability

    • B. 

      Manageability

    • C. 

      Security

    • D. 

      Scalability


  • 26. 
    While configuring EIGRP on a router, the technician enters his command: Router(config-router)# variance 8What is the effect of entering this command?
    • A. 

      It adjusts the cost of all EIGRP routes to 8.

    • B. 

      It enables unequal cost load balancing on the router.

    • C. 

      It restricts the number of EIGRP feasible successor routes to 8.

    • D. 

      It enables EIGRP equal cost load balancing over a maximum of 8 routes.

    • E. 

      It modifies the number of values used in the composite metric calculation.


  • 27. 
    On a Monday morning the help desk at a large company receives an unusually high number of calls reporting no connectivity to the Internet or to any other network resources. Otherwise the PCs are functioning normally. Help desk technicians note that all the calls are from a single department, and all affected users are on the same floor of a single building. Where should the help desk technicians suspect that the problem lies?
    • A. 

      Workgroup switch

    • B. 

      PC power supplies

    • C. 

      Patch cords from PCs to network jacks

    • D. 

      Cabling from the network jack to the wiring closet


  • 28. 
    Which three characteristics are associated with the core layer of the Cisco hierarchical network design? (Choose three.)
    • A. 

      Packet filtering

    • B. 

      High availability

    • C. 

      Monitoring of DMZ traffic

    • D. 

      Use of EtherChannel

    • E. 

      Redundant components


  • 29. 
    A network administrator is asked to upgrade the enterprise network devices and to modify the addressing scheme to support VLSM and route summarization. The current network infrastructure contains both Cisco and non-Cisco routers. The plan is to replace old routers gradually with the latest Cicso routers. Which two routing protocols cna the administrator use to support both upgrading requirements? (Choose two.)
    • A. 

      BGP

    • B. 

      OSPF

    • C. 

      RIPv1

    • D. 

      RIPv2

    • E. 

      EIGRP


  • 30. 
    Which IOS component can be used for classification and protocol discovery of network traffic and applications in use?
    • A. 

      CDP

    • B. 

      NBAR

    • C. 

      ACL logging

    • D. 

      Network Assistant


  • 31. 
    What is meant by "tunneling" in the context of migrating from IPv4 to IPv6?
    • A. 

      Obtaining IPv6 addresses from an IPv4 DHCP server

    • B. 

      Allowing both protocol stacks to run on the same network device

    • C. 

      Encapsulating one protocol packet within another protocol

    • D. 

      Enabling direct communication between hosts that use different versions of the IP protocol


  • 32. 
    What are two advantages of using a simulation tool to test an IP addressing scheme? (Choose two.)
    • A. 

      Address configuration errors can be corrected using out-of-band connections.

    • B. 

      Placement of subnets and route summarization can be verified.

    • C. 

      An engineer can test physical security without leaving the office or lab.

    • D. 

      The addressing scheme can be tested for scalability.

    • E. 

      The effects of combining new with existing infrastructure can be measured.


  • 33. 
    While troubleshooting a Frame Relay link, the network administrator executes the show ip interface brief command on both sides of the PVC link. All interfaces show a configured IP address and that the line protocol is up. Further investigation reveals that the IP address of the remote router does not appear in the Frame Relay table. Which step would solve this problem?
    • A. 

      Change the LMI type on the local router.

    • B. 

      Verify that the DLCI number is the same on both sides of the PVC.

    • C. 

      Configure the router using the frame-relay map ip command.

    • D. 

      Verify that the remote router has Frame Relay encapsulation enabled.


  • 34. 
    During a review of the proposed bill of materials, an account manager of the network solution company realizes that the systems engineer included a switch with lower cost and reduced capabilities for the access layer that was originally specified by the network designer. When questioned, the systems engineer responds that the switches specified by the designer cannot be purchased within the budget limitations of the customer. Which action should the account manager take?
    • A. 

      Inform the customer that the project budget must be increased.

    • B. 

      Inform the customer that the project cannot be completed given the unreasonable budget constraints.

    • C. 

      Communicate any risks that are associated with the equipment substitution and obtain customer approval to proceed.

    • D. 

      Because the customer is probably aware that the budget limitations will require lower cost, less capable equipment, the account manager should do nothing.


  • 35. 
    Which two pieces of information are needed before an IOs image maty be loaded on a router from a TFTP server? (Choose two.)
    • A. 

      The IP address of the TFTP server

    • B. 

      The current name of the IOS image on the router

    • C. 

      The operating system of the TFTP server

    • D. 

      The name of the configuration file in NVRAM

    • E. 

      The name of the IOS image on the TFTP server


  • 36. 
    A network designer has chosen to specify the use of a dedicated firewall appliance at the perimeter of a large network. Why would the designer use a dedicated firewall rather than using the Cisco IOS firewall feature set on the existing router?
    • A. 

      Traffic filtering is needed on the internal LAN.

    • B. 

      Multiple levels of access to the network are needed.

    • C. 

      The DMZ requires packet filtering and port blocking.

    • D. 

      Heavy network traffic will be handled best by using a dedicated device.


  • 37. 
    What are two advantages of using Layer 3 devices instead of Layer 2 switches at the distribution layer of a hierarchical network? (Choose two.)
    • A. 

      Allows connectivity between different VLANs

    • B. 

      Provides reliable connectivity to the end user

    • C. 

      Reduces the number of required redundant links

    • D. 

      Results in fewer IP subnets to configure and manage

    • E. 

      Enables traffic filtering that is based on subnet addresses


  • 38. 
    A network engineer is at a customer site. After resolving technical problems in the network, the engineer provides a training session for the support staff. Which job function best fits the activities of this network engineer?
    • A. 

      Network designer

    • B. 

      Account manager

    • C. 

      Pre-sales engineer

    • D. 

      Post-sales field engineer


  • 39. 

    An extended ACL has been create d to deny traffic from the 192.168.35.0/24 network to the web server with IP address 209.165.201.15. According to Cisco best practices, where should the ACL be applied?
    • A. 

      RTB Fa0/0 inbound

    • B. 

      RTC S0/0/1 inbound

    • C. 

      RTD Fa0/0 outbound

    • D. 

      RTC S0/1/0 outbound


  • 40. 

    What is the spanning-tree role of all the enabled interfaces of SW11?
    • A. 

      Alternate

    • B. 

      Backup

    • C. 

      Designated

    • D. 

      Root


  • 41. 

    The named ACL "Managers" already exists on the router. What will happen when the network administrator issues the commands that are shown in the exhibit?
    • A. 

      The commands overwrite the existing Managers ACL.

    • B. 

      The commands are added at the end of the existing Managers ACL.

    • C. 

      The commands are added at the beginning of the existing Managers ACL.

    • D. 

      The network administrator receives an error that states that the ACL already exists.


  • 42. 
    What are two accurate descriptors of a DLCI? (Choose two.)
    • A. 

      Frame Relay Layer 2 address

    • B. 

      One DLCI allowed per local loop

    • C. 

      Locally significant circuit endpoint

    • D. 

      Signaling standard between DTE and DCE

    • E. 

      Establishes the data transfer rate through a Frame Relay network


  • 43. 

    A new host needs to be connected to the switch and be assigned to VLAN 3. Router R1 is attached to the switch via a trunk and is configured as shown. What IP address should be assigned to this new host?
    • A. 

      192.168.1.1/26

    • B. 

      192.168.1.31/28

    • C. 

      192.168.1.32/28

    • D. 

      192.168.1.44/28 E. 192.168.1.63/28

    • E. 

      F. 192.168.1.55/28


  • 44. 
    Which task would typically only require services that are located at the access layer of the hierarchical design model?
    • A. 

      Placing a VoIP call to a business associate in anoth er country

    • B. 

      Connecting to the corporate web server to update sales figures

    • C. 

      Using a VPN from home to send data to the main office server farm

    • D. 

      Responding to an e-mail from a co-worker in another department

    • E. 

      Printing a meeting agenda on a local departmental network printer


  • 45. 
    What is a function that is associated with the access layer in a hierarchically designed network?
    • A. 

      Performs routing and packet manipulation

    • B. 

      Supplies redundancy and failover protection

    • C. 

      Provides a high-speed, low-latency backbone

    • D. 

      Serves as a network connection point for IP telephony devices


  • 46. 
    The main office of a NetworkingCompany customer currently connects to three branch offices via three separate point-to-point T1 circuits. The customer network uses RIPv2 as the routing protocol within both the LAN and the WAN. The account manager proposes a change to a Frame Relay network because the costs are lower. A single local loop connection can be installed at the main office with three separate PVCs to connect the branch offices. How can the main office edge router be configured to enable the customer to continue to use RIP as the WAN routing protocol?
    • A. 

      Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote routers.

    • B. 

      To prevent the Frame Relay net work from causing a routing loop, disable split horizon on the serial interface.

    • C. 

      Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP address to each one.

    • D. 

      Configure the serial interface with a single i nterface DLCI number and create frame -relay map statements for each remote site address.


  • 47. 

    A customer has a problem with connectivity in the network. Based on the IP addressing scheme, what is causing the problem?
    • A. 

      The WAN link that connects R1 to R3 has an incorrect mask.

    • B. 

      The WAN links need IP addresses from a different major network.

    • C. 

      The WAN link that connects R1 to R2 overlaps with the R3 LAN.

    • D. 

      The IP addressing in R1 LAN is incorrect because subnet zero cannot be used with VLSM.


  • 48. 

    What can be concluded from the output that is shown?
    • A. 

      MDF_R1 has a MAC address of 2294:300F:0000.

    • B. 

      MDF_R1 is connected through FastEthernet0/1 to C2960 -24TT-L_IDF1.

    • C. 

      Device C2960-24TT-L_IDF1 is running Cisco IOS Software Release 12.2(25)SEE2.

    • D. 

      MDF_R1 is installed in the ma in distribution facility on floor 24 of building L.


  • 49. 

    A networking engineer is characterizing an existing network for a new customer. The engineer issues a show running-config command on the R1 router to gather configuration information. What is the engineer able to determine as a result of viewing the output of this command?
    • A. 

      The R1 router has two specific routes to the main office LANs in the routing table.

    • B. 

      The default route for the R1 router points to the Edge1 router.

    • C. 

      The R1 router will load-balance traffic to the main office LANs by using both DSL and Frame Relay.

    • D. 

      A connection through ISP-1 will be used to reach the main office LAN s if the Frame Relay network is unavailable.


  • 50. 
    What can be broadcast over the wireless network to help a user connect to the network and use wireless services?
    • A. 

      SSID

    • B. 

      WPA encryption keys

    • C. 

      Voice VLAN parameters

    • D. 

      IP address of the access point

    • E. 

      Management VLAN parameters


  • 51. 
    A network administrator has removed a router from the network for maintenance. A new Cisco IOS software image has been successfully downloaded to a server and copied into the flash of the router. What should the administrator do before placing t he router back into service?
    • A. 

      Delete the previous version of the Cisco IOS software from flash.

    • B. 

      Copy the new IOS into NVRAM to create a backup copy.

    • C. 

      Restart the router and verify that the new image starts successfully.

    • D. 

      Verify the free space available on the router to store the new IOS image.


  • 52. 

    Following a test plan, the network systems engineer completes the configuration of an access layer switch and connects three PCs to test the configuration. The engineer attempts to ping from each PC to the other connected PCs. Which three statements describe the expected results of pinging from one host to another? (Choose three.)
    • A. 

      Host 1 can ping Host 2.

    • B. 

      Host 1 cannot ping Host 2.

    • C. 

      Host 2 cannot ping Host 3.

    • D. 

      Host 3 can ping Host 1.

    • E. 

      Host 3 can ping Host 2.


  • 53. 
    If a router is unable to find a suitable IOS to load into RAM, in what mode does the boot process end?
    • A. 

      Setup mode

    • B. 

      User mode

    • C. 

      Rommon mode

    • D. 

      Privileged mode


  • 54. 
    During prototype testing, the network designer performs a test to determin e the ability of the network to store device configurations and statistics on local databases. Which design goal is validated if the test is a success?
    • A. 

      Security

    • B. 

      Scalability

    • C. 

      Availability

    • D. 

      Manageability


  • 55. 
    Which two values represent valid IPv6 addresses? (Choose two.)
    • A. 

      ::::1

    • B. 

      FF01::1

    • C. 

      0:0:0:0:0:0:0:1

    • D. 

      2001:DB8::47::2A4

    • E. 

      2031:0000:04AC:3400:FFE3:0


  • 56. 
    A WIC-1T module needs to be installed in a Cisco 1841 router that currently has a WIC -2T module in slot 0. What should the network technician do first?
    • A. 

      Install the hot-swappable option module.

    • B. 

      Turn off the power to the router before installing the new module.

    • C. 

      Remove the WIC-2T module so that the new module can be installed in slot 0.

    • D. 

      Shut down all Fast Ethernet ports on the router until the new WIC module installation is complete.

    • E. 

      Configure the Cisco IOS software to support an internal trunk link between the two WIC modules.


  • 57. 
    When does a host device issue an ICMP echo request?
    • A. 

      To initiate a ping to determine if a destination address is reachable

    • B. 

      To respond to a DNS name query

    • C. 

      To broadcast its identity to its locally connected neighbors

    • D. 

      To request the MAC address of a destination IP address


  • 58. 
    What is the maximum T1 transmission speed?
    • A. 

      56 kbps

    • B. 

      28 kbps

    • C. 

      1.544 Mbps

    • D. 

      2.4 Mbps


  • 59. 
    At which point do individu als and small businesses connect directly to the ISP network to obtain Internet access?
    • A. 

      At a POP

    • B. 

      At an IXP

    • C. 

      At a Metro Ethernet link

    • D. 

      On the ISP extranet


  • 60. 
    Which network support services team is responsible for testing a new customer connection and for monitoring the ongoing operation of the link?
    • A. 

      Customer service

    • B. 

      Help desk

    • C. 

      Network operations

    • D. 

      On-site installation


  • 61. 
    Which network support services team identifies whether the client site has existing network hardware and circuits installed?
    • A. 

      Customer service

    • B. 

      Help desk

    • C. 

      Network operations

    • D. 

      Planning and provisioning


  • 62. 
    The DHCP server in a lab environment is down when multiple DHCP clients in the lab are booted for the first time. Which two statements describe how the DHCP clients will be affected by t he absence of a DHCP server during boot? (Choose two.)
    • A. 

      The clients will not boot completely until the DHCP server resumes functioning.

    • B. 

      The clients will attempt via the use of the IP address 127.0.0.1 to communicate with the other clients.

    • C. 

      All clients with link-local addresses will communicate with each other in a peer -to-peer manner.

    • D. 

      A link-local address will be automatically assigned to the hosts by the operating system.

    • E. 

      A link-local process will use a DNS query to determine if any other device uses the same link-local address.


  • 63. 
    Which is a function of the transport layer of the OSI model?
    • A. 

      Routes data between networks

    • B. 

      Converts data to bits for transmission

    • C. 

      Delivers data reliably across the network using TCP

    • D. 

      Formats and encodes data for transmission

    • E. 

      Transmits data to the next directly connected device


  • 64. 
    Which statement describes the process of escalating a help desk trouble ticket?
    • A. 

      The help desk technican resolves the customer problem over the phone and closes the trouble ticket.

    • B. 

      Remote desktop utilities enable the help desk technician to fix a configuration error and close the trouble ticket.

    • C. 

      After trying unsuccessfully to fix a problem, the help desk technician sends the trouble ticket to the onsite support staff.

    • D. 

      When the problem is solved, all information is recorded on the trouble ticket for future reference.


  • 65. 
    Which two functions are provided by the upper layers of the OSI model? (Choose two.)
    • A. 

      Placing electrical signals on the medium for transmission

    • B. 

      Initiating the network communication process

    • C. 

      Encrypting and compressing data for transmission

    • D. 

      Segmenting and identifying data for reassembly at the destination

    • E. 

      Choosing the appropriate path for the data to take through the network


  • 66. 
    Which scenario represents a problem at La yer 4 of the OSI model?
    • A. 

      An incorrect IP address on the default gateway.

    • B. 

      A bad subnet mask in the host IP configuration.

    • C. 

      A firewall filtering traffic addressed to TCP port 25 on an email server.

    • D. 

      An incorrect DNS server address being given out by DHCP.


  • 67. 
    A network technician is assigned to perform a site visit to a customer location to determine the requirements for a network upgrade. In addition to the currently installed equipment inventory, what other information about the hosts and networking devices should the technician obtain from the customer?
    • A. 

      The cost of the currently installed equipment

    • B. 

      All product keys for site license software

    • C. 

      Any planned growth anticipated in the near future

    • D. 

      The memory requirements for installed application software


  • 68. 
    Which three issues should be noted on the technician's site survey report? (Choose three.)
    • A. 

      Unlabeled cables

    • B. 

      Only two power outlets per wall in each room

    • C. 

      Poor physical security of network devices

    • D. 

      Horizontal cabling runs under 100 meters

    • E. 

      Lack of UPS for critical devices


  • 69. 
    What three things are included in a logical topology document? (Choose three.)
    • A. 

      The location of cables, computers, and other peripherals

    • B. 

      The path that the data takes through a network

    • C. 

      The wiring closet and access point locations

    • D. 

      The device names and Layer 3 addressing information

    • E. 

      The location of routing, network address translation, and firewall filtering


  • 70. 
    When designing a network upgrade, which two tasks should the onsite technicia n perform? (Choose two.)
    • A. 

      Configure the servers and routers prior to delivery

    • B. 

      Upgrade the network operating system and all client operating systems

    • C. 

      Investigate and document the physical layout of the premises

    • D. 

      Document the final design for approval by the customer

    • E. 

      Perform a site survey to document the existing network structure


  • 71. 
    What must be added when a network expands beyond the coverage area of the current telecommunications room?
    • A. 

      MDF

    • B. 

      POP

    • C. 

      IDF

    • D. 

      IXP


  • 72. 
    In an 8 bit binary number, what is the t otal number of combinations of the eight bits?
    • A. 

      128

    • B. 

      254

    • C. 

      255

    • D. 

      256

    • E. 

      512


  • 73. 
    Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.
    • A. 

      11110010

    • B. 

      11011011

    • C. 

      11110110

    • D. 

      11100111

    • E. 

      11100101


  • 74. 
    How many usable hosts are available given a Class C IP address with the default subnet mask?
    • A. 

      254

    • B. 

      255

    • C. 

      256

    • D. 

      510

    • E. 

      512


  • 75. 
    What is the network broadcast address for a Class C address of 192.168.32.0 with the default subnet mask?
    • A. 

      192.168.0.0

    • B. 

      192.168.0.255

    • C. 

      192.168.32.0

    • D. 

      192.168.32.254

    • E. 

      192.168.32.255


  • 76. 
    Company XYZ uses a network address of 192.168.4.0. It uses the mask of 255.255.255.224 to create subnets. What is the maximum number of usable hosts in each subnet?
    • A. 

      6

    • B. 

      14

    • C. 

      30

    • D. 

      62


  • 77. 
    What is the correct command sequence to configure a router host name to "LAB_A"?
    • A. 

      Router> enable Router# configure terminal Router(config)# hostname LAB_A

    • B. 

      Router> enable Router# hostname LAB_A

    • C. 

      Router> enable Router# configure router Router(config)# hostname LAB_A

    • D. 

      Router> enable Router(config)# host name LAB_A


  • 78. 
    Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)
    • A. 

      VTY interface

    • B. 

      Console interface

    • C. 

      Ethernet interface

    • D. 

      Secret EXEC mode

    • E. 

      Privileged EXEC mode


  • 79. 
    A network administrator needs to configure a router. Which of the following connection methods requires network functionality to be accessible?
    • A. 

      Console

    • B. 

      AUX

    • C. 

      Telnet

    • D. 

      Modem


  • 80. 
    Which tasks can be accomplished by using the command history feature? (Choose two.)
    • A. 

      View a list of commands entered in a previous session.

    • B. 

      Recall up to 15 command lines by default.

    • C. 

      Set the command history buffer size.

    • D. 

      Recall previously entered commands.

    • E. 

      Save command lines in a log file for future reference.


  • 81. 
    A router has a valid operating system and a configuration stored in NVRAM. When the router boots up, which mode will display?
    • A. 

      Global configuration mode

    • B. 

      Setup mode

    • C. 

      ROM monitor mode

    • D. 

      User EXEC mode


  • 82. 
    What is the purpose of a routing protocol?
    • A. 

      It is used to build and maintain ARP tables.

    • B. 

      It provides a method for segmenting and reassembling data packets.

    • C. 

      It allows an administrator to devise an addressing scheme for the network.

    • D. 

      It allows a router to share information about known networks with other routers.

    • E. 

      It provides a procedure for encoding and decoding data into bits for packet forwarding.


  • 83. 
    Why is fast convergence desirable in networks that use dynamic routing protocols?
    • A. 

      Routers will not allow packets to be forwarded until the network has converged.

    • B. 

      Hosts are unable to access their gateway until the network has converged.

    • C. 

      Routers may make incorrect forwarding decisions until the network has c onverged.

    • D. 

      Routers will not allow configuration changes to be made until the network has converged.


  • 84. 
    In which situation would a company register for its own autonomous system number (ASN)?
    • A. 

      When the company's ISP adds connection points to the Internet

    • B. 

      When additional routers are added to the corporate internetwork

    • C. 

      When more than one interior routing protocol is used

    • D. 

      When the company uses two or more ISPs


  • 85. 
    What term refers to a group of networks that uses the same internal routing policies and is controlled by a single administrative authority?
    • A. 

      Internet

    • B. 

      Intranet

    • C. 

      Virtual private network

    • D. 

      Autonomous system


  • 86. 
    Which protocol is an exterior routing protocol?
    • A. 

      BGP

    • B. 

      EIGRP

    • C. 

      OSPF

    • D. 

      RIP


  • 87. 
    A client is communicating with a server on a different segment of the network. How does the server determine what service is being requested by the client?
    • A. 

      Applies the default service configured in directory services

    • B. 

      Uses ARP to discover the appropriate service from the local router

    • C. 

      Sends a request to the client as king for the appropriate service

    • D. 

      Identifies the appropriate service from the destination port field


  • 88. 
    What is the function of the TCP three -way handshake?
    • A. 

      It enables the synchronization of port numbers between source and destination hosts.

    • B. 

      It immediately triggers the retransmission of lost data.

    • C. 

      It synchronizes both ends of a connection by allowing both sides to agree upon initial sequence numbers.

    • D. 

      It identifies the destination application on the receiving host.


  • 89. 
    What are three unique characterist ics of UDP? (Choose three.)
    • A. 

      Connection oriented

    • B. 

      Full-duplex operation

    • C. 

      Low overhead

    • D. 

      No flow control

    • E. 

      No error-recovery function


  • 90. 
    Within TCP, what combination makes up a socket pair?
    • A. 

      Source port with destination port

    • B. 

      Source IP address with destination port

    • C. 

      Source IP address and destination IP address

    • D. 

      Source IP address and port with a destination IP address and port


  • 91. 
    What type of update allows client computers to register and update their resource records with a DNS server whenever changes occur?
    • A. 

      Dynamic

    • B. 

      Zone transfer

    • C. 

      Local recursive query

    • D. 

      Root domain query

    • E. 

      Top-level domain query


  • 92. 
    Which benefit does SSH offer over Telnet when remotely managing a router?
    • A. 

      Encryption

    • B. 

      TCP usage

    • C. 

      Authorization

    • D. 

      Connection using six VTY lines


  • 93. 
    Which means of communication does an SNMP network agent use to provide a network management station with important but unsolicited information?
    • A. 

      Query

    • B. 

      Broadcast

    • C. 

      ICMP ping

    • D. 

      Trap

    • E. 

      Poll


  • 94. 
    What is the term used to describe the area of a network which stores servers that are accessible to any users from the Internet?
    • A. 

      "clean" LAN

    • B. 

      Intranet

    • C. 

      DMZ

    • D. 

      Extranet


  • 95. 
    Before a technician upgrades a server, it is necessary to back up all data. Which type of backup is necessary to ensure that all data is backed up?
    • A. 

      Daily

    • B. 

      Differential

    • C. 

      Full

    • D. 

      Incremental

    • E. 

      Partial


  • 96. 
    A company wants to configure a firewall to monitor all channels of communication and allow only traffic that is part of a known connection. Which firewall configuration should be de ployed?
    • A. 

      Packet filtering

    • B. 

      Proxy

    • C. 

      Stateful packet inspection

    • D. 

      Stateless packet inspection


  • 97. 

    What are two possible causes for the interface status? (Choose two.)
    • A. 

      The loopback address is not set.

    • B. 

      The encapsulation type is mismatched.

    • C. 

      A cable is not attached to the interface.

    • D. 

      Keep alive messages are not being received.

    • E. 

      The interface is administratively shut down.


  • 98. 
    A network administrator is upgrading a Cisco 1841 router by adding a WIC -2T module card. Which show command can the administrator use to verify that the module is correctly recognized by the router?
    • A. 

      Show flash:

    • B. 

      Show version

    • C. 

      Show ip route

    • D. 

      Show startup-configuration


  • 99. 
    Which two conditions identify issues that are confined to Layer 1? (Choose two.)
    • A. 

      Cables that exceed maximum length

    • B. 

      Encapsulation errors

    • C. 

      Viruses and worms that create excessive broadcast traffic

    • D. 

      Poor termination of cables

    • E. 

      Receiving "line protocol down" messages on th e router console


  • 100. 

    Which three statements are true about the output of the show ip interface brief command? (Choose three.)
    • A. 

      FastEthernet0/0 is functioning correctly.

    • B. 

      The shutdown command has been applied on Serial0/0.

    • C. 

      FastEthernet0/0 was configured by the startup -config at bootup.

    • D. 

      Serial0/0 is experiencing a Layer 1 network problem.

    • E. 

      FastEthernet0/1 is experiencing a Layer 2 network problem.


  • 101. 
    A network administrator plugs a new PC into a switch port. The LED for that port changes to solid green. What statement best describes the current status of the port?
    • A. 

      There is a duplex mismatch error.

    • B. 

      There is a link fault error. This port is unable to forward frames.

    • C. 

      The port is operational and ready to transmit packets.

    • D. 

      This port has been disabled by management and is unable to forward frames.

    • E. 

      The flash memory is bus y.


Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz
We have sent an email with your new password.