CCENT/CCNA Icnd2 Chapt. 14 + 15

14 Questions | Total Attempts: 167

SettingsSettingsSettings
CCENT/CCNA Icnd2 Chapt. 14 + 15

CCENT/CCNA ICND2 CHAPT. 14 + 15


Questions and Answers
  • 1. 
    Imagine two Cisco routers, R1 and R2, using a Frame Relay service. R1 connects to a switch that uses LMI type ANSI T1.617, and R2 connects to a switch that uses ITU Q.933a. What keywords could be used in the R1 and R2 configuration so that the LMIs work correctly?
    • A. 

      Ansi and itu

    • B. 

      T1617 and q933

    • C. 

      Ansi and q933

    • D. 

      T1617 and itu

    • E. 

      This won’t work with two different types.

  • 2. 
    BettyCo has five sites, with routers connected to the same Frame Relay network. VCs have been defined between each pair of routers. Betty, the company president, will fire anyone who configures anything that could just as easily be left as a default. Which of the following configuration commands, configured for the Frame Relay network, would get the engineer fired?
    • A. 

      Ip address

    • B. 

      Encapsulation

    • C. 

      Lmi-type

    • D. 

      Frame-relay map

    • E. 

      Frame-relay inverse-arp

  • 3. 
    WilmaCo has some routers connected to a Frame Relay network. R1 is a router at a remote site, with a single VC back to WilmaCo’s headquarters. The R1 configuration currently looks like this:Wilma, the company president, has heard that point-to-point subinterfaces are cool, and she wants you to change the configuration to use a point-to-point subinterface. Which of the following commands do you need to use to migrate the configuration?
    • A. 

      No ip address

    • B. 

      Interface-dlci

    • C. 

      No encapsulation

    • D. 

      Encapsulation frame-relay

    • E. 

      Frame-relay interface-dlci

  • 4. 
    WilmaCo has another network, with a main site router that has ten VCs connecting to the ten remote sites. Wilma now thinks that multipoint subinterfaces are even cooler than point-to-point. The current main site router’s configuration looks like this:Wilma wants you to change the configuration to use a multipoint subinterface. Which of the following do you need to use to migrate the configuration? (Note: DLCIs 101 through 110 areused for the ten VCs.)
    • A. 

      Interface-dlci 101 110

    • B. 

      Interface dlci 101-110

    • C. 

      Frame-relay interface-dlci 101 110

    • D. 

      Frame-relay interface dlci 101-110

    • E. 

      Ten different frame-relay interface-dlci commands

  • 5. 
    Which of the following commands lists the information learned by Inverse ARP?
    • A. 

      Show ip arp

    • B. 

      Show arp

    • C. 

      Show inverse arp

    • D. 

      Show frame-relay inverse-arp

    • E. 

      Show frame-relay map

  • 6. 
    Which of the following are Frame Relay PVC status codes for which a router sends frames for the associated PVC?
    • A. 

      Up

    • B. 

      Down

    • C. 

      Active

    • D. 

      Inactive

    • E. 

      Static

  • 7. 
    Central site router RC has a VC connecting to ten remote routers (R1 through R10), with RC’s local DLCIs being 101 through 110, respectively. RC has grouped DLCIs 107, 108, and 109 into a single multipoint subinterface S0/0.789, whose current status is “up and up.” Which of the following must be true?
    • A. 

      Serial 0/0 could be in an up/down state.

    • B. 

      The PVC with DLCI 108 could be in an inactive state.

    • C. 

      The show frame-relay map command lists mapping information for all three VCs.

    • D. 

      At least one of the three PVCs is in an active or static state.

  • 8. 
    Frame Relay router R1 uses interface S0/0 to connect to a Frame Relay access link. The physical interface is in an up/down state. Which of the following could cause this problem?
    • A. 

      The access link has a physical problem and cannot pass bits between the router and switch.

    • B. 

      The switch and router are using different LMI types.

    • C. 

      The router configuration is missing the encapsulation frame-relay command on interface S0/0.

    • D. 

      The router received a valid LMI status message that listed some of the DLCIs as inactive.

  • 9. 
    Which of the following terms refers to a VPN that uses the Internet to connect the sites of a single company, rather than using leased lines or Frame Relay?
    • A. 

      Intranet VPN

    • B. 

      Extranet VPN

    • C. 

      Access VPN

    • D. 

      Enterprise VPN

  • 10. 
    Which of the following are not considered to be desirable security goals for a site-to-site VPN?
    • A. 

      Message integrity checks

    • B. 

      Privacy (encryption)

    • C. 

      Antivirus

    • D. 

      Authentication

  • 11. 
    Which of the following functions could be performed by the IPsec IP Authentication Header?
    • A. 

      Authentication

    • B. 

      Encryption

    • C. 

      Message integrity checks

    • D. 

      Anti-reply

  • 12. 
    Which of the following is considered to be the best encryption protocol for providing privacy in an IPsec VPN as compared to the other answers?
    • A. 

      AES

    • B. 

      HMAC-MD5

    • C. 

      HMAC-SHA-1

    • D. 

      DES

    • E. 

      3DES

  • 13. 
    Which three of the following options would be the most commonly used options for newly purchased and installed VPN components today?
    • A. 

      ASA

    • B. 

      PIX firewall

    • C. 

      VPN concentrator

    • D. 

      Cisco router

    • E. 

      Cisco VPN client

  • 14. 
    When using the Cisco Web VPN solution, with the client using a normal web browser without any special client software, which of the following are true?
    • A. 

      The user creates a TCP connection to a Web VPN server using SSL.

    • B. 

      If the user connects to a normal web server inside the enterprise, and that server only supports HTTP and not SSL, those packets pass over the Internet unencrypted.

    • C. 

      The Web VPN server connects to internal web servers on behalf of the Web VPN client, translating between HTTP and SSL as need be.

    • D. 

      The web VPN client cannot connect without at least thin-client SSL software installed on the client.