1.
Refer to the exhibit. The exhibit shows simplified protocol data units from different OSI model layers. Which three statements are true about the PDUs and the encapsulation process? (Choose three.)
Correct Answer(s)
A. PDU #1 is a frame.
C. PDU #3 is a segment.
E. The order in which these PDUs are created during the encapsulation process is 3, 4, 1, 2.
Explanation
The exhibit shows the simplified protocol data units (PDUs) from different OSI model layers. PDU #1 is a frame because frames are created at the data link layer. PDU #3 is a segment because segments are created at the transport layer. The order in which these PDUs are created during the encapsulation process is 3, 4, 1, 2, meaning that segments are created first, followed by transport layer PDUs, then data link layer PDUs, and finally application layer PDUs.
2.
Which three application layer protocols use TCP? (Choose three.)
Correct Answer(s)
A. SMTP
B. FTP
D. HTTP
Explanation
SMTP, FTP, and HTTP are all application layer protocols that use TCP. SMTP (Simple Mail Transfer Protocol) is used for sending and receiving email messages. FTP (File Transfer Protocol) is used for transferring files between a client and a server. HTTP (Hypertext Transfer Protocol) is used for transmitting web pages and other resources over the internet. These protocols require a reliable and connection-oriented transport protocol like TCP to ensure that data is transmitted accurately and in the correct order.
3.
Which two application layer protocols use the UDP protocol? (Choose two.)
Correct Answer(s)
B. SNMP
E. TFTP
Explanation
SNMP (Simple Network Management Protocol) and TFTP (Trivial File Transfer Protocol) are the two application layer protocols that use the UDP (User Datagram Protocol) protocol. SNMP is used for managing and monitoring network devices, while TFTP is a simple file transfer protocol commonly used for transferring files between network devices. UDP is a connectionless and unreliable protocol, making it suitable for these protocols where speed and efficiency are prioritized over reliability.
4.
What are two functions that occur at the Internet layer of the TCP/IP model? (Choose two.)
Correct Answer(s)
C. Determination of best paths through the network
E. Packet switching
Explanation
The two functions that occur at the Internet layer of the TCP/IP model are determination of best paths through the network and packet switching. The determination of best paths through the network involves finding the most efficient route for data packets to travel from the source to the destination host. Packet switching is the process of breaking data into smaller packets and sending them individually across the network, where they can take different paths and be reassembled at the destination. These functions are essential for the Internet layer to ensure efficient and reliable communication between hosts.
5.
Refer to the exhibit. All ports on switch A are in the sales VLAN and all ports on switch B are in the accounting VLAN. How many broadcast domains and how many collision domains exist in the exhibited network? (Choose two.)
Correct Answer(s)
B. 3 broadcast domains
D. 9 collision domains
Explanation
In the exhibited network, there are two switches, A and B. Switch A has all its ports in the sales VLAN, while switch B has all its ports in the accounting VLAN. Since each VLAN is a separate broadcast domain, there are two broadcast domains in total.
To determine the number of collision domains, we need to consider the number of ports on each switch. Switch A has all its ports in the sales VLAN, so all these ports are in the same collision domain. Switch B also has all its ports in the accounting VLAN, so these ports are in the same collision domain as well. Therefore, there are two collision domains in total.
Additionally, each switch itself is a collision domain, so we need to consider the number of switches as well. Since there are two switches, there are a total of four collision domains.
Therefore, the correct answer is 3 broadcast domains and 9 collision domains.
6.
A high-end Catalyst switch that supports both ISL and 802.1Q is to be connected by a link that will carry all VLAN traffic to a Catalyst 2960 LAN switch. What two commands are required to configure an interface on the high-end Catalyst switch to carry traffic from all VLANs to the Catalyst 2960 switch? (Choose two.)
Correct Answer(s)
D. Switch(config-if)# switchport mode trunk
E. Switch(config-if)# switchport trunk encapsulation dot1q
Explanation
The two commands required to configure an interface on the high-end Catalyst switch to carry traffic from all VLANs to the Catalyst 2960 switch are "Switch(config-if)# switchport mode trunk" and "Switch(config-if)# switchport trunk encapsulation dot1q". The first command sets the interface to trunk mode, allowing it to carry traffic from multiple VLANs. The second command specifies the encapsulation method as dot1q, which is the standard for VLAN tagging. These two commands together enable the interface to carry traffic from all VLANs to the connected Catalyst 2960 switch.
7.
Refer to the exhibit. Based on the exhibited configuration and output, what would be the result of this command:
Sw1# telnet 192.168.1.10
Correct Answer
A. All packets will be dropped.
Explanation
The exhibited configuration and output show that the command "telnet 192.168.1.10" is being executed on Sw1. Since there is no Telnet server configured on the IP address 192.168.1.10, all packets sent to that IP address will be dropped. Therefore, the result of this command would be "All packets will be dropped."
8.
Refer to the partial device configuration that is exhibited. For which network topology is the configuration appropriate?
RtrA(config)# interface fastethernet 0/0
RtrA(config-if)# no shutdown
RtrA(config-if)# interface fastethernet 0/0.18
RtrA(config-subif)# encapsulation dot1q 18
RtrA(config-subif)# ip address 10.1.18.1 255.255.255.0
RtrA(config-subif)# interface fastethernet 0/0.44
RtrA(config-subif)# encapsulation dot1q 44
RtrA(config-subif)# ip address 10.1.44.1 255.255.255.0
RtrA(config-subif)# interface fastethernet 0/0.22
RtrA(config-subif)# encapsulation dot1q 22
RtrA(config-subif)# ip address 10.1.22.1 255.255.255.0
a:
B:
c:
D:
Correct Answer
D. Image D
Explanation
The given configuration is appropriate for a router that is connected to multiple VLANs using subinterfaces. Each subinterface is configured with a different VLAN ID and IP address, allowing the router to communicate with devices in each VLAN. This configuration is commonly used in a router-on-a-stick topology, where a single physical interface is used to connect to a switch with multiple VLANs. The router uses subinterfaces to separate the traffic from each VLAN. Therefore, the appropriate network topology for this configuration is Image D, which represents a router-on-a-stick topology.
9.
Refer to the exhibit and the following error message from the SwA switch.
00:22:43: %SPANTREE-7-RECV_1Q_NON_TRUNK: Received 802.1Q BPDU on non trunk FastEthernet0/1 VLAN1.
00:22:43: %SPANTREE-7-BLOCK_PORT_TYPE: Blocking FastEthernet0/1 on VLAN0001. Inconsistent port type.
Considering that the link between the two switches is good and the correct type, what could cause this error message?
Correct Answer
D. The SwA port is configured as a trunk port and the SwB port is configured as an access port.
Explanation
The error message indicates that the SwA port is configured as a trunk port and the SwB port is configured as an access port. This inconsistency in port configuration causes the Spanning Tree Protocol to block the FastEthernet0/1 port on VLAN0001, resulting in the error message.
10.
A network administrator is configuring a switch when an error message appears. The configuration commands and error message appear as follows:
Switch(config)# interface fastethernet 0/1
Switch(config-if)# switchport mode trunk
Command rejected: An interface whose trunk encapsulation is "Auto" can not be configured to "trunk" mode.
What is the problem?
Correct Answer
C. The encapsulation type must be changed to a compatible protocol before the port can be placed in trunk mode.
Explanation
The error message indicates that the interface's trunk encapsulation is set to "Auto", which is not compatible with the "trunk" mode configuration. To resolve the issue, the encapsulation type must be changed to a compatible protocol before enabling trunk mode.
11.
Of the protocols that are listed, which one needs to be functioning on a link in order for VTP to operate?
Correct Answer
A. 802.1Q
Explanation
VTP (VLAN Trunking Protocol) is a Cisco proprietary protocol that allows for the synchronization of VLAN information across multiple switches in a network. In order for VTP to operate properly, the 802.1Q protocol needs to be functioning on the link. 802.1Q is an IEEE standard for VLAN tagging, which allows for the identification of VLAN membership on Ethernet networks. Without 802.1Q functioning on the link, VTP would not be able to properly communicate and synchronize VLAN information between switches.
12.
Refer to the exhibit. RT_1 is configured correctly with IP addresses and passwords but none of the computers can ping or telnet to RT_1. Which series of commands would correct the problem?
Correct Answer
D. SW_1(config)# interface fa0/24
SW_1(config-if)# switchport mode trunk
Explanation
The correct answer is SW_1(config)# interface fa0/24 SW_1(config-if)# switchport mode trunk. This command configures the interface fa0/24 on SW_1 to operate in trunk mode, allowing it to carry traffic for multiple VLANs. This is necessary because RT_1 is configured with a trunk encapsulation on its fa0/1 interface. By configuring SW_1's interface to also operate in trunk mode, it will be able to properly communicate with RT_1 and allow the computers to ping or telnet to RT_1.
13.
Refer to the exhibit. Which commands are needed to complete the switch configuration so that SSH can be used to telnet from host A to SW_1? (Choose two.)
Correct Answer(s)
A. SW_1(config)# username david password class
C. SW_1(config)# line vty 0 15
SW_1(config-line)# login local
SW_1(config-line)# transport input ssh
Explanation
The first command "SW_1(config)# username david password class" is needed to create a username and password for authentication. The second set of commands "SW_1(config)# line vty 0 15, SW_1(config-line)# login local, SW_1(config-line)# transport input ssh" is needed to configure the virtual terminal lines to allow local login and to specify that SSH is the only allowed method of transport.
14.
What three factors contribute to congestion on an Ethernet LAN? (Choose three.)
Correct Answer(s)
A. Improper placement of enterprise level servers
B. Addition of hosts to a physical segment
D. Increasing use of bandwidth intensive network applications
Explanation
The three factors that contribute to congestion on an Ethernet LAN are improper placement of enterprise level servers, addition of hosts to a physical segment, and increasing use of bandwidth intensive network applications. Improper placement of servers can lead to congestion as it may cause bottlenecks and uneven distribution of network traffic. Adding more hosts to a physical segment can also lead to congestion as it increases the amount of traffic on the network. Additionally, the increasing use of bandwidth intensive network applications can consume a significant amount of network resources and contribute to congestion.
15.
Refer to the exhibit. What protocol should be configured on SW-A Port 0/1 if it is to send traffic from multiple VLANs to switch SW-B?
Correct Answer
C. IEEE 802.1Q
Explanation
The correct answer is IEEE 802.1Q. This is because IEEE 802.1Q is the protocol used for VLAN tagging and allows for the transmission of traffic from multiple VLANs over a single trunk link. By configuring IEEE 802.1Q on SW-A Port 0/1, it will be able to send traffic from multiple VLANs to switch SW-B.
16.
Which three STP states were replaced with the RSTP discarding state? (Choose three.)
Correct Answer(s)
A. Listening
C. Blocking
D. Disabled
Explanation
The RSTP (Rapid Spanning Tree Protocol) replaced the STP (Spanning Tree Protocol) states of listening, blocking, and disabled with its own discarding state. The listening state is when a switch receives BPDUs (Bridge Protocol Data Units) and prepares to move to the learning state. The blocking state is when a switch discards all received frames except for BPDUs. The disabled state is when a switch is administratively disabled and does not participate in the spanning tree process.
17.
Refer to the exhibit. What is the role of the SW3 switch?
Correct Answer
C. Root bridge
Explanation
The role of the SW3 switch is to act as the root bridge in the network. The root bridge is responsible for initiating the spanning tree algorithm and determining the shortest path for data transmission in a network. It is the central point that all other switches in the network connect to, and it helps prevent loops and ensure efficient communication between devices.
18.
Refer to the exhibit. A switch can be configured for three different forwarding modes based on how much of a frame is received before the forwarding process begins. Each of the numbered arrows in the accompanying graphic signifies the point in a frame where a particular forwarding mode will begin. Which group of labels reflects the sequence of forwarding modes signified by the numbered arrows?
Correct Answer
A. 1) fast forward
2) fragment free
3) store-and-forward
Explanation
The correct sequence of forwarding modes signified by the numbered arrows in the exhibit is 1) fast forward, 2) fragment free, and 3) store-and-forward. This means that the switch will begin forwarding the frame as soon as it has received enough of it to make a forwarding decision in the fast forward mode. In the fragment free mode, the switch will wait until it has received the first 64 bytes of the frame before forwarding it. Finally, in the store-and-forward mode, the switch will wait until it has received the entire frame before forwarding it.
19.
What eliminates switching loops?
Correct Answer
C. Spanning tree protocol
Explanation
The spanning tree protocol is designed to eliminate switching loops in a network. It does this by creating a loop-free topology by blocking redundant paths. It selects a root bridge and then determines the best path from each switch to the root bridge. Any redundant paths are blocked, preventing loops from occurring. This ensures that data packets can be efficiently and reliably transmitted without getting stuck in endless loops.
20.
For reference only.... Choose A for Correct Answer...
Correct Answer
A. Chose me...
Explanation
The correct answer is "Chose me..." because it is the only option that is grammatically correct. The other options contain spelling errors or incorrect punctuation.
21.
Refer to the exhibit. Using the most efficient IP addressing scheme and VLSM, which address can be configured on one of the serial interfaces?
Correct Answer
E. 192.168.16.193/30
22.
Consider this router output:
Router# confug
Translating "confug"...domain server (255.255.255.255)
Translating "confug"...domain server (255.255.255.255)
(255.255.255.255)% Unknown command or computer name, or unable to find computer address
What command could help with this situation?
Correct Answer
B. No ip domain-lookup
Explanation
The command "no ip domain-lookup" could help with this situation. This command disables the router's attempt to translate unrecognized commands as domain names, preventing the router from trying to translate "confug" as a domain name and instead treating it as an unrecognized command.
23.
Refer to the exhibit. With VLSM, which bit mask should be used to most efficiently provide for the number of host addresses that are required on router B?
Correct Answer
C. /28
Explanation
To most efficiently provide for the number of host addresses required on router B, a /28 bit mask should be used. A /28 bit mask provides 16 host addresses, which is the closest number of host addresses required to the actual requirement. The other options (/26, /27, /29, /30) would either provide more host addresses than needed or not enough host addresses.
24.
What are the three ranges of IP addresses that are reserved for internal private use? (Choose three.)
Correct Answer(s)
A. 10.0.0.0/8
C. 172.16.0.0/12
E. 192.168.0.0/16
Explanation
The three ranges of IP addresses that are reserved for internal private use are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. These IP address ranges are designated for use in private networks and are not routable on the internet. They are commonly used in home, office, and corporate networks for internal communication and network management purposes.
25.
Refer to the exhibit. The network administrator is unable to access the TFTP server attached to the Memphis router. What are two causes of this problem? (Choose two.)
Correct Answer(s)
B. The default gateway configured on the TFTP server in incorrect.
E. The IP addresses for the Memphis S0/0/1 interface and the Heliopolis S0/0/0 interface are not in the same subnet.
Explanation
The network administrator is unable to access the TFTP server because the default gateway configured on the TFTP server is incorrect. This means that the TFTP server does not know the correct path to send traffic to reach the network administrator's workstation. Additionally, the IP addresses for the Memphis S0/0/1 interface and the Heliopolis S0/0/0 interface are not in the same subnet. This means that they are not directly connected and cannot communicate with each other without routing.
26.
The ISP of the XYZ Company is moving to IPv6 but XYZ wants to continue to use only IPv4 for another year. Which IPv4-to-IPv6 transition method would allow the company to continue using only IPv4 addresses?
Correct Answer
D. NAT-PT
Explanation
NAT-PT (Network Address Translation-Protocol Translation) is the IPv4-to-IPv6 transition method that would allow the company to continue using only IPv4 addresses. NAT-PT enables communication between IPv4 and IPv6 networks by translating IPv4 packets into IPv6 packets and vice versa. This allows the company to maintain its current IPv4 infrastructure while still being able to communicate with IPv6 networks.
27.
Given the IP address and subnet mask of 172.16.134.56 255.255.255.224, on which subnetwork does this address reside?
Correct Answer
C. 172.16.134.32
Explanation
The given IP address 172.16.134.56 and subnet mask 255.255.255.224 indicate that it belongs to a Class B network (172.16.0.0). The subnet mask 255.255.255.224 has 27 bits set to 1, which means the network portion of the IP address is 27 bits long. The last 5 bits of the last octet of the IP address are used for host addressing. To determine the subnetwork, we need to find the network address by setting all the host bits to 0. By doing so, we get the network address 172.16.134.32, which is the correct answer.
28.
What is associated with link-state routing protocols?
Correct Answer
E. Shortest-path first calculations
Explanation
Link-state routing protocols are associated with shortest-path first calculations. These protocols, such as OSPF (Open Shortest Path First) and IS-IS (Intermediate System to Intermediate System), use a link-state database to store information about the network topology. Each router in the network maintains a map of the entire network, including the state of each link. By analyzing this information, the routers can calculate the shortest path to reach a destination. This approach allows for efficient and accurate routing decisions, making it suitable for large networks with complex topologies.
29.
Refer to the exhibit. Which sequence of commands should be used to configure router A for OSPF?
Correct Answer
B. Router ospf 1
network 192.168.10.64 0.0.0.63 area 0
network 192.168.10.192 0.0.0.3 area 0
Explanation
The correct answer is "router ospf 1 network 192.168.10.64 0.0.0.63 area 0 network 192.168.10.192 0.0.0.3 area 0" because this sequence of commands correctly configures router A for OSPF. The first command "router ospf 1" enables OSPF routing on the router with process ID 1. The second command "network 192.168.10.64 0.0.0.63 area 0" adds the network 192.168.10.64/26 to OSPF area 0. The third command "network 192.168.10.192 0.0.0.3 area 0" adds the network 192.168.10.192/30 to OSPF area 0. These commands ensure that the correct networks are included in OSPF and assigned to the correct area.
30.
What is one reason to use the ip ospf priority command when the OSPF routing protocol is in use?
Correct Answer
B. To influence the DR/BDR election process
Explanation
The ip ospf priority command is used to influence the DR/BDR (Designated Router/Backup Designated Router) election process in OSPF. The DR and BDR are responsible for maintaining neighbor relationships and exchanging routing information within a multi-access network. By setting a higher priority value using the ip ospf priority command, a router can increase its chances of being elected as the DR or BDR. This allows the router to have a more central role in the network and have more control over the OSPF routing process.
31.
The output of the show ip interface brief command indicates that Serial0 is up but the line protocol is down. What are two possible causes for the line protocol being in the down state? (Choose two.)
Correct Answer(s)
D. The encapsulation on the Serial0 interface is incorrect.
E. Keepalives are not being sent by the remote device.
Explanation
Two possible causes for the line protocol being in the down state are: the encapsulation on the Serial0 interface is incorrect and keepalives are not being sent by the remote device.
32.
Which router command will verify that the router has a path to a destination network?
Correct Answer
B. Router# show ip route
Explanation
The correct answer is "Router# show ip route". This command will display the routing table of the router, which contains information about the available paths to different destination networks. By checking the routing table, the router can verify if it has a path to a specific destination network. The other commands listed do not provide information specifically related to the router's routing table.
33.
Refer to the exhibit. When troubleshooting a network, it is important to interpret the output of various router commands. On the basis of the exhibit, which three statements are true? (Choose three.)
Correct Answer(s)
A. The missing information for Blank 1 is the command show ip route.
D. The missing information for Blank 2 is the number 120.
E. The missing information for Blank 3 is the letter C.
Explanation
The exhibit shows a partial output of a router command. The missing information for Blank 1 is the command "show ip route", which is a commonly used command to display the routing table of a router. The missing information for Blank 2 is the number 120, which represents the administrative distance of the route. The missing information for Blank 3 is the letter C, which indicates that the route is directly connected.
34.
Refer to the exhibit. From the command prompt on the host, the command telnet 192.168.1.10 is typed. The response that is given is this:
Trying 192.168.1.10….Open
Password required, but none set
What is the most likely problem?
Correct Answer
E. The password command has not been entered in line configuration mode on RtrA.
Explanation
The most likely problem is that the password command has not been entered in line configuration mode on RtrA. This is indicated by the response "Password required, but none set" when trying to establish a telnet connection to the IP address 192.168.1.10. Without a password set, the telnet connection cannot be established.
35.
Refer to the exhibit. If router B is to be configured for EIGRP AS 100, which configuration must be entered?
Correct Answer
B. B(config-router)# network 192.168.10.4 0.0.0.3
B(config-router)# network 192.168.10.8 0.0.0.3
B(config-router)#network 192.168.10.128 0.0.0.63
Explanation
The correct configuration for router B to be configured for EIGRP AS 100 is to enter the network commands for the IP addresses 192.168.10.4, 192.168.10.8, and 192.168.10.128 with their corresponding subnet masks of 0.0.0.3, 0.0.0.3, and 0.0.0.63 respectively. This will enable router B to advertise these networks and participate in EIGRP AS 100.
36.
After several configuration changes are made to a router, the copy running-configuration startup-configuration command is issued. Where will the changes be stored?
Correct Answer
C. NVRAM
Explanation
The changes made to the router's configuration will be stored in NVRAM (Non-Volatile Random Access Memory). NVRAM is a type of memory that retains its data even when the power is turned off, making it an ideal location to store important configuration settings. Flash memory is used to store the router's operating system and other files, ROM (Read-Only Memory) contains firmware and cannot be modified, RAM (Random Access Memory) is volatile and does not retain data after power loss, and a TFTP server is a network device used for file transfers and not for storing router configurations.
37.
Refer to the exhibit. Two routers have been configured to use EIGRP. Packets are not being forwarded between the two routers. What could be the problem?
Correct Answer
D. An incorrect IP address was configured on a router interface.
Explanation
The problem could be that an incorrect IP address was configured on a router interface. This would prevent packets from being forwarded between the two routers because they would not have a valid IP address to communicate with each other.
38.
What are two features of a link-state routing protocol? (Choose two.)
Correct Answer(s)
B. Routers send triggered updates in response to a change.
C. Routers create a topology of the network by using information from other routers.
Explanation
Link-state routing protocols have two main features. First, routers send triggered updates in response to a change. This means that when a router detects a change in the network, such as a link going down or a new link being added, it immediately sends an update to all other routers to inform them of the change. Second, routers create a topology of the network by using information from other routers. Each router collects information about the network and its neighbors, and then uses this information to build a map of the entire network topology. This allows routers to make informed routing decisions based on the current state of the network.
39.
Refer to the exhibit. Routers A and B have EIGRP configured and automatic summarization has been disabled on both routers. Which router command is used to summarize the attached routes, and to which interface is this command applied? (Choose two.)
Correct Answer(s)
A. Ip summary-address eigrp 1 192.168.10.64 255.255.255.192
E. Serial interface on router A
Explanation
The command "ip summary-address eigrp 1 192.168.10.64 255.255.255.192" is used to summarize the attached routes. This command is applied to the serial interface on router A.
40.
A router has learned about network 192.168.168.0 through static and dynamic routing processes. Which route will appear in the routing table for this network if the router has learned multiple routes?
Correct Answer
D. S 192.168.168.0/24 [1/0] via 192.168.200.1
Explanation
The route that will appear in the routing table for network 192.168.168.0 is "S 192.168.168.0/24 [1/0] via 192.168.200.1". This is because the "S" indicates that the route was learned through a static routing process. The other routes were learned through dynamic routing processes (D, O, and R), which have higher administrative distances (90, 110, and 120 respectively) compared to the static route (1). Therefore, the static route with the lowest administrative distance will be chosen and appear in the routing table.
41.
Which sequence of commands is used to configure a loopback address on a router?
Correct Answer
D. Router1(config)# interface loopback 1
Router1(config-if)# ip address 192.168.1.1 255.255.255.255
Explanation
The correct answer is Router1(config)# interface loopback 1
Router1(config-if)# ip address 192.168.1.1 255.255.255.255. This is the correct sequence of commands to configure a loopback address on a router. The "interface loopback 1" command is used to enter the loopback interface configuration mode, and the "ip address 192.168.1.1 255.255.255.255" command is used to assign the IP address and subnet mask to the loopback interface. The subnet mask 255.255.255.255 is used to create a loopback address with a /32 prefix, which means it has a single host address.
42.
For Reference only... Choose A..
Correct Answer
A. I'm it...
Explanation
The given answer "I'm it" is the correct choice because it is the only option that is grammatically correct and makes sense in the given context. The phrase "I'm it" implies that the speaker is the one who is "it" in a game or activity, suggesting that they are the one who needs to perform a certain task or take on a specific role. The other options do not convey the same meaning and do not fit the context provided.
43.
Which encryption standard would most likely be used in an 802.11 standards-based wireless network environment?
Correct Answer
B. WPA2, which can use the more advanced AES for encryption
Explanation
WPA2 is the most likely encryption standard used in an 802.11 standards-based wireless network environment because it can utilize the more advanced AES (Advanced Encryption Standard) for encryption. AES is widely considered to be highly secure and is used by many organizations and industries for encryption purposes. Therefore, WPA2 with AES encryption would provide a strong level of security for wireless network communications.
44.
for Reference only.. Guess which one is correct....
Correct Answer
A. Me
Explanation
The correct answer is "Me" because all the options given are the same and there is no distinction between them.
45.
Reference Only... yes guess again... Follow the pattern...
Correct Answer
A. Me
Explanation
The given pattern is alternating between "Me" and "me". The first line starts with a capital "M" and the second line starts with a lowercase "m". This pattern continues throughout the sequence. Therefore, the next line in the pattern would start with a capital "M". Hence, the correct answer is "Me".
46.
Which two commands can be used to verify the content and placement of access control lists? (Choose two.)
Correct Answer(s)
C. Show running-config
E. Show access-lists
Explanation
The two commands that can be used to verify the content and placement of access control lists are "show running-config" and "show access-lists". The "show running-config" command displays the currently running configuration of the device, including any access control lists that have been configured. The "show access-lists" command specifically displays the configured access control lists on the device, allowing for verification of their content and placement.
47.
Which two keywords can be used in an access control list to replace a wildcard mask or address and wildcard mask pair? (Choose two.)
Correct Answer(s)
B. Host
D. Any
Explanation
The keywords "host" and "any" can be used in an access control list to replace a wildcard mask or address and wildcard mask pair. The "host" keyword is used to specify a single host IP address, while the "any" keyword is used to match any IP address. These keywords provide flexibility in defining access control rules by allowing specific host addresses or any address to be included in the access control list.
48.
Refer to the exhibit. NAT with overload is configured on router R1 and uses the NAT pool of addresses 209.165.201.9 through 209.165.201.10. What type of route would the ISP need in order for communication to occur between hosts in Company ABC and the Internet?
Correct Answer
E. A static route from the ISP is needed that uses the network number 209.165.201.8 and the mask 255.255.255.252.
Explanation
The correct answer is a static route from the ISP is needed that uses the network number 209.165.201.8 and the mask 255.255.255.252. This is because the NAT pool of addresses on router R1 is within the 209.165.201.8/30 network range. In order for communication to occur between hosts in Company ABC and the Internet, the ISP needs to have a static route that directs traffic for that network range to the router R1.
49.
What is the effect of the access control list wildcard mask 0.0.0.15? (Choose two.)
Correct Answer(s)
B. The last four bits of a supplied IP address will be ignored.
D. The first 28 bits of a supplied IP address will be matched.
Explanation
The access control list wildcard mask 0.0.0.15 will ignore the last four bits of a supplied IP address. This means that when matching an IP address against the ACL, only the first 28 bits of the supplied IP address will be considered. Therefore, any IP address that has the same first 28 bits as the ACL will be matched.
50.
Which three values or sets of values are included when creating an extended access control list statement? (Choose three.)
Correct Answer(s)
B. Access list number between 100 and 199
D. Destination address and wildcard mask
E. Source address and wildcard mask
Explanation
When creating an extended access control list statement, three values or sets of values that are included are: access list number between 100 and 199, destination address and wildcard mask, and source address and wildcard mask. These values are necessary to define the specific criteria for filtering and controlling traffic flow in a network. The access list number helps identify the access control list, while the destination and source addresses, along with their corresponding wildcard masks, specify the specific source and destination IP addresses that the access control list will apply to.