1.
Which two statements correctly describe RSTP?(choose two)
Correct Answer(s)
C. It requires the PortFast and UplinkFast features on switch ports.
D. It supports four states; blocking, listening, learning, and fowarding
Explanation
RSTP (Rapid Spanning Tree Protocol) is a standard protocol, not a Cisco proprietary protocol. It is designed to improve the convergence time of the spanning tree algorithm and can recalculate the spanning tree in less than 1 second, making the second statement correct. RSTP does not require the PortFast and UplinkFast features on switch ports, so the third statement is incorrect. RSTP supports four states: blocking, listening, learning, and forwarding, making the fourth statement correct. The last statement about requiring a full-duplex, point-to-point connection between switches for achieving the highest recalculation speed is not mentioned in the question, so we cannot determine its correctness.
2.
Which two statements correctly describe RIPv1 and RIPv2?(choose two)
Correct Answer(s)
B. Both advertise their routing updates out all active interfaces every 30 seconds.
C. Both have the same administrative distance value of 120
Explanation
RIPv1 and RIPv2 both advertise their routing updates out all active interfaces every 30 seconds. This means that they periodically send updates about their routing tables to neighboring routers. Additionally, both RIPv1 and RIPv2 have the same administrative distance value of 120. Administrative distance is a measure of the trustworthiness of a routing protocol, and a lower value indicates a higher priority. Therefore, RIPv1 and RIPv2 are considered equally reliable in terms of administrative distance.
3.
Refer to the exhibit. what is the purpose of assigning the IP address 192.168.30.1 to an access layer switch?
Correct Answer
C. To allow remote management of the switch
Explanation
The purpose of assigning the IP address 192.168.30.1 to an access layer switch is to allow remote management of the switch. By assigning an IP address, administrators can connect to the switch remotely and manage its configuration, monitor its performance, and troubleshoot any issues without needing physical access to the device. This provides convenience and flexibility in managing the switch, especially in large network environments where physically accessing each switch may not be practical or efficient.
4.
A sales representative is preparing to send sensitive information to corporate headquarters from a hotel room using the internet. Prior to the trip, the IT staff made the necessary provisions to allow secure Internet access. What solution was implemented for the sales representative?
Correct Answer
A. VPN
Explanation
The solution that was implemented for the sales representative is a VPN (Virtual Private Network). A VPN allows for secure and encrypted communication over the internet, making it an ideal choice for transmitting sensitive information. It creates a private network connection between the sales representative's device and the corporate headquarters, ensuring that the data is protected from unauthorized access or interception.
5.
Refer to the exhibit. If router RTA fails, Which statement is true?
Correct Answer
A. Hosts A and B can reach each other, but cannot reach hosts C and D or the server.
Explanation
If router RTA fails, hosts A and B will still be able to reach each other because they are connected to the same switch. However, they will not be able to reach hosts C and D or the server because these devices are connected to a different switch, which is dependent on router RTA for communication between the two switches.
6.
Refer to the exhibit. The network administrator has configured R1, R2, and R3 to use RIPv2, and the network is fully converged. The hosts on the internal network are able to access R2, but they are unable to access the Internet.How can the administrator solve this problem?
Correct Answer
B. Configure a default route on R2 and propagate it via RIPv2 to routers R1 and R3.
Explanation
To solve the problem of the internal network being unable to access the internet, the administrator should configure a default route on R2 and propagate it via RIPv2 to routers R1 and R3. By configuring a default route on R2, any traffic that is not destined for the internal network will be forwarded to R2. This default route will then be propagated to routers R1 and R3 via RIPv2, allowing them to forward the traffic to R2 for internet access.
7.
What are two benefits of implementing VLANs in an enterprise network? (Choose two.)
Correct Answer(s)
B. Provides segmentation of broadcast domains
D. Allows for the logical grouping of devices despite pHysical location
Explanation
Implementing VLANs in an enterprise network provides segmentation of broadcast domains, which helps to reduce network congestion and improve overall network performance. It also allows for the logical grouping of devices despite their physical location, enabling more flexibility in network management and easier implementation of security policies.
8.
Refer to the exhibit. R1 is using the default OSPF operation. Which IP address will be used as the router ID of R1?
Correct Answer
D. 10.1.1.1
Explanation
The router ID in OSPF is used to uniquely identify each router in the OSPF domain. By default, the router ID is determined by selecting the highest IP address of any of the router's loopback interfaces. If a loopback interface is not configured, the highest IP address of any of the router's physical interfaces will be used. In this case, since there is no information given about loopback interfaces, we can assume that the highest IP address of any of R1's physical interfaces is 10.1.1.1, therefore it will be used as the router ID.
9.
In which VTP mode can a switch create VLANs, ignore VTP messages, and not pass local VLAN information to other VTP domainmembers?
Correct Answer
D. Transparent
Explanation
In transparent mode, a switch can create VLANs independently without relying on VTP messages from other switches. It ignores VTP messages received from other switches and does not pass on its local VLAN information to other switches in the VTP domain. This allows the switch to operate autonomously in terms of VLAN management, making it suitable for environments where VLAN configurations need to be controlled locally and not propagated across the network.
10.
Refer to the exhibit. Which VTP function will this switch perform?
Correct Answer
B. It will send VTP messages to other attached switches.
Explanation
The given answer states that the switch will send VTP messages to other attached switches. This means that the switch will participate in VTP (VLAN Trunking Protocol) and will send updates about VLAN configurations to other switches in the network. This allows for VLAN information to be synchronized across multiple switches, ensuring consistency in VLAN configurations throughout the network.
11.
Which component of the Cisco Enterprise Architecture manages server farms?
Correct Answer
C. Enterprise edge
Explanation
The enterprise edge component of the Cisco Enterprise Architecture is responsible for managing server farms. It acts as the boundary between the internal network and external networks, providing connectivity and security for the server farms. This component ensures that the server farms are accessible to users within the enterprise while also protecting them from external threats.
12.
Why is UDP preferred for transmission of video traffic?
Correct Answer
D. It has low overhead.
Explanation
UDP is preferred for transmission of video traffic because it has low overhead. Unlike TCP, which requires a three-way handshake and retransmits lost packets, UDP does not have these mechanisms. This makes UDP faster and more efficient for transmitting real-time video data, as it does not waste time on establishing connections or retransmitting lost packets. Instead, UDP simply sends the video packets as quickly as possible, resulting in lower latency and smoother video playback.
13.
Refer to the exhibit. All switches are configured with default bridge priority. Which two ports will be STP root ports if all links are operatingat the same bandwidth? (Choose two.)
Correct Answer(s)
B. Fa0/2 interface of switch A
D. Fa0/2 interface of switch B
Explanation
The STP root port is the port on a switch that provides the shortest path to the root bridge. In this scenario, the root bridge is not specified, but it can be assumed that it is not any of the switches A, B, or C since they all have default bridge priority. The root ports will be the ports on switches A and B that are connected to the switch with the lowest bridge ID. Since the bandwidth of all links is the same, the tiebreaker for the root port selection will be the lowest port ID. Therefore, the root ports will be the Fa0/2 interface of switch A and the Fa0/2 interface of switch B.
14.
Refer to the exhibit. R1 and R2 are connected via serial interfaces. Both interfaces show that there is Layer 2 connectivity betweenthem. The administrator verifies that CDP is operational; however, pings between the two interfaces are unsuccessful. What is the causeof this connectivity problem?
Correct Answer
B. Incorrect subnet mask on R2
Explanation
The cause of the connectivity problem is the incorrect subnet mask on R2. The subnet mask determines the network portion and the host portion of an IP address. If the subnet mask is incorrect, it can result in the devices being on different networks, preventing them from communicating with each other. In this case, even though CDP is operational and Layer 2 connectivity is established, the incorrect subnet mask on R2 is causing the pings between the two interfaces to fail.
15.
Refer to the exhibit. Which route will be added to the routing table of R1 as a result of running the commands displayed?
Correct Answer
B. D 192.168.0.0/22 is a summary, Null0
Explanation
The route that will be added to the routing table of R1 is "D 192.168.0.0/22 is a summary, Null0". This is indicated by the line "D 192.168.0.0/22 [90/203010] via 10.1.1.2, 00:00:10, Serial0/0/0" in the given commands. The "D" indicates that it is a summary route, the "192.168.0.0/22" is the network address with a subnet mask of /22, and "Null0" represents the next hop interface.
16.
Refer to the exhibit. Which set of letters would appear at the beginning of the displayed routing table entries?
Correct Answer
C. 1=R, 2=D, 3=O, 4=S
Explanation
The correct answer is 1=R, 2=D, 3=O, 4=S. This is because the letters in the routing table entries are listed in the order of the corresponding numbers. So, the first letter in the routing table entry is "R", the second letter is "D", the third letter is "O", and the fourth letter is "S".
17.
Refer to the exhibit. The administrator applies ACL 101 outbound on the Fa0/1 interface of R1 as displayed. How will this ACL affect traffic at R1?
Correct Answer
A. All traffic that exits the Fa0/1 interface will be denied.
Explanation
The ACL 101 is applied outbound on the Fa0/1 interface of R1. Outbound ACLs are used to filter traffic that is leaving the interface. In this case, the ACL denies all traffic that exits the Fa0/1 interface. Therefore, all traffic that tries to leave through this interface will be denied.
18.
Refer to the exhibit. The network administrator configured the routers using the displayed commands. What is the reason the EIGRPnetwork fails to converge?
Correct Answer
D. Autosummarization is enabled on both routers.
Explanation
The reason the EIGRP network fails to converge is because autosummarization is enabled on both routers. Autosummarization is a feature in EIGRP that automatically summarizes routes at network boundaries, which can cause routing issues when multiple routers are involved. In this case, since both routers have autosummarization enabled, it is likely causing conflicting route summarization, leading to convergence failure.
19.
Which two STP states allow a switch to learn MAC addresses? (Choose two.)
Correct Answer(s)
C. Learning
E. Forwarding
Explanation
The STP states of "learning" and "forwarding" allow a switch to learn MAC addresses. In the "learning" state, the switch listens to network traffic and adds the source MAC addresses of incoming frames to its MAC address table. In the "forwarding" state, the switch actively forwards network traffic based on the MAC address table entries it has learned. The other options, "blocking," "listening," and "disabled," do not allow the switch to learn MAC addresses.
20.
While using the Class A addressing scheme, a network administrator decides to use the 255.255.254.0 subnet mask in the networkconfiguration. How many host addresses can be created for each subnetwork in this addressing scheme?
Correct Answer
B. 512
Explanation
In the Class A addressing scheme, the first octet is reserved for the network address, leaving 7 bits for the host address. With a subnet mask of 255.255.254.0, the last octet is divided into 8 subnets, each with 2^7 (128) possible host addresses. However, the first and last addresses in each subnet are reserved for network and broadcast addresses respectively, so the number of usable host addresses per subnet is 128-2=126. Therefore, the correct answer is 126, which is closest to 512.
21.
Refer to the exhibit. The network administrator has implemented NAT on R1. Which two addresses are valid inside global addresses?(Choose two.)
Correct Answer(s)
D. 198.133.219.102
E. 198.133.219.103
Explanation
The two valid inside global addresses are 198.133.219.102 and 198.133.219.103. These addresses are valid because they are public IP addresses that can be used on the internet. The other addresses, 192.168.1.1 and 192.168.1.2, are private IP addresses that are reserved for use within a local network and cannot be routed on the internet.
22.
Refer to the exhibit. Using the command ip route 192.168.1.0 255.255.255.0 10.1.1.2 150, the network administrator configures a newroute. Which statement describes how the router will use the new route?
Correct Answer
D. The new route will be displayed in the routing table if the dynamic routing information for this route is lost.
Explanation
The given command "ip route 192.168.1.0 255.255.255.0 10.1.1.2 150" configures a new static route. This means that the network administrator is manually specifying the path for traffic destined to the 192.168.1.0/24 network. However, this route will only be used if the dynamic routing information for this route is lost. In other words, if the router is unable to find a suitable dynamic route for the 192.168.1.0/24 network, it will use the new static route instead. Therefore, the new route will be displayed in the routing table if the dynamic routing information for this route is lost.
23.
Which route will be excluded from the updates that are sent to the neighbor routers?
Correct Answer
A. R 192.168.1.0/24 [120/1] via 192.168.100.1, 00:00:12, FastEthernet0/1
Explanation
The route that will be excluded from the updates sent to the neighbor routers is R 192.168.1.0/24 [120/1] via 192.168.100.1, 00:00:12, FastEthernet0/1. This is because the metric value of 1 is the lowest among all the routes listed. In a routing protocol like OSPF, the route with the lowest metric is considered the best route and is chosen to be included in the updates sent to the neighbor routers.
24.
Refer to the exhibit. How many routers have established OSPF adjacencies with R1?
Correct Answer
A. 2
Explanation
Based on the given exhibit, it can be inferred that R1 has established OSPF adjacencies with only two routers. This can be determined by observing the number of lines connecting R1 to other routers in the exhibit. Since there are only two lines, it indicates that R1 has formed adjacencies with two routers. Therefore, the correct answer is 2.
25.
Which Frame Relay component provides connection status information about PVCs in the network?
Correct Answer
B. LMI
Explanation
LMI stands for Local Management Interface, which is a protocol used in Frame Relay networks to exchange control information between the network devices and the service provider. LMI provides connection status information about PVCs (Permanent Virtual Circuits) in the network, allowing devices to monitor the availability and status of the connections. CIR (Committed Information Rate) is a bandwidth parameter, DLCI (Data Link Connection Identifier) is a virtual circuit identifier, and FECN (Forward Explicit Congestion Notification) is a bit used to indicate network congestion.
26.
Refer to the exhibit. R3 is announcing all displayed internal networks as a summary address to R4. Which summary address will bemost specific?
Correct Answer
C. 172.16.0.0/22
Explanation
The summary address 172.16.0.0/22 is the most specific because it has the smallest subnet mask (22 bits) compared to the other options. The smaller the subnet mask, the more specific the summary address is.
27.
Refer to the exhibit. What is the result of configuring the newly installed R1 with the exhibited command?
Correct Answer
D. It configures a static route for all packets with the source network address 192.168.1.128/26.
Explanation
The exhibited command "ip route 192.168.1.128 255.255.255.192 10.1.1.2" configures a static route on R1. This static route specifies that all packets with the source network address 192.168.1.128/26 should be forwarded through the interface with the IP address 10.1.1.2. Therefore, the correct answer is that it configures a static route for all packets with the source network address 192.168.1.128/26.
28.
Which routing protocol is unable to support discontiguous networks?
Correct Answer
B. RIPv2
Explanation
RIPv2 is unable to support discontiguous networks because it does not include the subnet mask in its routing updates. This means that RIPv2 assumes that all networks within its domain are contiguous, or directly connected. Therefore, if there are discontiguous networks present, RIPv2 will not be able to accurately route traffic to those networks.
29.
Which EIGRP packet type is sent when DUAL places a route in the active state?
Correct Answer
C. Query
Explanation
When DUAL (Diffusing Update Algorithm) places a route in the active state, it sends a query packet. The query packet is used to search for an alternate route in case the current route fails or becomes unavailable. By sending a query packet, the router asks its neighboring routers if they have a feasible successor for the route. This helps in maintaining a loop-free and efficient routing network.
30.
What is the difference between the passive and active route status as displayed in an EIGRP topology table?
Correct Answer
C. Routes that are active are being recalculated by DUAL.
Explanation
The correct answer is "Routes that are active are being recalculated by DUAL." In EIGRP, DUAL (Diffusing Update Algorithm) is responsible for calculating the best route to a destination. When a route is active, it means that DUAL is actively recalculating the route, considering any changes in the network. This allows for dynamic routing and ensures that the best path is always chosen. Passive routes, on the other hand, are not updated and do not participate in the recalculation process. They are simply stored in the topology table for reference.
31.
Which function does the access layer provide in a hierarchical internetworking model?
Correct Answer
C. It provides an entry point for hosts into the network.
Explanation
The access layer in a hierarchical internetworking model provides an entry point for hosts into the network. This layer is responsible for connecting end devices such as computers, printers, and IP phones to the network. It provides access to the network resources and services for these devices. The access layer also includes functions like port security, VLAN assignment, and authentication to ensure that only authorized devices can connect to the network.
32.
Refer to the exhibit. Switch1 and Switch2 are connected to each other via a trunk link that has been tested and is working properly. is VTP unable to propagate VLANs from one switch to the other?
Correct Answer
C. The VTP domain name is different on both switches.
Explanation
The VTP domain name is different on both switches. VTP (VLAN Trunking Protocol) is used to propagate VLAN information across switches in a domain. In order for VLANs to be propagated from one switch to another, both switches must be in the same VTP domain, which means they must have the same domain name. Since the domain name is different on both switches, VTP is unable to propagate VLANs between them.
33.
What is a feature of PAP authentication?
Correct Answer
B. It sends the username/password pair across the link in clear text.
Explanation
PAP authentication is a simple and insecure authentication method that sends the username and password pair across the link in clear text. This means that the credentials can be easily intercepted and read by anyone with access to the network. As a result, PAP authentication does not provide any encryption or protection for the transmitted data.
34.
Refer to the exhibit. What information can be determined from the exhibited command?
Correct Answer
C. This route has an administrative distance of 1.
Explanation
The exhibited command specifies the administrative distance of the route to the 10.1.1.2 host, which is 1. The administrative distance is a value used by routers to determine the trustworthiness of a particular route. A lower administrative distance indicates a more preferred route. In this case, since the administrative distance is 1, it means that this route is the most preferred and will be chosen over other routes with higher administrative distances.
35.
What are two characteristics of EIGRP? (Choose two.)
Correct Answer(s)
B. It sends small hello packets to maintain knowledge of its neighbors.
D. It supports equal and unequal cost load balancing.
Explanation
EIGRP (Enhanced Interior Gateway Routing Protocol) has two characteristics mentioned in the answer. Firstly, it sends small hello packets to maintain knowledge of its neighbors. These hello packets are used to establish and maintain neighbor relationships, allowing routers to exchange routing information effectively. Secondly, EIGRP supports equal and unequal cost load balancing. This means that it can distribute traffic across multiple paths, even if the paths have different costs associated with them. This load balancing feature helps in optimizing network performance and utilizing available resources efficiently.
36.
What are two reasons for assigning switch ports to different VLANs? (Choose two.)
Correct Answer(s)
C. They decrease the size of the collision domain.
E. They logically group hosts according to their function.
Explanation
Assigning switch ports to different VLANs decreases the size of the collision domain by dividing the network into smaller broadcast domains. This reduces the chances of collisions and improves network performance. Additionally, assigning switch ports to different VLANs allows for logical grouping of hosts according to their function, which simplifies network management and enhances security by isolating traffic between different groups of hosts.
37.
Refer to the exhibit. Users on the 172.30.20.0/24 network are unable to access any of the servers located on the 192.168.0.0/23 network.Given the network topology and OSPF configuration, what two problems exist in this network? (Choose two.)
Correct Answer(s)
B. There is a network statement missing.
C. Network 172.30.20.0 has an incorrect wildcard mask.
Explanation
The network statement is missing, which means that the OSPF process is not advertising the 172.30.20.0/24 network. This results in the users on that network being unable to access the servers on the 192.168.0.0/23 network. Additionally, the network 172.30.20.0 has an incorrect wildcard mask, which further prevents proper routing and connectivity between the networks.
38.
Refer to the exhibit. What are two possible procedures that would ensure that R1 would always be the DR for OSPF area 0? (Choosetwo.)
Correct Answer
E. Set the OSPF priority to 0 on the R3 FastEthernet0/0 interface.
Explanation
Setting the OSPF priority to 0 on the R3 FastEthernet0/0 interface would ensure that R1 always becomes the Designated Router (DR) for OSPF area 0. OSPF uses the DR/BDR (Backup Designated Router) election process to select a router that will act as the DR and BDR for the network. The router with the highest OSPF priority becomes the DR, and if there is a tie, the router with the highest router ID is selected. By setting the OSPF priority to 0 on the R3 FastEthernet0/0 interface, R3 will have a lower priority than R1 and R2, making R1 the preferred DR.
39.
Refer to the exhibit. OSPF is enabled and the network is fully converged. Which two routers will be designated as the DR and BDR, the routers are booted at the same time? (Choose two.)
Correct Answer
B. R4 will be the DR.
Explanation
Based on the information provided, the correct answer is R4 will be the DR. This is because the router with the highest OSPF priority value will become the DR (Designated Router). If two routers have the same priority, the router with the highest router ID will become the DR. In this case, R4 has the highest priority value (100) among all the routers, so it will be selected as the DR.
40.
Refer to the exhibit. A router has learned the six routes that are shown in the exhibit. Which two routes will be installed in the routingtable? (Choose two.)
Correct Answer(s)
B. 2
E. 6
Explanation
The router will install routes 2 and 6 in its routing table. This is because these routes have the lowest administrative distance. Administrative distance is a measure of the trustworthiness of a routing protocol, with lower values indicating higher trust. In this case, routes 2 and 6 have an administrative distance of 1, which is lower than the administrative distance of routes 1, 3, and 5. Therefore, routes 2 and 6 will be chosen to be installed in the routing table.
41.
Which three statements relate to PPP encapsulation and CHAP authentication? (Choose three.)
Correct Answer(s)
B. CHAP uses repeated challenges for verification.
C. PPP encapsulation is configured in interface mode.
E. CHAP uses a challenge/response that is based on the MD5 hash algorithm.
Explanation
CHAP uses repeated challenges for verification. This means that the authentication process involves multiple challenges and responses between the authenticating entity and the remote peer, increasing the security of the authentication process.
PPP encapsulation is configured in interface mode. PPP (Point-to-Point Protocol) encapsulation is a protocol used to establish a direct connection between two nodes over a serial link. It is configured on the interface level to enable PPP encapsulation on that specific interface.
CHAP uses a challenge/response that is based on the MD5 hash algorithm. CHAP (Challenge-Handshake Authentication Protocol) uses a challenge/response mechanism for authentication. The challenge is sent by the authenticating entity, and the response is generated by the remote peer using the MD5 hash algorithm. This ensures the integrity and security of the authentication process.
42.
Refer to the exhibit. A network support technician has been asked to set an IP address on one of the FastEthernet interfaces on a newrouter. What is causing the interface to reject the address?
Correct Answer
B. The technician is using a network address.
Explanation
The interface is rejecting the address because the technician is using a network address. A network address is the address that represents the entire network, so it cannot be assigned to an individual interface. Each interface on a router or a device should have a unique IP address within the network.
43.
Which two wildcard masks are required in an extended access list statement that blocks the traffic from host 172.16.1.2 to network192.168.1.0/25? (Choose two.)
Correct Answer(s)
D. 0.0.0.127
E. 0.0.0.0
Explanation
The correct answer is 0.0.0.127 and 0.0.0.0. The first wildcard mask 0.0.0.127 is required because it allows only the last bit of the host IP address to vary, meaning it matches the specific host IP address 172.16.1.2. The second wildcard mask 0.0.0.0 is required because it matches all possible values for the network portion of the destination IP address, effectively blocking traffic to any destination network.
44.
What are two benefits of using ACLs? (Choose two.)
Correct Answer(s)
A. They provide IP filtering.
E. They identify traffic for multiple uses such as QoS and NAT.
Explanation
ACLs, or Access Control Lists, provide IP filtering by allowing or denying specific types of traffic based on IP addresses, ports, or protocols. This helps in enhancing network security by controlling access to network resources. Additionally, ACLs identify traffic for multiple uses such as Quality of Service (QoS) and Network Address Translation (NAT), allowing for better network performance and efficient use of network resources.
45.
Refer to the exhibit. Which IP address can be used at the Fa0/0 interface of R1 to enable host A to access the Internet?
Correct Answer
C. 192.168.1.63/27
Explanation
The correct IP address that can be used at the Fa0/0 interface of R1 to enable host A to access the Internet is 192.168.1.63/27. This is because the /27 subnet mask allows for 30 usable host addresses, and the IP address 192.168.1.63 falls within the range of usable addresses. Additionally, this IP address is in the same network as host A (192.168.1.65/27), which means they can communicate with each other.
46.
Which two statements are true about untagged frames on a switch? (Choose two.)
Correct Answer
E. Untagged frames that are received on an 802.1Q trunk port are members of the native VLAN.
Explanation
Untagged frames that are received on an 802.1Q trunk port are members of the native VLAN. This means that when a switch receives an untagged frame on a trunk port, it assumes that the frame belongs to the native VLAN, which is the default VLAN for that trunk port. Untagged frames can pass through access ports, but they cannot pass through trunk ports without being assigned to the native VLAN. The statement about untagged frames minimizing delays associated with inspection of the VLAN ID tag is not true, as untagged frames do not have a VLAN ID tag to inspect.
47.
Refer to the exhibit. A network engineer at the BRANCH1 office wishes to use network summarization to announce the fewest networkspossible to the MAIN office. If the summaries include only the networks that are shown and no others, how many networks will beannounced?
Correct Answer
A. 1
Explanation
The exhibit is not provided, so it is not possible to generate an explanation for the given correct answer.
48.
What are two features of a standard IP ACL? (Choose two.)
Correct Answer(s)
B. It filters the packet based on the source IP address only.
E. It can only filter inbound traffic on an interface.
Explanation
The two features of a standard IP ACL are that it filters the packet based on the source IP address only and that it can only filter inbound traffic on an interface. Standard IP ACLs do not consider the entire protocol, but only the source IP address. Additionally, they can only be applied to inbound traffic on an interface, not outbound traffic.
49.
An organization is planning to expand by adding five new branches. After the expansion, it will require secured, full-time, andsimultaneous connectivity for its new branch offices with the central office. There is only one port available on the central office router.Which WAN technology can be used in this situation?
Correct Answer
C. Frame Relay
Explanation
Frame Relay is the correct answer for this question because it is a WAN technology that allows multiple branch offices to connect to a central office using a single port on the central office router. Frame Relay uses virtual circuits to establish connections between the central office and the branch offices, providing secure and simultaneous connectivity. This makes it an ideal choice for the organization's expansion plans, as it can support the required connectivity for all five new branches using just one port on the central office router.
50.
Refer to the exhibit. None of the hosts in network A are able to access the Internet. How can this problem be resolved?
Correct Answer
B. Configure the access list for the correct network.
Explanation
To resolve the issue of hosts in network A not being able to access the Internet, configuring the access list for the correct network is the appropriate solution. This will ensure that the necessary traffic is allowed through the network and can reach the Internet. By properly configuring the access list, the hosts in network A will be able to establish a connection and access the Internet successfully.