CISCO 4 Final Review

52 Questions | Total Attempts: 211

SettingsSettingsSettings
CISCO Quizzes & Trivia

Questions and Answers
  • 1. 
    Refer to the exhibit. Communication between two peers has failed. Based on the output that is shown, what is the most likely cause?
    • A. 

      Interface reset

    • B. 

      Unplugged cable

    • C. 

      Improper LMI type

    • D. 

      PPP negotiation failure

  • 2. 
    Refer to the exhibit. A network administrator is tasked with completing the Frame Relay topology that interconnects two remote sites. How should the point-to-point subinterfaces be configured on HQ to complete the topology?
    • A. 

      Frame-relay interface-dlci 103 on Serial 0/0/0.1 frame-relay interface-dlci 203 on Serial 0/0/0.2

    • B. 

      Frame-relay interface-dlci 301 on Serial 0/0/0.1 frame-relay interface-dlci 302 on Serial 0/0/0.2

    • C. 

      Frame-relay map ip 192.168.1.1 103 broadcast on Serial 0/0/0.1 frame-relay map ip 192.168.2.2 203 broadcast on Serial 0/0/0.2

    • D. 

      Frame-relay map ip 192.168.1.1 301 broadcast on Serial 0/0/0.1 frame-relay map ip 192.168.2.2 302 broadcast on Serial 0/0/0.2

  • 3. 
    Which data link layer encapsulation protocol is used by default for serial connections between two Cisco routers?
    • A. 

      ATM

    • B. 

      Frame Relay

    • C. 

      HDLC

    • D. 

      PPP

    • E. 

      SDLC

  • 4. 
    Refer to the exhibit. Company ABC expanded its business and recently opened a new branch office in another country. IPv6 addresses have been used for the company network. The data servers Server1 and Server2 run applications which require end-to-end functionality, with unmodified packets that are forwarded from the source to the destination. The edge routers R1 and R2 support dual stack configuration. What solution should be deployed at the edge of the company network in order to successfully interconnect both offices?
    • A. 

      A new WAN service supporting only IPv6

    • B. 

      NAT overload to map inside IPv6 addresses to outside IPv4 address

    • C. 

      A manually configured IPv6 tunnel between the edge routers R1 and R2

    • D. 

      Static NAT to map inside IPv6 addresses of the servers to an outside IPv4 address and dynamic NAT for the rest of the inside IPv6 addresses

  • 5. 
    Which variable is permitted or denied by a standard access control list?
    • A. 

      Protocol type

    • B. 

      Source IP address

    • C. 

      Source MAC address

    • D. 

      Destination IP address

    • E. 

      Destination MAC address

  • 6. 
    Refer to the exhibit. The link between the CTRL and BR_1 routers is configured as shown in the exhibit. Why are the routers unable to establish a PPP session?
    • A. 

      The clock rate must be 56000

    • B. 

      The usernames are misconfigured

    • C. 

      The IP addresses are on different subnets

    • D. 

      The clock rate is configured on the wrong end of the link

    • E. 

      The CHAP passwords must be different on the two routers

    • F. 

      Interface serial 0/0/0 on CTRL must connect to interface serial 0/0/1 on BR_1.

  • 7. 
    Which three statements accurately describe a security policy? (Choose three.)
    • A. 

      It creates a basis for legal action if necessary

    • B. 

      It defines a process for managing security violations

    • C. 

      It defines acceptable and unacceptable use of network resources

    • D. 

      The remote access policy is a component of the security policy that governs acceptable use of e-mail systems.

    • E. 

      It is kept private from users to prevent the possibility of circumventing security measures.

    • F. 

      It provides step-by-step procedures to harden routers and other network devices.

  • 8. 
    A network administrator has changed the VLAN configurations on his network switches over the past weekend. How can the administrator determine if the additions and changes improved performance and availability on the company intranet?
    • A. 

      Conduct a performance test and compare with the baseline that was established previously.

    • B. 

      Interview departmental secretaries and determine if they think load time for web pages has improved.

    • C. 

      Determine performance on the intranet by monitoring load times of company web pages from remote sites.

    • D. 

      Compare the hit counts on the company web server for the current week to the values that were recorded in previous weeks.

  • 9. 
    Refer to the exhibit. Headquarters is connected through the Internet to branch office A and branch office B. Which WAN technology would be best suited to provide secure connectivity between headquarters and both branch offices?
    • A. 

      ATM

    • B. 

      VPN

    • C. 

      ISDN

    • D. 

      Frame Relay

    • E. 

      Broadband DSL

  • 10. 
    Which statement about a VPN is true?
    • A. 

      VPN link establishment and maintenance is provided by LCP.

    • B. 

      DLCI addresses are used to identify each end of the VPN tunnel.

    • C. 

      VPNs use virtual Layer 3 connections that are routed through the Internet.

    • D. 

      Only IP packets can be encapsulated by a VPN for tunneling through the Internet

  • 11. 
    A company is deciding which WAN connection type it should implement between its main office and branch offices. The company wants to use a cost-effective service that provides virtual circuits between each office. The company also wants to be able to transmit variable-length packets on these circuits. Which solution best meets these requirements?
    • A. 

      ATM

    • B. 

      HDLC

    • C. 

      ISDN

    • D. 

      Frame Relay

  • 12. 
    A technician is talking to a colleague at a rival company and comparing DSL transfer rates between the two companies. Both companies are in the same city, use the same service provider, and have the same rate/service plan. What is the explanation for why company 1 reports higher download speeds than company 2 reports?
    • A. 

      Company 1 only uses microfilters at branch locations.

    • B. 

      Company 1 has a lower volume of POTS traffic than company 2 has.

    • C. 

      Company 2 is located farther from the service provider than company 1 is.

    • D. 

      Company 2 shares the connection to the DSLAM with more clients than company 1 shares with.

  • 13. 
    Refer to the exhibit. What is placed in the address field in the header of a frame that will travel from the DC router to the Orlando router?
    • A. 

      DLCI 123

    • B. 

      DLCI 321

    • C. 

      10.10.10.25

    • D. 

      10.10.10.26

    • E. 

      MAC address of the Orlando router

  • 14. 
    Refer to the exhibit. This router is being configured to use SDM, but the SDM interface of the router cannot be accessed. What is the cause of the problem?
    • A. 

      The VTY lines are not configured correctly

    • B. 

      The HTTP timeout policy is not configured correctly

    • C. 

      The authentication method is not configured correctly

    • D. 

      The username and password are not configured correctly

  • 15. 
    Which two devices can be used by teleworkers who need to connect to the company network across the PSTN for a few hours a day? (Choose two.)
    • A. 

      Router

    • B. 

      CSU/DSU

    • C. 

      DSL modem

    • D. 

      Cable modem

    • E. 

      Access server

    • F. 

      Dialup modem

  • 16. 
    An administrator is configuring a dual stack router with IPv6 and IPv4 using RIPng. The administrator receives an error message when trying to enter the IPv4 routes into RIPng. What is the cause of the problem?
    • A. 

      When IPv4 and IPv6 are configured on the same interface, all IPv4 addresses are over-written in favor of the newer technology.

    • B. 

      Incorrect IPv4 addresses are entered on the router interfaces

    • C. 

      RIPng is incompatible with dual-stack technology

    • D. 

      IPv4 is incompatible with RIPng

  • 17. 
    What is the function of an intrusion detection system on a network?
    • A. 

      To restrict access to only authorized users

    • B. 

      To detect attacks against a network and send logs to a management console

    • C. 

      To prevents attack against the network and provide active defense mechanisms

    • D. 

      To detect and prevent most viruses and many Trojan horse applications from spreading in the network

  • 18. 
    Refer to the exhibit. All devices are configured as shown in the exhibit. PC1 is unable to ping the default gateway. What is the cause of the problem?
    • A. 

      The default gateway is in the wrong subnet

    • B. 

      STP has blocked the port that PC1 is connected to

    • C. 

      Port Fa0/2 on S2 is assigned to the wrong VLAN.

    • D. 

      S2 has the wrong IP address assigned to the VLAN30 interface

  • 19. 
    When Frame Relay encapsulation is used, what feature provides flow control and exchanges information about the status of virtual circuits?
    • A. 

      LCP

    • B. 

      LMI

    • C. 

      DLCI

    • D. 

      Inverse ARP

  • 20. 
    A system administrator must provide Internet connectivity for ten hosts in a small remote office. The ISP has assigned two public IP addresses to this remote office. How can the system administrator configure the router to provide Internet access to all ten users at the same time?
    • A. 

      Configure DHCP and static NAT

    • B. 

      Configure dynamic NAT for ten users.

    • C. 

      Configure static NAT for all ten users

    • D. 

      Configure dynamic NAT with overload

  • 21. 
    A company is looking for a WAN solution to connect its headquarters site to four remote sites. What are two advantages that dedicated leased lines provide compared to a shared Frame Relay solution? (Choose two.)
    • A. 

      Reduced jitter

    • B. 

      Reduced costs

    • C. 

      Reduced latency

    • D. 

      The ability to burst above guaranteed bandwidth

    • E. 

      The ability to borrow unused bandwidth from the leased lines of other customers

  • 22. 
    What will be the result of adding the command ip dhcp excluded-address 192.168.24.1 192.168.24.5 to the configuration of a local router that has been configured as a DHCP server?
    • A. 

      Traffic that is destined for 192.168.24.1 and 192.168.24.5 will be dropped by the router.

    • B. 

      Traffic will not be routed from clients with addresses between 192.168.24.1 and 192.168.24.5.

    • C. 

      The DHCP server will not issue the addresses ranging from 192.168.24.1 to 192.168.24.5.

    • D. 

      The router will ignore all traffic that comes from the DHCP servers with addresses 192.168.24.1 and 192.168.24.5.

  • 23. 
    Refer to the exhibit. A host connected to Fa0/0 is unable to acquire an IP address from the DHCP server. The output of the debug ip dhcp server command shows “DHCPD: there is no address pool for 192.168.3.17″. What is the problem?
    • A. 

      The address 192.168.3.17 address is already in use by Fa0/0.

    • B. 

      The pool of addresses for the 192Network pool is configured incorrectly

    • C. 

      The ip helper-address command should be used on the Fa0/0 interface

    • D. 

      The 192.168.3.17 address has not been excluded from the 192Network pool

  • 24. 
    Refer to the exhibit. From the output of the show interfaces and ping commands, at which layer of the OSI model is a fault indicated?
    • A. 

      Application

    • B. 

      Transport

    • C. 

      Network

    • D. 

      Data link

    • E. 

      Physical

  • 25. 
    What three questions can be answered using data gathered from a baseline on a new network? (Choose three.)
    • A. 

      Are areas of the network experiencing high error rates?

    • B. 

      Will the disaster recovery procedures work correctly?

    • C. 

      What parts of the network have the highest volume?

    • D. 

      Does the organization require more network technicians?

    • E. 

      How does the network perform during peak periods?

    • F. 

      Are there any devices working at top capacity?

    • G. 

      What networks are the most susceptible to security attacks?

Back to Top Back to top