Ewan Practice Final Exam

88 Questions | Total Attempts: 212

SettingsSettingsSettings
Ewan Practice Final Exam

EWAN Practice Final Exam


Questions and Answers
  • 1. 
    Which two statements are true about IPv6 link local addresses? (Choose two.)
    • A. 

      They begin with the 2000::/3 prefix.

    • B. 

      They begin with the FE80::/10 prefix.

    • C. 

      They must be manually configured by the administrator.

    • D. 

      They are assigned to a host by a stateless autoconfiguration process.

  • 2. 
    Refer to the exhibit. A network administrator has issued the commands that are shown on Router1 and Router2. A later review of the routing tables reveals that neither router is learning the LAN network of the neighbor router. What is most likely the problem with the RIPng configuration?
    • A. 

      The serial interfaces are in different subnets.

    • B. 

      The RIPng process is not enabled on interfaces.

    • C. 

      The RIPng processes do not match between Router1 and Router2.

    • D. 

      The RIPng network command is missing from the IPv6 RIP configuration.

  • 3. 
    Refer to the exhibit. Routers R1 and R2 have been configured with EIGRP in the same autonomous system. Computers PC1 and PC2 are not able to ping each other. Further investigation has revealed that the route to 192.168.10.0 is missing from the routing table on R2. What is the cause of the problem?
    • A. 

      The networks are not correctly summarized.

    • B. 

      The FastEthernet interfaces on R1 are configured as passive.

    • C. 

      The network statements on R2 are incorrectly configured.

    • D. 

      EIGRP on R1 does not recognize the 192.168.10.0 network.

  • 4. 
    Refer to the exhibit. Router1 and Router2 each support separate areas of a data center, and are connected via a crossover cable. Resources attached to Router1 are unable to connect to resources attached to Router2. What is the likely cause?
    • A. 

      The crossover cable is faulty.

    • B. 

      The IP addressing is incorrect.

    • C. 

      There is a Layer 2 problem with the router connection.

    • D. 

      The upper layers are experiencing an unspecified problem.

    • E. 

      One or both of the Ethernet interfaces are not working correctly.

  • 5. 
    Which characteristic of VPN technology prevents the contents of data communications from being read by unauthorized parties?
    • A. 

      QoS

    • B. 

      Latency

    • C. 

      Reliability

    • D. 

      Confidentiality

  • 6. 
    What translation method will allow a server to always keep the same public address?
    • A. 

      Static NAT

    • B. 

      Dynamic NAT

    • C. 

      Static NAT with overload

    • D. 

      Dynamic NAT with overload

  • 7. 
    Refer to the exhibit. A network administrator has been asked to configure PPP with PAP authentication over the serial link between routers R1 and R2. What additional configuration should be included on both routers to complete the task?
    • A. 
    • B. 
    • C. 
    • D. 
  • 8. 
    Which statement is true about NCP?
    • A. 

      Link termination is the responsibility of NCP.

    • B. 

      Each network protocol has a corresponding NCP.

    • C. 

      NCP establishes the initial link between PPP devices.

    • D. 

      NCP tests the link to ensure that the link quality is sufficient.

  • 9. 
    While configuring a Frame Relay connection, when should a static Frame Relay map be used?
    • A. 

      The remote router is a non-Cisco router

    • B. 

      The local router is configured with subinterfaces

    • C. 

      Broadcast traffic and multicast traffic over the PVC must be controlled

    • D. 

      Globally significant rather than locally significant DLCIs are being used

  • 10. 
    Refer to the exhibit. Routers R1 and R2 are both configured for single area OSPF. Users who are connected to switch S1 are unable to access database applications that run on servers that are connected to S2. The network engineer is working remotely and only has the information that is shown in the exhibit to direct initial troubleshooting efforts. Based on the exhibit, which OSI layer is the most appropriate to start with for a divide-and-conquer approach?
    • A. 

      Network layer

    • B. 

      Application layer

    • C. 

      Data-link layer

    • D. 

      Physical layer

  • 11. 
    Refer to the exhibit. Which statement correctly describes how Router1 processes an FTP request entering interface s0/0/0, destined for an FTP server at IP address 192.168.1.5?
    • A. 

      It matches the incoming packet to the access-list 201 permit any any statement and allows the packet into the router.

    • B. 

      It reaches the end of ACL 101 without matching a condition and drops the packet because there is no access-list 101 permit any any statement.

    • C. 

      It matches the incoming packet to the access-list 101 permit ip any 192.168.1.0 0.0.0.255 statement, ignores the remaining statements in ACL 101, and allows the packet into the router.

    • D. 

      It matches the incoming packet to the access-list 201 deny icmp 192.168.1.0 0.0.0.255 any statement, continues comparing the packet to the remaining statements in ACL 201 to ensure that no subsequent statements allow FTP, and then drops the packet.

  • 12. 
    Which three statements accurately describe attributes of a security policy? (Choose three.)
    • A. 

      It creates a basis for legal action if necessary.

    • B. 

      It should not be altered once it is implemented.

    • C. 

      It defines a process for managing security violations.

    • D. 

      It focuses primarily on threats from outside of the organization.

    • E. 

      It defines acceptable and unacceptable use of network resources.

    • F. 

      It provides step-by-step procedures to harden routers and other network devices.

  • 13. 
    A recently patched application server is experiencing response time problems. The network on which the application server is located has been experiencing occasional outages that the network team believes may be related to recent routing changes. Network and application teams have been notified to work on their respective issues. Which statement applies to this situation?
    • A. 

      Only results from the software package should be tested as the network is designed to accommodate the proposed software platform.

    • B. 

      Scheduling will be easy if the network and software teams work independently.

    • C. 

      It will be difficult to isolate the problem if two teams are implementing changes independently.

    • D. 

      Results from changes will be easier to reconcile and document if each team works in isolation.

  • 14. 
    What effect would the Router1(config-ext-nacl)# permit tcp 172.16.4.0 0.0.0.255 any eq www command have when implemented inbound on the f0/0 interface?
    • A. 

      All TCP traffic is permitted, and all other traffic is denied.

    • B. 

      The command is rejected by the router because it is incomplete.

    • C. 

      All traffic from 172.16.4.0/24 is permitted anywhere on any port.

    • D. 

      Traffic originating from 172.16.4.0/24 is permitted to all TCP port 80 destinations.

  • 15. 
    What will be the result of adding the command ip dhcp excluded-address 192.168.24.1 192.168.24.5 to the configuration of a local router that has been configured as a DHCP server?
    • A. 

      Traffic that is destined for 192.168.24.1 and 192.168.24.5 will be dropped by the router.

    • B. 

      Traffic will not be routed from clients with addresses between 192.168.24.1 and 192.168.24.5.

    • C. 

      The DHCP server will not issue the addresses ranging from 192.168.24.1 to 192.168.24.5.

    • D. 

      The router will ignore all traffic that comes from the DHCP servers with addresses 192.168.24.1 and 192.168.24.5.

  • 16. 
    What are two effective measures for securing routers? (Choose two.)
    • A. 

      Enable SNMP traps.

    • B. 

      Disable the HTTP server service.

    • C. 

      Use quotes, phrases, or poems to create passphrases.

    • D. 

      Configure remote administration through VTY lines for Telnet access.

    • E. 

      Protect all active router interfaces by configuring them as passive interfaces.

  • 17. 
    Refer to the exhibit. A network administrator has been asked to configure PPP with CHAP authentication over the serial link between routers R1 and R2. What additional configuration should be included on both routers to complete the task?
    • A. 
    • B. 
    • C. 
    • D. 
  • 18. 
    What is a major characteristic of a worm?
    • A. 

      Malicious software that copies itself into other executable programs

    • B. 

      Tricks users into running the infected software

    • C. 

      A set of computer instructions that lies dormant until triggered by a specific event

    • D. 

      Exploits vulnerabilities with the intent of propagating itself across a network

  • 19. 
    Which protocol is implicitly denied at the end of an IPv4 access list?
    • A. 

      IP

    • B. 

      TCP

    • C. 

      UDP

    • D. 

      HTTP

  • 20. 
    Refer to the exhibit. Partial results of the show access-lists and show ip interface FastEthernet 0/1 commands for router R3 are shown. There are no other ACLs in effect. Host A is unable to telnet to host B. Which action will correct the problem but still restrict other traffic between the two networks?
    • A. 

      Apply the ACL in the inbound direction.

    • B. 

      Apply the ACL on the FastEthernet 0/0 interface.

    • C. 

      Reverse the order of the TCP protocol statements in the ACL.

    • D. 

      Modify the second entry in the list to permit tcp host 192.168.10.10 any eq telnet.

  • 21. 
    In addition to standard security procedures, what additional feature of VPN technology supports privacy between end users?
    • A. 

      The implementation of a tunneling protocol

    • B. 

      The use of only baseband connections

    • C. 

      A requirement of active authentication via a RADIUS server

    • D. 

      The use of a call-back procedure to verify user credentials

  • 22. 
    Which type of ACL will permit traffic inbound into a private network only if an outbound session has already been established between the source and destination?
    • A. 

      Extended

    • B. 

      Reflexive

    • C. 

      Standard

    • D. 

      Time-based

  • 23. 
    When would the multipoint keyword be used in Frame Relay PVCs configuration?
    • A. 

      When global DLCIs are in use

    • B. 

      When using physical interfaces

    • C. 

      When multicasts must be supported

    • D. 

      When participating routers are in the same subnet

  • 24. 
    A network administrator has moved the company intranet web server from a switch port to a dedicated router interface. How can the administrator determine how this change has affected performance and availability on the company intranet?
    • A. 

      Conduct a performance test and compare with the baseline that was established previously.

    • B. 

      Determine performance on the intranet by monitoring load times of company web pages from remote sites.

    • C. 

      Interview departmental administrative assistants and determine if they think load time for web pages has improved.

    • D. 

      Compare the hit counts on the company web server for the current week to the values that were recorded in previous weeks.

  • 25. 
    A network administrator is instructing a technician on best practices for applying ACLs. Which suggestion should the administrator provide?
    • A. 

      Named ACLs are less efficient than numbered ACLs.

    • B. 

      Standard ACLs should be applied closest to the core layer.

    • C. 

      ACLs applied to outbound interfaces are the most efficient.

    • D. 

      Extended ACLs should be applied closest to the source that is specified by the ACL.