CCNA Dcompnwk Final 1

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By FlessGordon
F
FlessGordon
Community Contributor
Quizzes Created: 1 | Total Attempts: 147
Questions: 276 | Attempts: 147

SettingsSettingsSettings
CCNA Dcompnwk Final 1 - Quiz

Questions and Answers
  • 1. 

    Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of an access layer switch and connects three PCs. The engineer attempts to ping from each PC to the other connected PCs to test the configuration. Which statement describes the result of the last step?

    • A.

      Host 1 can ping Host 2.

    • B.

      Host 1 can ping Host 3.

    • C.

      Host 2 can ping Host 3.

    • D.

      No hosts can ping any other host.

    Correct Answer
    B. Host 1 can ping Host 3.
    Explanation
    Host 1 can ping Host 3 because they are directly connected to the same access layer switch. However, Host 1 cannot ping Host 2 because they are not directly connected to each other. Similarly, Host 2 cannot ping any other host because it is only connected to the switch and not directly to any other host.

    Rate this question:

  • 2. 

    Refer to the exhibit. Based on the EIGRP configuration that is shown, what can the field engineer conclude about the EIGRP authentication between RouterA and RouterB?

    • A.

      Authentication will fail because only one key is configured.

    • B.

      Authentication will fail because the key chain names do not match.

    • C.

      Authentication will succeed and EIGRP updates can be exchanged.

    • D.

      Authentication will fail because the key chain names must match the router names.

    Correct Answer
    C. Authentication will succeed and EIGRP updates can be exchanged.
    Explanation
    The field engineer can conclude that the EIGRP authentication between RouterA and RouterB will succeed and EIGRP updates can be exchanged. This can be inferred from the fact that both routers have the same key chain name "EIGRP_AUTH" configured and the "key 1" command is used on both routers, indicating that a single key is configured for authentication.

    Rate this question:

  • 3. 

    What is a characteristic of FTP traffic flows?

    • A.

      Low-volume traffic

    • B.

      Predictable bandwidth usage

    • C.

      Large packet sizes for transfers

    • D.

      Low throughput with high response-time requirements

    Correct Answer
    C. Large packet sizes for transfers
    Explanation
    FTP (File Transfer Protocol) is a protocol used for transferring files over a network. One characteristic of FTP traffic flows is that they typically involve large packet sizes for transfers. This is because FTP is designed to handle the transfer of large files, so it uses larger packets to optimize the transfer process and reduce overhead. By using larger packets, FTP can transfer files more efficiently, resulting in faster transfer speeds.

    Rate this question:

  • 4. 

    *** If a router is unable to find a suitable IOS to load into RAM, in what mode does the bootprocess end?

    • A.

      Setup mode

    • B.

      User mode

    • C.

      Rommon mode

    • D.

      Privileged mode

    Correct Answer
    C. Rommon mode
    Explanation
    When a router is unable to find a suitable IOS to load into RAM, the boot process ends in rommon mode. Rommon mode, also known as ROM Monitor mode, is a special diagnostic mode that allows the router to recover from various booting issues. In this mode, the router has limited functionality and can only perform basic tasks such as loading a new IOS image or configuring essential settings. It is used for troubleshooting and troubleshooting purposes when the router encounters problems during the boot process.

    Rate this question:

  • 5. 

    In a converged network, which two types of traffic would be categorized as real-timetraffic? (Choose two.)

    • A.

      E-mail

    • B.

      File transfer

    • C.

      Web browsing

    • D.

      Videoconferencing

    • E.

      Voice over IP

    • F.

      Video on demand

    Correct Answer(s)
    D. Videoconferencing
    E. Voice over IP
    Explanation
    Videoconferencing and voice over IP would be categorized as real-time traffic in a converged network. Real-time traffic refers to data that requires immediate transmission and is time-sensitive, such as live video and voice communication. These types of traffic require low latency and high bandwidth to ensure smooth and uninterrupted communication.

    Rate this question:

  • 6. 

    A company uses the Frame Relay network to establish a VPN connection between headquarters and the branch office. The company wants to add a backup link in case theFrame Relay connection fails. The backup link will use the business DSL connection throughanother ISP. How should the router be configured to include the backup link?

    • A.

      Create a static route with the administrative distance of 1.

    • B.

      Create a floating static route

    • C.

      Add a new route to the routing protocol configuration.

    • D.

      Create a second default route for the backup path

    Correct Answer
    B. Create a floating static route
    Explanation
    A floating static route should be created in order to include the backup link. A floating static route is a backup route that is only used if the primary route fails. It has a higher administrative distance than the primary route, so it will only be used if the primary route is unavailable. This ensures that traffic will be automatically rerouted to the backup link if the Frame Relay connection fails.

    Rate this question:

  • 7. 

    Refer to the exhibit. What is the spanning-tree role of all the enabled interfaces of SW11

    • A.

      Alternate

    • B.

      Backup

    • C.

      Designated

    • D.

      Root

    Correct Answer
    C. Designated
    Explanation
    The correct answer is "designated." In a spanning tree protocol, each switch in the network is assigned a role for each of its interfaces. The designated role is given to the interface that provides the best path to reach the root bridge. In this case, all the enabled interfaces of SW11 have been assigned the designated role, indicating that they are the best paths to reach the root bridge.

    Rate this question:

  • 8. 

    A WIC-1T module needs to be installed in a Cisco 1841 router that currently has a WIC-2T module in slot 0. What should the network technician do first?

    • A.

      Install the hot-swappable option module

    • B.

      Turn off the power to the router before installing the new module.

    • C.

      Remove the WIC-2T module so that the new module can be installed in slot 0.

    • D.

      Shut down all Fast Ethernet ports on the router until the new WIC module installation is complete.

    • E.

      Configure the Cisco IOS software to support an internal trunk link between the two WIC modules.

    Correct Answer
    B. Turn off the power to the router before installing the new module.
    Explanation
    The network technician should turn off the power to the router before installing the new module. This is necessary to ensure that there is no electrical current flowing through the router while the module is being installed, which can help prevent any potential damage to the module or the router itself. Turning off the power also ensures that the installation process is safe for the technician.

    Rate this question:

  • 9. 

    During prototype testing, a LAN switch fails. As the switch re-initializes using the default parameters, a port that has a PC attached transitions to the forwarding state within onesecond. What protocol would support this feature?

    • A.

      STP

    • B.

      RIP

    • C.

      BGP

    • D.

      VTP

    • E.

      RSTP

    Correct Answer
    E. RSTP
    Explanation
    RSTP (Rapid Spanning Tree Protocol) would support this feature. RSTP is an improvement over the original STP (Spanning Tree Protocol) and provides faster convergence times. It achieves this by reducing the amount of time it takes for a port to transition from blocking to forwarding state. In this scenario, when the LAN switch fails and re-initializes, the port with the PC attached transitions to the forwarding state within one second, indicating that RSTP is being used.

    Rate this question:

  • 10. 

    What are two accurate descriptors of a DLCI? (Choose two.)

    • A.

      Frame Relay Layer 2 address

    • B.

      One DLCI allowed per local loop

    • C.

      Locally significant circuit endpoint

    • D.

      Signaling standard between DTE and DCE

    • E.

      Establishes the data transfer rate through a Frame Relay network

    Correct Answer(s)
    A. Frame Relay Layer 2 address
    C. Locally significant circuit endpoint
    Explanation
    A DLCI (Data Link Connection Identifier) is a Frame Relay Layer 2 address that identifies a specific circuit or virtual connection within a Frame Relay network. It is used to establish communication between devices in the network. Additionally, a DLCI is locally significant, meaning it is only recognized within the local network and does not have any significance outside of it. Therefore, the two accurate descriptors of a DLCI are that it is a Frame Relay Layer 2 address and a locally significant circuit endpoint.

    Rate this question:

  • 11. 

    A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. The technician asks the caller to talk to nearby users to see if other machines are affected. The caller reports that several immediate neighbors in the same department have a similar problem and that they cannot ping each other. Those who are seated in other departments have connectivity. What should the technician check as the first step in troubleshooting the issue?

    • A.

      The power outlet to the PC that is used by the caller

    • B.

      The trunks between switches in the wiring closet

    • C.

      The status of the departmental workgroup switch in the wiring closet

    • D.

      The cable that connects the PC of the caller to the network jack

    • E.

      The cable connection between a PC and a network outlet that is used by a neighbor

    Correct Answer
    C. The status of the departmental workgroup switch in the wiring closet
    Explanation
    The technician should check the status of the departmental workgroup switch in the wiring closet as the first step in troubleshooting the issue. Since multiple machines in the same department are affected and unable to ping each other, it suggests that the problem is localized to that department. Checking the workgroup switch will help determine if there is an issue with the switch itself or if it is causing a network connectivity problem for the affected machines.

    Rate this question:

  • 12. 

    A NetworkingCompany engineer is on a support call resolving technical problems for aclient network. After the issue is resolved, the engineer also provides a training session forthe network support staff. What role is the engineer filling on the networking companyteam?

    • A.

      post-sales field engineer

    • B.

      pre-sales engineer

    • C.

      Network designer

    • D.

      Account manager

    Correct Answer
    A. post-sales field engineer
    Explanation
    The engineer is filling the role of a post-sales field engineer. This is because they are resolving technical problems for a client network, which is a post-sales activity. Additionally, they are providing a training session for the network support staff, which is also a post-sales activity aimed at supporting the client after the sale has been made.

    Rate this question:

  • 13. 

    Refer to the exhibit. The network administrator has used the Cisco Feature Navigator to choose a Cisco IOS image to install on a router. Given the exhibited output of the showversion command, which statement is true about the capacity of the router to use this CiscoIOS image?

    • A.

      There is enough DRAM and flash.

    • B.

      There is not enough DRAM and flash.

    • C.

      There is enough DRAM but not enough flash

    • D.

      There is not enough DRAM but enough flash

    Correct Answer
    D. There is not enough DRAM but enough flash
    Explanation
    The output of the "show version" command shows that the router has 128 MB of DRAM and 256 MB of flash memory. However, the Cisco IOS image that the network administrator wants to install requires 256 MB of DRAM. Therefore, there is not enough DRAM on the router to use this Cisco IOS image. However, there is enough flash memory available.

    Rate this question:

  • 14. 

    Refer to the exhibit. The named ACL “Managers” already exists on the router. What will happen when the network administrator issues the commands that are shown in the exhibit?

    • A.

      The commands overwrite the existing Managers ACL

    • B.

      The commands are added at the end of the existing Managers ACL.

    • C.

      The commands are added at the beginning of the existing Managers ACL.

    • D.

      The network administrator receives an error that states that the ACL already exists.

    Correct Answer
    B. The commands are added at the end of the existing Managers ACL.
    Explanation
    The given exhibit shows the commands that the network administrator issues. These commands do not indicate any action to delete or replace the existing "Managers" ACL. Therefore, the commands will be added at the end of the existing ACL, expanding its rules and allowing for more specific access control.

    Rate this question:

  • 15. 

    Refer to the exhibit. A company with four servers in its server farm has not enabled PVRST on the switches that connect to the server farm segment. What will happen withinthe network if a primary link goes down? (nem talaltam kepet)

    • A.

      Access to the the servers will be los

    • B.

      Convergence time will be slow and possibly cause applications to time out.

    • C.

      Routing protocols will not send the triggered updates in the event of a failure of the root bridge.

    • D.

      Switches that connect the servers to the network will not be found by other switches in thenetwork

    Correct Answer
    B. Convergence time will be slow and possibly cause applications to time out.
    Explanation
    If PVRST (Per-VLAN Rapid Spanning Tree) is not enabled on the switches connecting to the server farm segment, the network will experience slow convergence time in the event of a primary link failure. This means that it will take a longer time for the network to reconfigure and find an alternate path, which can result in applications timing out. Enabling PVRST allows for faster convergence by providing rapid spanning tree protocol per VLAN, ensuring that the network can quickly adapt to link failures and maintain connectivity.

    Rate this question:

  • 16. 

    What type of ACL permits outbound traffic, but permits inbound traffic only if it is aresponse to the traffic that is initiated from inside the network?

    • A.

      Dynamic

    • B.

      Reflexive

    • C.

      Standard

    • D.

      Extended

    • E.

      Time-based

    Correct Answer
    B. Reflexive
    Explanation
    A reflexive ACL permits outbound traffic, allowing it to leave the network. However, it only permits inbound traffic if it is a response to the traffic that was initiated from inside the network. This means that the ACL keeps track of the state of the connection and allows the response traffic to pass through while blocking any unsolicited inbound traffic.

    Rate this question:

  • 17. 

    A network administrator has configured Frame Relay on a serial interface and issued theshow interfaces serial command. The output shows that the interface is up and the lineprotocol is up. However, pings to the remote router across the link fail. What should the nextstep be to ensure that the IP address of the remote router appears in the Frame Relay maptable of the local router?

    • A.

      Configure the router using the no inverse-arp command

    • B.

      Ensure that the LMI type is correct for the circuit.

    • C.

      Configure the router using the frame-relay map ip command

    • D.

      Verify that the remote router has Frame Relay encapsulation enabled

    Correct Answer
    C. Configure the router using the frame-relay map ip command
    Explanation
    The correct answer is to configure the router using the frame-relay map ip command. This command is used to manually map the IP address of the remote router to the corresponding DLCI (Data Link Connection Identifier) in the Frame Relay map table of the local router. By doing this, the local router will know how to forward packets to the remote router over the Frame Relay network.

    Rate this question:

  • 18. 

    Refer to the exhibit. A pre-sales systems engineer receives a diagram of the exhibited WAN implementation from a customer. EIGRP is the routing protocol that is used on theWAN. None of the parameters for EIGRP metric calculation have been modified in anyrouter configurations. Which statement is true about the routing table on router RM?

    • A.

      There is a single route to the 192.168.24.0/24 LAN using the T1 connection

    • B.

      There is a single route to the 192.168.24.0/24 LAN using the DSL connection

    • C.

      There is a single route to the 192.168.24.0/24 LAN using the Metro Ethernet connection

    • D.

      EIGRP installs all three routes to the 192.168.24.0/24 LAN and load balances the traffic

    Correct Answer
    C. There is a single route to the 192.168.24.0/24 LAN using the Metro Ethernet connection
    Explanation
    Based on the given information, the routing protocol used on the WAN is EIGRP and none of the parameters for EIGRP metric calculation have been modified. Therefore, the routing table on router RM will only have a single route to the 192.168.24.0/24 LAN using the Metro Ethernet connection. This is because EIGRP will select the best route based on its metric calculation, and since no modifications have been made, it will choose the Metro Ethernet connection as the best route.

    Rate this question:

  • 19. 

    Refer to the exhibit. A network administrator is configuring a new router to provide routing between VLANs. The administrator removes the router from the box and connectsthe Fa0/0 interface to a trunking port on the switch. After the configuration is applied to therouter, as shown in the exhibit, the traffic between VLANs fails. What is causing this tooccur?

    • A.

      The R1 router needs a routing protocol configured

    • B.

      The subinterfaces of the R1 router should have IP addresses applied

    • C.

      The R1 router needs three additional Fast Ethernet interfaces installed.

    • D.

      The subinterfaces of the R1 router should be configured in the same VLAN.

    Correct Answer
    B. The subinterfaces of the R1 router should have IP addresses applied
    Explanation
    The subinterfaces of the R1 router should have IP addresses applied. Without IP addresses, the subinterfaces cannot communicate with each other or with devices on the VLANs. IP addresses are necessary for routing between VLANs to occur.

    Rate this question:

  • 20. 

    A bank is planning to add a secure, authenticated WAN connection to a rural branchoffice. The connection must provide bandwidth of up to 10 Mb/s with QoS supporting VoIP.Which WAN connection type should the network designer recommend?

    • A.

      DSL

    • B.

      ISDN

    • C.

      Leased line

    • D.

      Frame relay

    Correct Answer
    C. Leased line
    Explanation
    A leased line would be the most suitable WAN connection type for the bank's requirements. Leased lines provide dedicated, secure, and reliable connections with guaranteed bandwidth, making them ideal for supporting VoIP and ensuring high-quality voice communication. DSL and ISDN connections may not provide sufficient bandwidth for the desired 10 Mb/s, and frame relay is an older technology that is less commonly used today.

    Rate this question:

  • 21. 

    A company has branch offices at several locations across the country. Which securityimplementation would provide a cost-effective, secure, and authenticated connection tocentralized internal resources that are located at company headquarters, without requiringconfiguration for individual employees at the branch offices?

    • A.

      Leased line with PPP authentication

    • B.

      Site-to-site VPN

    • C.

      Remote-access VPN

    • D.

      Access control list

    Correct Answer
    B. Site-to-site VPN
    Explanation
    A site-to-site VPN would provide a cost-effective, secure, and authenticated connection to centralized internal resources located at the company headquarters without requiring configuration for individual employees at the branch offices. This type of VPN allows for secure communication between the branch offices and the headquarters by establishing a virtual network connection over the internet. It eliminates the need for individual employee configurations and ensures that all branch offices can access the centralized resources securely and efficiently.

    Rate this question:

  • 22. 

    Refer to the exhibit. An extended ACL has been created to deny traffic from the192.168.35.0/24 network to the web server with IP address 209.165.201.15. According to Cisco best practices, where should the ACL be applied

    • A.

      RTB Fa0/0 inbound

    • B.

      RTC S0/0/1 inbound

    • C.

      RTD Fa0/0 outbound

    • D.

      RTC S0/1/0 outbound

    Correct Answer
    A. RTB Fa0/0 inbound
    Explanation
    The extended ACL should be applied on the RTB Fa0/0 inbound interface. This is because the ACL is intended to deny traffic from the 192.168.35.0/24 network to the web server, which means it needs to be applied on the interface that is connected to that network. Applying it on the inbound direction ensures that the ACL is evaluated before the traffic enters the router, allowing it to effectively block any traffic from the specified network to the web server with IP address 209.165.201.15.

    Rate this question:

  • 23. 

    Which EIGRP configuration commands should a network administrator enter on router R1 to correctly advertise a single summary route to router MAIN for the campus LAN?

    • A.

      Router eigrp 11 network 10.5.0.0 network 192.168.0.0 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252

    • B.

      Router eigrp 11 network 192.168.0.0 0.0.3.255 network 192.168.8.0 0.0.3.255 network 10.5.0.0 0.0.0.3 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252

    • C.

      Router eigrp 11 network 10.5.0.0 0.0.0.3 network 192.168.0.0 0.0.3.255 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252 ip summary-address eigrp 11 192.168.0.0 255.255.252.0

    • D.

      router eigrp 11 network 10.5.0.0 0.0.0.3 network 192.168.8.0 network 192.168.28.0 network 192.168.20.0 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252 ip summary-address eigrp 11 192.168.0.0 255.255.224.0

    Correct Answer
    A. Router eigrp 11 network 10.5.0.0 network 192.168.0.0 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252
    Explanation
    The correct answer is "router eigrp 11 network 10.5.0.0 network 192.168.0.0 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252". This command configures EIGRP on router R1 and specifies the networks that should be advertised. The "network 10.5.0.0" command advertises the network connected to interface s0/1/0, and the "network 192.168.0.0" command advertises the campus LAN network. The "no auto summary" command ensures that EIGRP does not automatically summarize the routes. Finally, the "interface s0/1/0 ip address 10.5.0.1 255.255.255.252" command assigns the IP address and subnet mask to the interface.

    Rate this question:

  • 24. 

     Refer to the exhibit. What is an accurate description of the first neighbor that is displayedin the output?

    • A.

      24 port 2950 switch with a non-default native VLAN

    • B.

      24 port 2950 switch that is connected to Fa0/0 on Router1

    • C.

      24 port 2950 switch that is assigned to the administrator-defined VTP domain

    • D.

      24 port 2950 switch with interface GigabitEthernet0/1 that is operating at 1000 Mb/s

    Correct Answer
    B. 24 port 2950 switch that is connected to Fa0/0 on Router1
    Explanation
    The first neighbor displayed in the output is a 24 port 2950 switch that is connected to Fa0/0 on Router1.

    Rate this question:

  • 25. 

    During prototype testing, the network designer performs a test to determine the ability of the network to recover from a link or device failure. Which design goal is validated if the testis a success?

    • A.

      Scalability

    • B.

      Manageability

    • C.

      Availability

    • D.

      Security

    Correct Answer
    C. Availability
    Explanation
    If the test to determine the network's ability to recover from a link or device failure is successful, it validates the design goal of availability. Availability refers to the network's ability to remain operational and accessible to users even in the event of failures or disruptions. A successful recovery from a failure demonstrates that the network is designed to minimize downtime and ensure continuous availability of services.

    Rate this question:

  • 26. 

    A network designer has chosen to specify the use of a dedicated firewall appliance at theperimeter o a large network. Why would the designer use a dedicated firewall rather thanusing the Cisco IOS firewall feature set on the existing router?

    • A.

      Traffic filtering is needed on the internal LAN.

    • B.

      Multiple levels of access to the network are needed

    • C.

      The DMZ requires packet filtering and port blocking

    • D.

      Heavy network traffic will be handled best by using a dedicated device

    Correct Answer
    D. Heavy network traffic will be handled best by using a dedicated device
    Explanation
    Using a dedicated firewall device is more suitable for handling heavy network traffic because it is specifically designed and optimized for firewall functions. The Cisco IOS firewall feature set on the existing router may not have the same level of performance and capacity as a dedicated firewall appliance. Additionally, using a dedicated device allows for better scalability and flexibility in terms of adding new features and functionalities as the network grows.

    Rate this question:

  • 27. 

    A company has help desk staff that is not highly trained in VPNs. What two features ortechnologies must the network designer identify as training needs in order for the help desk to support secure remote access for teleworkers? (Choose two.)

    • A.

      QoS operation

    • B.

      VLAN configuration

    • C.

      Tunneling protocols

    • D.

      IPv6 and IPv4 dual stack

    • E.

      Encryption algorithms

    • F.

      Frame Relay configuration

    Correct Answer(s)
    C. Tunneling protocols
    E. Encryption algorithms
    Explanation
    The help desk staff needs to be trained in tunneling protocols in order to understand how secure remote access for teleworkers is established and maintained. Tunneling protocols are used to encapsulate and encrypt data, ensuring its secure transmission over an untrusted network. Additionally, the staff needs training in encryption algorithms to understand how data is encrypted and decrypted, ensuring confidentiality and integrity during transmission.

    Rate this question:

  • 28. 

    What is a function that is associated with the access layer in a hierarchically designednetwork?

    • A.

      Performs routing and packet manipulation

    • B.

      Supplies redundancy and failover protection

    • C.

      Provides a high-speed, low-latency backbone

    • D.

      Serves as a network connection point for IP telephony devices

    Correct Answer
    D. Serves as a network connection point for IP telephony devices
    Explanation
    The function associated with the access layer in a hierarchically designed network is to serve as a network connection point for IP telephony devices. This means that the access layer provides the necessary infrastructure and connectivity for IP telephony devices, allowing them to connect to the network and communicate with other devices. This function is important in ensuring that IP telephony services, such as voice calls and video conferencing, can be effectively implemented and utilized within the network.

    Rate this question:

  • 29. 

    A network engineer is prototyping a new IP addressing and summarization strategy for anew network that will be integrated into the existing infrastructure. Which method isappropriate for testing the addressing scheme?

    • A.

      Using the production network of the customer

    • B.

      Using actual network equipment in a lab

    • C.

      Using the Cisco Network Assistant

    • D.

      Using a network simulation tool

    Correct Answer
    D. Using a network simulation tool
    Explanation
    Using a network simulation tool is the appropriate method for testing the addressing scheme. This allows the network engineer to create a virtual network environment and simulate different scenarios without impacting the production network or requiring actual network equipment. It provides a safe and controlled environment for testing and validating the new IP addressing and summarization strategy before implementing it in the actual network.

    Rate this question:

  • 30. 

    At the distribution layer of a hierarchical network, what are two advantages of usingLayer 3 devices instead of Layer 2 switches? (Choose two.

    • A.

      provides reliable connectivity to end users

    • B.

      Creates fewer IP subnets to configure and manage

    • C.

      Reduces the number of redundant links required

    • D.

      Enables traffic filtering based on subnet addresses

    • E.

      provides connectivity between different VLANs

    Correct Answer(s)
    D. Enables traffic filtering based on subnet addresses
    E. provides connectivity between different VLANs
    Explanation
    At the distribution layer of a hierarchical network, using Layer 3 devices instead of Layer 2 switches provides two advantages. Firstly, it enables traffic filtering based on subnet addresses, allowing for better control and management of network traffic. Secondly, it provides connectivity between different VLANs, facilitating communication and data transfer between different virtual networks. These advantages enhance network security, improve network performance, and simplify network configuration and management.

    Rate this question:

  • 31. 

    refer to the exhibit. Access list 100 is applied inbound to interface serial 0/0/0 on the SOHO Router1. Which traffic will be denied by the configuration?

    • A.

      DNS traffic from host A to the Internet

    • B.

      FTP traffic from host A to the Internet

    • C.

      ICMP traffic from the ISP to server 1

    • D.

      Traffic from the ISP to the server on port 23

    Correct Answer
    C. ICMP traffic from the ISP to server 1
    Explanation
    The access list 100 is applied inbound on interface serial 0/0/0, which means it will filter traffic coming into the router from the ISP. The configuration does not specifically deny DNS traffic, FTP traffic, or traffic on port 23. However, it denies ICMP traffic from the ISP to server 1. Therefore, ICMP traffic from the ISP to server 1 will be denied by the configuration.

    Rate this question:

  • 32. 

    What supports the ability of streaming video to be sent to a group of viewerssimultaneously without congesting the entire network?

    • A.

      Traffic queues

    • B.

      Multicast

    • C.

      Multiple Layer 4 sessions

    • D.

      High priority from QoS

    Correct Answer
    B. Multicast
    Explanation
    Multicast supports the ability of streaming video to be sent to a group of viewers simultaneously without congesting the entire network. Multicast allows the video data to be sent in a single transmission from the source to multiple recipients who have joined the multicast group. This reduces network congestion as the data is only transmitted once, and routers in the network can efficiently replicate and forward the data to the members of the multicast group.

    Rate this question:

  • 33. 

    What functionality does NBAR provide to network technicians?

    • A.

      provides data which can be used to create a network diagram

    • B.

      Allows for monitoring and managing network devices

    • C.

      Allows for classification and monitoring of network traffic

    • D.

      Displays the IOS versions and IP addresses on neighboring devices

    Correct Answer
    C. Allows for classification and monitoring of network traffic
    Explanation
    NBAR (Network-Based Application Recognition) provides the functionality of classification and monitoring of network traffic. It allows network technicians to identify and categorize different types of network traffic, such as web browsing, video streaming, or file transfer. This information can be used for various purposes, including optimizing network performance, implementing quality of service (QoS) policies, and identifying potential security threats. By monitoring network traffic, technicians can gain insights into the usage patterns, bandwidth consumption, and overall health of the network.

    Rate this question:

  • 34. 

    When implementing a security policy, which two actions should be included as part of thesecurity checklist? (Choose two.)

    • A.

      Disable all logging.

    • B.

      Enable Telnet on TCP port 23.

    • C.

      Use HTTP for web administration.

    • D.

      Set timeouts and ACLs on VTY lines.

    • E.

      Shut down any unused ports and interfaces.

    Correct Answer(s)
    D. Set timeouts and ACLs on VTY lines.
    E. Shut down any unused ports and interfaces.
    Explanation
    The two actions that should be included as part of the security checklist are setting timeouts and ACLs on VTY lines and shutting down any unused ports and interfaces. Setting timeouts and ACLs on VTY lines helps to control access to the device and prevent unauthorized access. Shutting down unused ports and interfaces reduces the attack surface and prevents potential security vulnerabilities. Disabling all logging, enabling Telnet on TCP port 23, and using HTTP for web administration would not enhance security and could potentially create security risks.

    Rate this question:

  • 35. 

    Refer to the exhibit. The routers are configured with RIPv2 with default configurations.When attempting to communicate with other networks, hosts from 172.16.2.0/24 areexperiencing connectivity issues. What could be done to resolve this issue?

    • A.

      Change to a public IP address scheme.

    • B.

      Disable automatic route summarization.

    • C.

      Change the IP network address on R3 Fa0/0 to 172.16.1.128 /26.

    • D.

      Change the subnet mask on the link between R2 and R3 to 255.255.255.0.

    Correct Answer
    B. Disable automatic route summarization.
  • 36. 

    Refer to the exhibit. A customer has a problem with connectivity in the network. Based on the IP addressing scheme, what is causing the problem?

    • A.

      The WAN links need IP addresses from a different major network.

    • B.

      The WAN link that connects R1 to R2 overlaps with the R3 LAN.

    • C.

      The WAN links that connect R1 to R3 and R1 to R2 have incorrect masks.

    • D.

      The R1 LAN is incorrect because subnet zero cannot be used with VLSM.

    Correct Answer
    B. The WAN link that connects R1 to R2 overlaps with the R3 LAN.
    Explanation
    The problem with connectivity in the network is caused by the WAN link that connects R1 to R2 overlapping with the R3 LAN. This overlap creates a conflict in IP addressing, resulting in connectivity issues.

    Rate this question:

  • 37. 

    The network designer recommends using RSTP in the design of a new data center. Thereare multipl redundant Layer 2 switches and links contained in the new design. What is thebenefit of using RSTP rather than STP in this situation?

    • A.

      Redundant links are not blocked.

    • B.

      Routing tables converge more quickly.

    • C.

      Spanning Tree convergence times are reduced.

    • D.

      Fewer redundant links are required to maintain connectivity.

    Correct Answer
    C. Spanning Tree convergence times are reduced.
    Explanation
    Using RSTP (Rapid Spanning Tree Protocol) instead of STP (Spanning Tree Protocol) in a design with redundant Layer 2 switches and links reduces the convergence times of the Spanning Tree. Convergence time refers to the time it takes for the network to reconfigure itself after a change or failure. RSTP is an improvement over STP as it provides faster convergence by quickly detecting and adapting to changes in the network topology. This ensures that any disruptions or failures in the network are resolved more quickly, resulting in improved overall network performance and availability.

    Rate this question:

  • 38. 

    What can be broadcast over the wireless network to help a user connect to the network and use wireless services?

    • A.

      SSID

    • B.

      WEP keys

    • C.

      VLAN parameters

    • D.

      WPA encryption keys

    • E.

      VPN authentication information

    Correct Answer
    A. SSID
    Explanation
    SSID stands for Service Set Identifier, which is a unique name that identifies a wireless network. When broadcasting the SSID, it allows users to identify and connect to the correct network. Therefore, broadcasting the SSID helps a user connect to the network and use wireless services.

    Rate this question:

  • 39. 

    Refer to the exhibit. A new host needs to be connected to the switch and be assigned to VLAN 2. Router RA is attached to the switch via a trunk and is configured as shown. What IP address should be assigned to this new host?

    • A.

      192.168.1.1 /26

    • B.

      192.168.1.22 /28

    • C.

      192.168.1.32 /28

    • D.

      192.168.1.44 /28

    • E.

      192.168.1.47 /28

    • F.

      192.168.1.55 /28

    Correct Answer
    D. 192.168.1.44 /28
    Explanation
    Based on the given information, the new host needs to be assigned to VLAN 2. Since the subnet mask is /28, it means that the first 28 bits are used for the network address and the remaining 4 bits are used for host addresses. Therefore, the network address would be 192.168.1.32. The host addresses within this network range from 192.168.1.33 to 192.168.1.46. The IP address 192.168.1.44 falls within this range, so it should be assigned to the new host.

    Rate this question:

  • 40. 

    Refer to the exhibit. A technician at the ISP site asks the network administrator at theclient site to change the CHAP password as part of the routing security maintenance. Afterthe administrator makes the change and reboots the router, the technician issues a showinterfaces serial 0/0/0 command. According to the output, what can be concluded about theserial connection between the client site and ISP site?

    • A.

      The router at the client site is still in the process of rebooting.

    • B.

      The administrator probably configured the wrong password.

    • C.

      The administrator has not issued a no shut command on the serial interface.

    • D.

      The administrator probably configured the wrong IP address for the serial interface.

    Correct Answer
    B. The administrator probably configured the wrong password.
    Explanation
    Based on the given information, the output of the "show interfaces serial 0/0/0" command suggests that the serial connection between the client site and ISP site is functional. However, the output also indicates that the authentication has failed, which implies that the administrator most likely configured the wrong password for CHAP authentication.

    Rate this question:

  • 41. 

    A network administrator of a middle-sized company is asked to upgrade the routingprotocol of the network to support VLSM and route summarization. The current companynetwork contains both Cisc and non-Cisco routers. Which routing protocol should be usedfor the upgrade?

    • A.

      BGP

    • B.

      RIP1

    • C.

      RIP2

    • D.

      EIGRP

    Correct Answer
    C. RIP2
    Explanation
    RIP2 should be used for the upgrade because it supports Variable Length Subnet Masking (VLSM) and route summarization. RIP2 is an enhanced version of RIP (Routing Information Protocol) and is compatible with both Cisco and non-Cisco routers. BGP (Border Gateway Protocol) is typically used for large-scale networks and is not necessary for a middle-sized company. EIGRP (Enhanced Interior Gateway Routing Protocol) is a Cisco proprietary protocol and may not be compatible with non-Cisco routers. RIP1 does not support VLSM and route summarization.

    Rate this question:

  • 42. 

    Which two technologies can provide data integrity in a VPN connection? (Choose two.)

    • A.

      ESP

    • B.

      DES

    • C.

      MD5

    • D.

      DHI

    • E.

      SHA-1

    Correct Answer(s)
    C. MD5
    E. SHA-1
    Explanation
    MD5 and SHA-1 are both cryptographic hash functions that can provide data integrity in a VPN connection. These algorithms generate a unique hash value for the data being transmitted, which can be used to verify that the data has not been tampered with during transmission. MD5 and SHA-1 are widely used in VPN protocols to ensure the integrity of the data being sent between the VPN endpoints.

    Rate this question:

  • 43. 

    A company establishes a Frame Relay connection between corporate headquarters and abranch office. The CIR for the connection is set at 4 Mb/s. Which statement is true about thisWAN connection?

    • A.

      The company will not be able to send data faster than 4 Mb/s.

    • B.

      If the company sends data faster than 4 Mb/s, some of the data frames will be flagged with a DE bit

    • C.

      If the company sends data faster than 4 Mb/s, the TSP will change the CIR to zero

    • D.

      When the company sends data faster than 4 Mb/s, the Frame Relay switch will set the BECN bit t 1on the frames that are headed to the company

    Correct Answer
    B. If the company sends data faster than 4 Mb/s, some of the data frames will be flagged with a DE bit
    Explanation
    If the company sends data faster than the CIR (committed information rate) of 4 Mb/s, some of the data frames will be flagged with a DE (discard eligible) bit. This means that the excess data will be marked as eligible for discard by the network if congestion occurs. This allows the network to prioritize important data and discard less important data during periods of high traffic.

    Rate this question:

  • 44. 

    Which two statements are true about the enhancements IPv6 has over IPv4? (Choose two.)

    • A.

      IPv6 does not support broadcasts

    • B.

      IPv6 uses a simplified header structure.

    • C.

      IPv6 does not require private addresses.

    • D.

      IPv6 uses fixed length address strings.

    • E.

      IPsec for IPv6 is not compatible with IPsec for IPv4

    Correct Answer(s)
    A. IPv6 does not support broadcasts
    B. IPv6 uses a simplified header structure.
    Explanation
    IPv6 does not support broadcasts because it uses multicast instead. This allows for more efficient communication to multiple hosts.

    IPv6 uses a simplified header structure compared to IPv4. The IPv6 header is fixed at 40 bytes, whereas the IPv4 header can vary in size. This simplification helps improve the efficiency and speed of packet processing.

    Rate this question:

  • 45. 

    A company plans to establish Frame Relay connections between corporate headquartersand severa branch offices. The network designer recommends using one physical interface onthe edge router to support the new Frame Relay connections. The company currently usesRIPv2 for routing and plans no changes to the RIPv2 configuration. What should be done toensure that each branch office link is a separate subnet and that routing updates aresuccessful between corporate headquarters and the branch offices?

    • A.

      Configure multipoint subinterfaces on the physical interface.

    • B.

      Configure point-to-point subinterfaces on the physical interface.

    • C.

      Configure a single subinterface to establish multiple PVC connections.

    • D.

      Configure the physical interface to share one DLCI to multiple remote sites and their connections.

    Correct Answer
    B. Configure point-to-point subinterfaces on the physical interface.
    Explanation
    To ensure that each branch office link is a separate subnet and that routing updates are successful between corporate headquarters and the branch offices, configuring point-to-point subinterfaces on the physical interface is the recommended solution. This configuration allows for individual subnets to be created for each branch office, ensuring separation and proper routing. By using point-to-point subinterfaces, each connection is treated as a separate link, allowing for efficient routing updates between the headquarters and branch offices.

    Rate this question:

  • 46. 

    The network infrastructure at the headquarters of an organization consists of Cisconetwork devices that are running RIPv1. As part of an upgrade project, a portion of thecompany backbone will be increased to 10 Gb/s and needs to support unequal cost loadbalancing between routers. The IP addressing scheme is also changing and needs to supportVLSM and CIDR. Which routing protocol should be selected for the network?

    • A.

      BGP

    • B.

      EIGRP

    • C.

      OSPF

    • D.

      RIPV2

    Correct Answer
    B. EIGRP
    Explanation
    EIGRP (Enhanced Interior Gateway Routing Protocol) should be selected for the network. EIGRP supports unequal cost load balancing between routers, which is a requirement for the organization's upgrade project. Additionally, EIGRP also supports VLSM (Variable Length Subnet Masking) and CIDR (Classless Inter-Domain Routing), which are necessary for the changing IP addressing scheme.

    Rate this question:

  • 47. 

    As part of network monitoring, a network administrator receives an alert that the CPUusage of the core router reaches 90% several times a day. Which protocol is in use to monitorthe network performance

    • A.

      DNS

    • B.

      SNMP

    • C.

      DHCP

    • D.

      SMTP

    • E.

      TFTP

    Correct Answer
    B. SNMP
    Explanation
    SNMP (Simple Network Management Protocol) is the correct answer for this question. SNMP is a protocol used for network management and monitoring. It allows network administrators to monitor the performance of network devices, such as routers, switches, and servers. In this scenario, the network administrator receives an alert about the high CPU usage of the core router. By using SNMP, the administrator can monitor and manage the router's performance, including CPU usage, and take necessary actions to optimize the network's performance.

    Rate this question:

  • 48. 

    What Cisco VPN solution allows for simple configuration of VPNs on the laptops of remote and mobile employees?

    • A.

      EasyVPN Server

    • B.

      EasyVPN Remote

    • C.

      EasyVPN Client

    • D.

      EasyVPN Remote-Access

    Correct Answer
    B. EasyVPN Remote
    Explanation
    EasyVPN Remote is the correct answer because it is a Cisco VPN solution that allows for simple configuration of VPNs on the laptops of remote and mobile employees. This solution provides an easy and convenient way for employees to connect securely to their company's network from remote locations. By using EasyVPN Remote, employees can access company resources and data while maintaining the necessary security measures.

    Rate this question:

  • 49. 

    Which two processes allow a smooth transition from IPv4 to IPv6? (Choose two.)

    • A.

      IPSec

    • B.

      Tunneling

    • C.

      Dual stack

    • D.

      Authentication

    • E.

      Anycast addressing

    • F.

      Header simplification

    Correct Answer(s)
    B. Tunneling
    C. Dual stack
    Explanation
    Tunneling and dual stack are the two processes that allow a smooth transition from IPv4 to IPv6. Tunneling involves encapsulating IPv6 packets within IPv4 packets, allowing them to be transmitted over an IPv4 network. This allows for the coexistence of IPv4 and IPv6 networks. Dual stack refers to the implementation of both IPv4 and IPv6 protocols on network devices, allowing them to communicate with both IPv4 and IPv6 networks. These processes enable a gradual transition from IPv4 to IPv6 without disrupting existing IPv4 infrastructure.

    Rate this question:

  • 50. 

    How should a network engineer determine if a router module is hot-swappable?

    • A.

      Insert the module with the power on, then check to see if the associated LED is lit.

    • B.

      Check the router and interface module data sheets on CCO to determine hot-swappability.

    • C.

      Insert the module with the power on, then issue the show running-config command to verify thatall new interfaces are recognized

    • D.

      Power off the router, insert the module, then verify new interfaces using the show running-configcommand after powering up

    Correct Answer
    B. Check the router and interface module data sheets on CCO to determine hot-swappability.
    Explanation
    The correct answer is to check the router and interface module data sheets on CCO to determine hot-swappability. This is because the data sheets provide information about the specific router and module, including whether they support hot-swapping. The other options may not provide accurate information or may not be safe practices for determining if a module is hot-swappable.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 10, 2014
    Quiz Created by
    FlessGordon
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.