CCNA Dcompnwk Final 1

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By FlessGordon
F
FlessGordon
Community Contributor
Quizzes Created: 1 | Total Attempts: 148
| Attempts: 148 | Questions: 200
Please wait...
Question 1 / 200
0 %
0/100
Score 0/100
1. A large company plans to add several servers and requires that the servers be reachable directly from the Internet. Which action will help the company accomplish this goal?

Explanation

Assigning each server a static internal IP address that is mapped statically to a public IP address will help the company accomplish the goal of making the servers reachable directly from the Internet. By mapping the internal IP address to a public IP address, the servers can be accessed from the Internet using the public IP. This ensures that the servers have a consistent and fixed address that can be easily reached by external users or clients.

Submit
Please wait...
About This Quiz
CCNA Dcompnwk Final 1 - Quiz

This CCNA DCompnwk FINAL 1 quiz assesses knowledge in configuring network systems, understanding EIGRP authentication, FTP traffic, router boot processes, and network redundancy. It prepares learners for practical... see morenetwork troubleshooting and management, essential for certification. see less

2.

Explanation

not-available-via-ai

Submit
3. Refer to the exhibit. Which type of application communication model best describes this network?

Explanation

The given network diagram shows multiple devices connected to each other without a centralized server. This indicates a client-client communication model, where each device can act as both a client and a server, allowing them to directly communicate with each other without the need for a central server.

Submit
4. A network technician needs to install a four-port switch module in an operational Cisco 1841 router that has an available HWIC slot. What should the technician do first?

Explanation

The technician should turn off the power to the router before installing the new module to ensure safety and prevent any potential damage to the router or the module. By turning off the power, the technician can avoid any electrical accidents or disruptions during the installation process. This precautionary step is necessary to protect the equipment and ensure a smooth installation of the four-port switch module.

Submit
5. Refer to the exhibit. An administrator installs a WIC-2T module into a Cisco 1841 router. Attempts to configure the S0/0/0 interface are unsuccessful. As a first step in troubleshooting the failure, the administrator issues the show version command. What is a possible reason for the failure?

Explanation

The possible reason for the failure is that the WIC was not physically installed properly. This could mean that it was not inserted correctly into the router or that there is a hardware issue with the WIC itself. To confirm this, the administrator would need to physically inspect the WIC and ensure that it is properly seated in the router.

Submit
6. Which technical requirement is satisfied when providing QoS for delay sensitive applications?

Explanation

When providing Quality of Service (QoS) for delay-sensitive applications, the technical requirement that is satisfied is availability. Availability refers to the ability of a system or network to be accessible and functioning properly when needed. For delay-sensitive applications, it is crucial that the network or system is consistently available to ensure that data packets are delivered in a timely manner, minimizing any potential delays or disruptions.

Submit
7. An administrator is charged with providing guaranteed quality of service for certain applications. What technical requirement does QoS help to satisfy?

Explanation

QoS (Quality of Service) helps to satisfy the technical requirement of availability. It ensures that certain applications receive the necessary network resources and prioritization to maintain a consistent and reliable level of service. This helps to prevent network congestion, delays, and interruptions, ensuring that the applications can always be accessed and used by users without any significant downtime or performance issues.

Submit
8. What can be broadcast over the wireless network to help a user connect to the network and use wireless services?

Explanation

SSID stands for Service Set Identifier, which is a unique name that identifies a wireless network. When broadcasting the SSID, it allows users to identify and connect to the correct network. Therefore, broadcasting the SSID helps a user connect to the network and use wireless services.

Submit
9. Which protocol allows redundant Layer 2 links without switching loops?

Explanation

RSTP (Rapid Spanning Tree Protocol) allows redundant Layer 2 links without switching loops. It is an advanced version of the Spanning Tree Protocol (STP) that provides faster convergence and better loop prevention mechanisms. RSTP eliminates switching loops by quickly determining the best path for data transmission and blocking redundant links. This ensures that there is only one active path between any two network devices, preventing loops and improving network efficiency. DHCP (Dynamic Host Configuration Protocol) is used for IP address assignment, HSRP (Hot Standby Router Protocol) is used for router redundancy, and MPLS (Multiprotocol Label Switching) is a protocol for efficient packet forwarding in networks.

Submit
10. Refer to the exhibit. The routers are configured with RIPv2 with default configurations. When attempting to communicate with other networks, hosts from 172.31.1.0/24 are experiencing connectivity issues. What could be done to resolve this issue?

Explanation

Disabling automatic route summarization can help resolve the connectivity issues for hosts from the 172.31.1.0/24 network. Automatic route summarization can cause the network to advertise a summarized route instead of the specific routes, which can lead to connectivity problems. By disabling automatic route summarization, the routers will advertise the specific routes, allowing the hosts to communicate with other networks properly.

Submit
11. A technician adds the command Router(config-router)# variance 5 to a router using EIGRP as the routing protocol. What is the result of entering this command?

Explanation

The command "Router(config-router)# variance 5" enables unequal cost load balancing in EIGRP. Unequal cost load balancing allows EIGRP to distribute traffic across multiple paths with different metrics, providing more efficient utilization of network resources. By setting the variance to 5, the router will consider paths with a metric up to 5 times higher than the best path as viable options for load balancing. This helps to optimize network performance and improve overall efficiency.

Submit
12. A company has an IT staff that is not highly trained. What two features or technologies must the network designer identify as training needs in order for the staff to understand the basic operation of VPNs? (Choose two.)

Explanation

The IT staff needs to understand the basic operation of VPNs, which involves securing the data transmitted over the network and establishing secure connections. Therefore, they need to be trained in encryption algorithms, which are used to encrypt and decrypt the data, ensuring its confidentiality. Additionally, they need to be familiar with tunneling protocols, which are responsible for encapsulating and transporting the data securely through the network. These two features or technologies are essential for the staff to understand the basic operation of VPNs and ensure the security of the network.

Submit
13. Refer to the exhibit. A pre-sales system engineer receives a diagram of the current WAN from a customer. EIGRP is the routing protocol used on the WAN. Based on the default operation of EIGRP, which statement is true about the routing table on router R1?

Explanation

Based on the diagram of the current WAN and the fact that EIGRP is the routing protocol used, it can be inferred that there is a single route to the 192.168.16.0/24 LAN using the Metro Ethernet connection. This is because EIGRP, by default, selects the route with the lowest metric as the best path. Since the Metro Ethernet connection has the lowest metric among the available connections, it will be chosen as the route to the LAN. Therefore, the correct answer is that there is a single route to the 192.168.16.0/24 LAN using the Metro Ethernet connection.

Submit
14. A network engineer is designing a LAN prototype for a medium-sized business. What should be used to test the IP addressingscheme?

Explanation

To test the IP addressing scheme for the LAN prototype, a network simulation tool should be used. This tool allows the network engineer to simulate the network environment and test different IP addressing configurations without the need for physical network equipment. It provides a virtual environment where the engineer can analyze the behavior and performance of the network, ensuring that the IP addressing scheme is properly designed and implemented before deploying it in a production environment.

Submit
15. What type of system uses a PBX for call control and connection to the PSTN?

Explanation

A PBX (Private Branch Exchange) is a telephone system that is used within an organization to handle internal calls and connect them to the PSTN (Public Switched Telephone Network). Traditional telephony refers to the use of analog or digital phone lines for communication, which is the type of system that uses a PBX for call control and connection to the PSTN. VPN (Virtual Private Network) is a network technology that allows secure remote access to a private network. VoIP (Voice over Internet Protocol) and IP telephony both refer to the transmission of voice calls over the internet, which do not necessarily require a PBX or connection to the PSTN.

Submit
16. Which protocol is enabled by default to dynamically discover and eliminate Layer 2 loops that are created by redundant links between switches?

Explanation

STP (Spanning Tree Protocol) is enabled by default to dynamically discover and eliminate Layer 2 loops that are created by redundant links between switches. STP works by creating a loop-free logical topology by blocking redundant paths, ensuring that there is only one active path between any two network devices. This prevents broadcast storms and ensures efficient and reliable communication within the network. CDP (Cisco Discovery Protocol) is a Cisco proprietary protocol used for network device discovery. DTP (Dynamic Trunking Protocol) is used to negotiate trunk links between switches. VTP (VLAN Trunking Protocol) is used for VLAN management and propagation.

Submit
17. What makes the Cisco EasyVPN application a useful tool for VPN implementation?

Explanation

The Cisco EasyVPN application is a useful tool for VPN implementation because it simplifies the configuration tasks for the device that is used as the VPN server. This means that setting up and managing the VPN server becomes easier and less time-consuming. It eliminates the need for complex manual configurations, making it a convenient option for organizations looking to implement VPN solutions.

Submit
18. A network administrator has changed the VLAN configurations on his network switches over the past weekend. How can the administrator determine if the additions and changes improved performance and availability on the company intranet?

Explanation

The best way for the network administrator to determine if the additions and changes improved performance and availability on the company intranet is to conduct a performance test and compare it with the baseline that was established previously. This will provide quantitative data on the performance of the network after the changes were made, allowing the administrator to assess any improvements or issues. Comparing the performance test results with the baseline will provide a clear indication of the impact of the VLAN configurations on the network's performance and availability.

Submit
19. Why is it difficult for network designers to predict the patterns and behavior of file transfer traffic?

Explanation

Network designers find it difficult to predict the patterns and behavior of file transfer traffic because the traffic is user initiated. Users have varying preferences and habits when it comes to transferring files, making it challenging for designers to anticipate when and how much traffic will occur. Additionally, user behavior can change over time, further complicating predictions.

Submit
20. Refer to the exhibit. The routers are configured with RIPv2 with default configurations.When attempting to communicate with other networks, hosts from 172.16.2.0/24 areexperiencing connectivity issues. What could be done to resolve this issue?

Explanation

not-available-via-ai

Submit
21. Refer to the exhibit. What does the TOR router do with traffic that is destined for a web server with an IP address of 172.18.10.24?

Explanation

The given correct answer suggests that the TOR router sends the traffic destined for a web server with an IP address of 172.18.10.24 out through the Serial 0/0/0 interface. This means that the router forwards the traffic through the specific interface that is connected to the network where the web server is located.

Submit
22. A customer of a large multisite organization has asked a network engineer to compare a new IPv4 addressing strategy with an IPv6 strategy for their new network implementation. Which tool is appropriate for testing and comparing both addressing schemes?

Explanation

A network simulation tool is the appropriate tool for testing and comparing both addressing schemes. This tool allows the network engineer to simulate different network scenarios and configurations, including the implementation of IPv4 and IPv6 addressing strategies. It provides a realistic environment for testing and evaluating the performance, compatibility, and functionality of both addressing schemes, helping the engineer to make an informed decision on which strategy would be more suitable for the new network implementation.

Submit
23. Refer to the exhibit. Which summarized route would be advertised Which summarized route would be advertised by R1 to R2?

Explanation

R1 would advertise the summarized route 10.0.0.0/13 to R2. This is because it covers all the given subnets: 10.4.0.0/14, 10.5.0.0/13, and 10.6.0.0/14. The summarized route 10.0.0.0/13 includes all the IP addresses within these subnets and is the most efficient way to advertise them as a single route.

Submit
24.  Refer to the exhibit. What is an accurate description of the first neighbor that is displayedin the output?

Explanation

The first neighbor displayed in the output is a 24 port 2950 switch that is connected to Fa0/0 on Router1.

Submit
25. A user in a large office calls tech support to complain that the PC no longer connects to the Internet or to any network resources,but seems otherwise normal. The help desk technician asks the caller to talk to nearby users to see if other machines are affected.After a few minutes, the caller reports that several immediate neighbors have the same problem, but those seated further awaydo not. Assuming that the description is accurate, what should be checked next?

Explanation

Based on the information provided, the caller reports that several immediate neighbors are also experiencing the same problem, while those seated further away are not affected. This suggests that the issue is localized to a specific area or network switch. Therefore, the next logical step would be to check the workgroup switch in the telecommunications room, as it is responsible for connecting multiple devices to the network.

Submit
26. A WIC-1T module needs to be installed in a Cisco 1841 router that currently has a WIC-2T module in slot 0. What should the network technician do first?

Explanation

The network technician should turn off the power to the router before installing the new module. This is necessary to ensure that there is no electrical current flowing through the router while the module is being installed, which can help prevent any potential damage to the module or the router itself. Turning off the power also ensures that the installation process is safe for the technician.

Submit
27. In order for the IT staff of a company to understand the basic operation of VPNs, which two features ortechnologies must the network designer identify as training needs? (Choose two.

Explanation

The network designer must identify tunneling protocols and encryption algorithms as training needs for the IT staff to understand the basic operation of VPNs. Tunneling protocols are essential for creating secure tunnels over public networks, allowing data to be transmitted securely between remote locations. Encryption algorithms are necessary for encrypting the data transmitted over these tunnels, ensuring its confidentiality and integrity. Understanding these two features or technologies is crucial for the IT staff to effectively configure and maintain VPN connections within the company's network.

Submit
28.  

Explanation

The correct answer is to ensure that automatic route summarization has been disabled on all routers in the network. Automatic route summarization is a feature that allows routers to automatically summarize network routes, reducing the size of the routing table. However, in this case, disabling automatic route summarization is necessary because it may cause issues with routing between the different subnets in the network. By disabling automatic route summarization, each subnet will be advertised as a separate route, allowing for proper routing and communication between the subnets.

Submit
29. Refer to the exhibit. An extended ACL has been created to deny traffic from the192.168.35.0/24 network to the web server with IP address 209.165.201.15. According to Cisco best practices, where should the ACL be applied

Explanation

The extended ACL should be applied on the RTB Fa0/0 inbound interface. This is because the ACL is intended to deny traffic from the 192.168.35.0/24 network to the web server, which means it needs to be applied on the interface that is connected to that network. Applying it on the inbound direction ensures that the ACL is evaluated before the traffic enters the router, allowing it to effectively block any traffic from the specified network to the web server with IP address 209.165.201.15.

Submit
30.  NetworkingCompany engineer is on a support call resolving technical problems for a client network. After the issue is resolved, the engineer also provides a training session for the network support staff. What role is the engineer filling on the networking company team?

Explanation

The engineer is filling the role of a post-sales field engineer on the networking company team. This is evident from the fact that they are resolving technical problems for a client network, which indicates that the sale has already been made, and they are providing training to the network support staff after resolving the issue. This role typically involves providing support and training to customers after the sale has been completed.

Submit
31. A small bookstore would like to offer wireless connectivity for customers with laptops. Which wireless components or devices will provide connectivity to the customers with the least possible cost to the bookstore?

Explanation

Standalone access points would provide connectivity to customers with the least possible cost to the bookstore. Standalone access points are individual devices that can be directly connected to the existing network infrastructure without the need for additional equipment like wireless LAN controllers. This means that the bookstore can simply install standalone access points throughout the store, allowing customers to connect to the wireless network without incurring the cost of purchasing and maintaining additional devices or controllers.

Submit
32. Which IOS component can be used for classification and protocol discovery of network traffic and applications in use?

Explanation

NBAR (Network-Based Application Recognition) is an IOS component that can be used for classification and protocol discovery of network traffic and applications in use. NBAR analyzes packet headers and payload to identify the applications and protocols being used on the network. It can be used to prioritize or block specific types of traffic based on their application or protocol, allowing for better network management and security.

Submit
33. Refer to the exhibit. A networking engineer is characterizing an existing network for a new customer. The engineer issues a show running-config command on the R1 router to gather configuration information. What is the engineer able to determine as a result of viewing the output of this command?

Explanation

The engineer is able to determine that if the Frame Relay network is unavailable, a connection through ISP-1 will be used to reach the main office LANs.

Submit
34. Which IOS component can be used to classify and monitor network traffic?

Explanation

NBAR (Network-Based Application Recognition) can be used to classify and monitor network traffic. NBAR is a Cisco IOS feature that provides deep packet inspection capabilities, allowing it to identify and classify network traffic based on the application or protocol being used. This enables network administrators to gain better visibility into their network traffic, prioritize certain applications or protocols, and apply quality of service policies accordingly.

Submit
35. Which characteristic should be considered by a network designer when implementing a VoIP solution?

Explanation

When implementing a VoIP solution, a network designer should consider the characteristic that VoIP can make use of QoS (Quality of Service) features to help reduce interruptions in communication. QoS ensures that VoIP traffic is given priority over other types of network traffic, such as email or web browsing, to maintain a high level of call quality and minimize latency or packet loss. By implementing QoS, network designers can prioritize VoIP traffic and allocate sufficient bandwidth to ensure smooth and uninterrupted communication.

Submit
36. Which feature relies on prioritization of network traffic and is used to ensure successful delivery of real-time services?

Explanation

Quality of service (QoS) is a feature that relies on prioritization of network traffic to ensure successful delivery of real-time services. It allows for the allocation of network resources to different applications or services based on their priority level, ensuring that critical services such as voice or video communication are given higher priority and guaranteed bandwidth, while less time-sensitive applications receive lower priority. QoS helps maintain reliable and consistent performance for real-time services, reducing latency and ensuring their successful delivery.

Submit
37.

Explanation

The correct answer is "There is a single route to the 172.18.20.0/24 LAN via the 10 Mb Ethernet connection." This is because the given information states that there is only one route to the LAN via the 10 Mb Ethernet connection, while the other options mention multiple routes or different types of connections.

Submit
38. A new WIC is installed in an available router slot. At what point during the router startup process does the router test the card for hardware problems?

Explanation

During the POST (Power-On Self Test) is when the router tests the newly installed WIC for any hardware problems. The POST is a diagnostic process that the router goes through during startup to check the hardware components and ensure they are functioning correctly. This includes testing the newly installed card to ensure it is properly functioning and can be used by the router.

Submit
39. When implementing an IP telephony solution, why should VLANs be used?

Explanation

VLANs should be used in an IP telephony solution to separate voice from data traffic for ease of prioritization. By separating the two types of traffic, it becomes easier to prioritize voice traffic and ensure that it is given the necessary bandwidth and quality of service for clear and uninterrupted communication. This helps to prevent congestion and ensure that voice calls are not affected by other data-intensive activities on the network.

Submit
40. Refer to the exhibit. A networking company designer is reviewing a diagram of acustomer network. What are the two problems that need to be resolved in the topology that isshown? (Choose two.)

Explanation

The first problem that needs to be resolved is that the firewall router and ISP connection represent a single point of failure. If either of these fails, it will disrupt the entire network connectivity. The second problem is that a power supply failure of the server block switch will cause the entire IP telephony system to fail. This means that if the server block switch loses power, the IP phones will not be able to function. Both of these issues need to be addressed in order to ensure the reliability and availability of the network.

Submit
41. Which technology will prioritize traffic based upon the technical requirements of IP telephony?

Explanation

QoS stands for Quality of Service, which is a technology that prioritizes network traffic based on the technical requirements of IP telephony. It ensures that voice data packets are given higher priority and are delivered with minimal delay, jitter, and packet loss. QoS helps to maintain the quality and reliability of IP telephony by allocating sufficient bandwidth and managing network congestion.

Submit
42. A network designer has chosen to specify the use of a dedicated firewall appliance at theperimeter o a large network. Why would the designer use a dedicated firewall rather thanusing the Cisco IOS firewall feature set on the existing router?

Explanation

Using a dedicated firewall device is more suitable for handling heavy network traffic because it is specifically designed and optimized for firewall functions. The Cisco IOS firewall feature set on the existing router may not have the same level of performance and capacity as a dedicated firewall appliance. Additionally, using a dedicated device allows for better scalability and flexibility in terms of adding new features and functionalities as the network grows.

Submit
43. A network administrator is given a network address of 192.168.1.64/26 to create four subnets with seven hosts in each subnet. Which subnet mask should be used?

Explanation

The given network address 192.168.1.64/26 has a subnet mask of 255.255.255.192. However, the question requires creating four subnets with seven hosts in each subnet. To accommodate seven hosts, we need a subnet size of 8 (2^3 = 8). Therefore, we need to increase the subnet mask to cover 8 addresses. The next subnet mask that can accommodate 8 addresses is 255.255.255.240, which gives us 16 addresses per subnet (including network and broadcast addresses). Therefore, the correct subnet mask to use is 255.255.255.240.

Submit
44.

Explanation

not-available-via-ai

Submit
45. When implementing a security policy, which two actions should be included as part of thesecurity checklist? (Choose two.)

Explanation

The two actions that should be included as part of the security checklist are setting timeouts and ACLs on VTY lines and shutting down any unused ports and interfaces. Setting timeouts and ACLs on VTY lines helps to control access to the device and prevent unauthorized access. Shutting down unused ports and interfaces reduces the attack surface and prevents potential security vulnerabilities. Disabling all logging, enabling Telnet on TCP port 23, and using HTTP for web administration would not enhance security and could potentially create security risks.

Submit
46. Using the show frame-relay pvc and debug frame-relay lmi commands to troubleshoot a Frame Relay problem, a networkadministrator rules out issues at Layers 1 and 2. Further investigation reveals that the IP address of the remote router does notappear in the Frame Relay table. What should the next step be in solving the problem?

Explanation

The next step in solving the problem is to configure the router using the frame-relay map ip command. This command is used to map a specific IP address to a specific DLCI (Data Link Connection Identifier) on the Frame Relay network. By configuring the router with this command, the IP address of the remote router can be added to the Frame Relay table, allowing for proper communication between the routers.

Submit
47. What is the advantage of choosing EasyVPN for a new VPN implementation?

Explanation

EasyVPN is advantageous for a new VPN implementation because it simplifies the configuration tasks for the device that is used as the VPN server. This means that setting up and managing the VPN server becomes easier and less time-consuming. With EasyVPN, administrators can quickly and easily configure the necessary settings, making it a convenient choice for organizations looking to implement a VPN solution without the complexity of manual configuration.

Submit
48. A network administrator of a middle-sized company is asked to upgrade the routingprotocol of the network to support VLSM and route summarization. The current companynetwork contains both Cisc and non-Cisco routers. Which routing protocol should be usedfor the upgrade?

Explanation

RIP2 should be used for the upgrade because it supports Variable Length Subnet Masking (VLSM) and route summarization. RIP2 is an enhanced version of RIP (Routing Information Protocol) and is compatible with both Cisco and non-Cisco routers. BGP (Border Gateway Protocol) is typically used for large-scale networks and is not necessary for a middle-sized company. EIGRP (Enhanced Interior Gateway Routing Protocol) is a Cisco proprietary protocol and may not be compatible with non-Cisco routers. RIP1 does not support VLSM and route summarization.

Submit
49. Which two security best practices are recommended for a router deployed as a WAN endpoint? (Choose two.)

Explanation

The two security best practices recommended for a router deployed as a WAN endpoint are turning off unnecessary services and applying timeouts on VTY, AUX, and console ports. Turning off unnecessary services helps to reduce the attack surface by disabling any unnecessary protocols or features that could be exploited. Applying timeouts on VTY, AUX, and console ports adds an extra layer of security by automatically terminating idle sessions after a certain period of inactivity, preventing unauthorized access to the router.

Submit
50. Several key servers in an organization must be directly accessible from the Internet. What addressing policy should be implemented for these servers?

Explanation

not-available-via-ai

Submit
51. How should a network engineer determine if a router module is hot-swappable?

Explanation

The correct answer is to check the router and interface module data sheets on CCO to determine hot-swappability. This is because the data sheets provide information about the specific router and module, including whether they support hot-swapping. The other options may not provide accurate information or may not be safe practices for determining if a module is hot-swappable.

Submit
52. What is a function that is associated with the access layer in a hierarchically designednetwork?

Explanation

The function associated with the access layer in a hierarchically designed network is to serve as a network connection point for IP telephony devices. This means that the access layer provides the necessary infrastructure and connectivity for IP telephony devices, allowing them to connect to the network and communicate with other devices. This function is important in ensuring that IP telephony services, such as voice calls and video conferencing, can be effectively implemented and utilized within the network.

Submit
53. A network engineer is prototyping a new IP addressing and summarization strategy for anew network that will be integrated into the existing infrastructure. Which method isappropriate for testing the addressing scheme?

Explanation

Using a network simulation tool is the appropriate method for testing the addressing scheme. This allows the network engineer to create a virtual network environment and simulate different scenarios without impacting the production network or requiring actual network equipment. It provides a safe and controlled environment for testing and validating the new IP addressing and summarization strategy before implementing it in the actual network.

Submit
54. *** If a router is unable to find a suitable IOS to load into RAM, in what mode does the bootprocess end?

Explanation

When a router is unable to find a suitable IOS to load into RAM, the boot process ends in rommon mode. Rommon mode, also known as ROM Monitor mode, is a special diagnostic mode that allows the router to recover from various booting issues. In this mode, the router has limited functionality and can only perform basic tasks such as loading a new IOS image or configuring essential settings. It is used for troubleshooting and troubleshooting purposes when the router encounters problems during the boot process.

Submit
55. In a converged network, which two types of traffic would be categorized as real-timetraffic? (Choose two.)

Explanation

Videoconferencing and voice over IP would be categorized as real-time traffic in a converged network. Real-time traffic refers to data that requires immediate transmission and is time-sensitive, such as live video and voice communication. These types of traffic require low latency and high bandwidth to ensure smooth and uninterrupted communication.

Submit
56. Refer to the exhibit. A network associate is configuring a new router to provide routing between VLANs. The associate removes the router from the box and connects the Fa0/0 interface to a trunking port on the switch. After the configuration is applied to the router, the traffic between VLANs still fails. What is causing this to occur?

Explanation

The subinterfaces of the NWRnStick router should have IP addresses applied. This is because subinterfaces are used to connect the router to multiple VLANs, and each subinterface needs to have an IP address assigned in order to route traffic between VLANs. Without IP addresses on the subinterfaces, the router will not be able to properly route traffic and communication between VLANs will fail.

Submit
57. On a Monday morning the help desk at a large company receives an unusually high number of calls reporting no connectivity to the Internet or to any other network resources. Otherwise the PCs are functioning normally. Help desk technicians note that all the calls are from a single department, and all affected users are on the same floor of a single building. Where should the help desk technicians suspect that the problem lies?

Explanation

The help desk technicians should suspect that the problem lies with the workgroup switch. This is because all the affected users are from a single department and on the same floor of a single building, indicating a localized issue. As the PCs are functioning normally and the problem is related to connectivity, it suggests that the workgroup switch, which connects the PCs to the network, may be experiencing a problem.

Submit
58. What is a characteristic of voice traffic in a converged network?

Explanation

Voice traffic in a converged network is processed in real time and cannot be retransmitted. This means that the voice data is transmitted and received immediately without any delay, as any delay in transmission can cause disruptions in voice communication. Unlike data traffic, voice traffic cannot be retransmitted if any packets are lost or corrupted during transmission, as this would result in noticeable gaps or distortion in the voice communication. Therefore, real-time processing and non-retransmission are key characteristics of voice traffic in a converged network.

Submit
59. What is tunneling?

Explanation

Tunneling refers to the process of encapsulating an entire packet within another packet for transmission over a network. This technique allows for the transmission of data through a network that may not natively support the original packet format. By encapsulating the original packet within another packet, the data can be transmitted across different network protocols or across networks with different architectures. This helps to ensure that the original data is delivered intact to its intended destination.

Submit
60. Which combination of Layer 2 protocol and authentication should be used to establish a link without sending authentication information in plain text between a Cisco and a non-Cisco router?

Explanation

PPP with CHAP should be used to establish a link without sending authentication information in plain text between a Cisco and a non-Cisco router. PPP (Point-to-Point Protocol) is a Layer 2 protocol that provides a secure and reliable connection between two routers. CHAP (Challenge Handshake Authentication Protocol) is an authentication protocol that uses a three-way handshake process to authenticate the router without sending the password in plain text. This combination ensures that the authentication information is encrypted and secure during the authentication process.

Submit
61. Which feature of network design and configuration would be considered a weakness?

Explanation

A flat network model is considered a weakness in network design and configuration because it lacks proper segmentation and can lead to security vulnerabilities. In a flat network, all devices are connected to a single network segment, making it easier for unauthorized access and lateral movement within the network. It also increases the risk of network congestion and performance issues. Implementing proper network segmentation, such as using VLANs or subnetting, is recommended for better security and network management.

Submit
62. What is meant by "tunneling" in the context of migrating from IPv4 to IPv6?

Explanation

Tunneling in the context of migrating from IPv4 to IPv6 refers to encapsulating one protocol packet within another protocol. This allows the transmission of IPv6 packets over an IPv4 network infrastructure. By encapsulating IPv6 packets within IPv4 packets, the IPv6 packets can traverse IPv4-only networks until they reach a destination that supports IPv6. This technique enables communication between hosts that use different versions of the IP protocol.

Submit
63. Which command can be used to load a new Cisco IOS image on a router?

Explanation

The correct answer is "copy tftp: flash:". This command is used to load a new Cisco IOS image on a router. The "copy tftp:" part indicates that the file will be copied from a TFTP server, while the "flash:" part indicates that it will be copied to the flash memory of the router.

Submit
64. A network administrator has moved the company intranet web server from a switch port to a dedicated router interface. How can the administrator determine how this change has affected performance and availability on the company intranet?

Explanation

The best way for the network administrator to determine how the change has affected performance and availability on the company intranet is to conduct a performance test and compare it with the baseline that was established previously. This will provide an objective measurement of any changes in performance and allow for a direct comparison to the previous state. Monitoring load times or interviewing administrative assistants may provide some insights, but they are subjective and may not accurately reflect the overall impact of the change. Comparing hit counts on the company web server can give an indication of usage but may not directly correlate to performance and availability.

Submit
65. During prototype testing, the network designer performs a test to determine the ability of the network to recover from a link or device failure. Which design goal is validated if the testis a success?

Explanation

If the test to determine the network's ability to recover from a link or device failure is successful, it validates the design goal of availability. Availability refers to the network's ability to remain operational and accessible to users even in the event of failures or disruptions. A successful recovery from a failure demonstrates that the network is designed to minimize downtime and ensure continuous availability of services.

Submit
66. What value is an alternative representation of the IPv6 address 2001:DB80:0000:0000:0C41:3EFF:FE00:0000?

Explanation

The given IPv6 address, 2001:DB80::C41:3EFF:FE00:0, is an alternative representation of the IPv6 address 2001:DB80:0000:0000:0C41:3EFF:FE00:0000. The "::" notation is used to represent consecutive blocks of zeros, reducing the number of zeros that need to be written. In this case, the consecutive blocks of zeros after "DB80" and "FE00" are represented by "::", resulting in a shorter and more concise representation of the address.

Submit
67. Which option correctly defines the capacity through the local loop guaranteed to a customer by the service provider?

Explanation

CIR stands for Committed Information Rate. It is the minimum guaranteed bandwidth or capacity that a service provider ensures to provide to a customer over the local loop. This means that the customer will always have access to at least this amount of bandwidth, regardless of the network congestion or other factors.

Submit
68. Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of an access layer switch and connects three PCs to test the configuration. The engineer attempts to ping from each PC to the other connected PCs. Which three statements describe the expected results of pinging from one host to another? (Choose three.)

Explanation

Based on the given information, the expected results of pinging from one host to another can be determined. Host1 cannot ping Host2 because it is explicitly stated in the answer. Host1 can ping Host3 because it is explicitly stated in the answer. Host2 cannot ping Host3 because it is not mentioned in the answer.

Submit
69. A network administrator needs to transfer an IOS image to a router using a TFTP server. What should be verified prior to beginning the transfer process?

Explanation

Prior to beginning the transfer process of an IOS image to a router using a TFTP server, it is important to verify that connectivity between the TFTP server and the router has been established. This ensures that the TFTP server is able to communicate with the router and transfer the image successfully. Without establishing connectivity, the transfer process will not be possible.

Submit
70. A company has its headquarters office in Dallas and five branch offices located in New York, Chicago, Los Angeles, Seattle, and Atlanta. WAN links are used for communications among offices in six sites. In planning the WAN links, the network designer is given two requirements: (1) minimize cost and (2) provide a certain level of WAN link reliability with redundant links. Which topology should the network designer recommend?

Explanation

A partial mesh topology would be the most suitable recommendation for the network designer. This topology allows for redundant links, ensuring a certain level of WAN link reliability. It also helps in minimizing costs as not all offices need to be directly connected to each other. Instead, only selected offices are connected, reducing the overall number of links required. This topology provides a balance between reliability and cost-effectiveness for the company's WAN communications.

Submit
71. What is used locally by a router to identify each Frame Relay PVC?

Explanation

DLCI stands for Data Link Connection Identifier, and it is used locally by a router to identify each Frame Relay Permanent Virtual Circuit (PVC). A DLCI is a unique identifier assigned to each PVC, allowing the router to distinguish between different connections within the Frame Relay network. This identifier is used for routing and forwarding data packets over the correct PVC, ensuring proper communication between devices.

Submit
72. Which type of network attack exploits vulnerabilities in the compromised system with the intent of propagating itself across a network?

Explanation

A worm is a type of network attack that exploits vulnerabilities in a compromised system in order to spread itself across a network. Unlike a virus, which requires a host file to spread, a worm can propagate itself without any user interaction. It can replicate and spread rapidly, causing damage to multiple systems within a network. This makes worms a significant threat to network security as they can quickly infect and disrupt large networks.

Submit
73. When configuring Frame Relay, what identifies a virtual circuit to the WAN switch?

Explanation

DLCI stands for Data Link Connection Identifier. When configuring Frame Relay, DLCI is used to identify a virtual circuit to the WAN switch. DLCI is a unique identifier assigned to each virtual circuit, allowing the switch to distinguish between different connections. It is used to establish and maintain communication between the local router and the remote network.

Submit
74. As part of network monitoring, a network administrator receives an alert that the CPUusage of the core router reaches 90% several times a day. Which protocol is in use to monitorthe network performance

Explanation

SNMP (Simple Network Management Protocol) is the correct answer for this question. SNMP is a protocol used for network management and monitoring. It allows network administrators to monitor the performance of network devices, such as routers, switches, and servers. In this scenario, the network administrator receives an alert about the high CPU usage of the core router. By using SNMP, the administrator can monitor and manage the router's performance, including CPU usage, and take necessary actions to optimize the network's performance.

Submit
75. Refer to the exhibit. EIGRP has been configured as a routing protocol in the network. Users who are connected on LAN_1 and LAN_2 can ping their default gateways. Users on LAN_1 complain that they are unable to access the resources on the file server that is connected to LAN_2. A technician issues the show ip interface brief command on R1 to verify the status of the interfaces. What information will help the technician troubleshoot the issue?

Explanation

The information that will help the technician troubleshoot the issue is that the line protocol of interface S0/0/1 is down. This indicates that there is a connectivity issue on that interface, which could be causing the problem with accessing the resources on the file server. The technician should focus on resolving the issue with the line protocol on interface S0/0/1 to restore connectivity.

Submit
76. An administrator learns of an e-mail that has been received by a number of users in the company. This e-mail appears to come from the office of the administrator. The e-mail asks the users to confirm their account and password information. Which type of security threat does this e-mail represent?

Explanation

This e-mail represents a phishing threat. Phishing is a type of cyber attack where the attacker pretends to be a trustworthy entity to trick individuals into revealing sensitive information such as passwords, credit card numbers, or social security numbers. In this case, the e-mail falsely claims to be from the administrator's office and asks users to confirm their account and password information, aiming to deceive them into disclosing their credentials. This is a common tactic used by attackers to gain unauthorized access to personal or corporate accounts.

Submit
77. Which statement is true about PAP in the authentication of a PPP session?

Explanation

PAP (Password Authentication Protocol) uses a two-way handshake in the authentication of a PPP (Point-to-Point Protocol) session. This means that both the client and the server exchange authentication information before granting access. PAP requires the client to send its username and password to the server, which then compares it with the stored credentials. If the authentication is successful, the server grants access; otherwise, it denies access. The two-way handshake ensures that both parties authenticate each other before establishing the PPP session.

Submit
78. Which two technologies can provide data integrity in a VPN connection? (Choose two.)

Explanation

MD5 and SHA-1 are both cryptographic hash functions that can provide data integrity in a VPN connection. These algorithms generate a unique hash value for the data being transmitted, which can be used to verify that the data has not been tampered with during transmission. MD5 and SHA-1 are widely used in VPN protocols to ensure the integrity of the data being sent between the VPN endpoints.

Submit
79. During prototype testing, a LAN switch fails. As the switch re-initializes using the default parameters, a port that has a PC attached transitions to the forwarding state within onesecond. What protocol would support this feature?

Explanation

RSTP (Rapid Spanning Tree Protocol) would support this feature. RSTP is an improvement over the original STP (Spanning Tree Protocol) and provides faster convergence times. It achieves this by reducing the amount of time it takes for a port to transition from blocking to forwarding state. In this scenario, when the LAN switch fails and re-initializes, the port with the PC attached transitions to the forwarding state within one second, indicating that RSTP is being used.

Submit
80. During a review of the proposed bill of materials, an account manager of the network solution company realizes that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than was originally specified by the network designer. When questioned, the systems engineer responds that the switches specified by the designer cannot be purchased within the budget limitations of the customer. Which action should the account manager take?

Explanation

The account manager should communicate any risks associated with the equipment substitution and obtain customer approval to proceed. This is the appropriate action because the systems engineer has made a change to the bill of materials without consulting the customer or considering the potential consequences. By informing the customer of the risks, the account manager ensures transparency and allows the customer to make an informed decision about whether to proceed with the lower cost and reduced capabilities switch.

Submit
81. Which two processes allow a smooth transition from IPv4 to IPv6? (Choose two.)

Explanation

Tunneling and dual stack are the two processes that allow a smooth transition from IPv4 to IPv6. Tunneling involves encapsulating IPv6 packets within IPv4 packets, allowing them to be transmitted over an IPv4 network. This allows for the coexistence of IPv4 and IPv6 networks. Dual stack refers to the implementation of both IPv4 and IPv6 protocols on network devices, allowing them to communicate with both IPv4 and IPv6 networks. These processes enable a gradual transition from IPv4 to IPv6 without disrupting existing IPv4 infrastructure.

Submit
82. Refer to the exhibit. All router interfaces are up and RIP version 2 is configured as the routing protocol. The users in networks 172.16.8.0 /24 and 172.16.9.0/24 are not able to reach users in the 172.16.16.0/24 network. The network administrator examines the routing tables and finds that even though all directly connected networks have been entered in the RIP configuration, not all routes are present. What is the most likely cause of this problem?

Explanation

The most likely cause of the problem is that autosummarization is enabled on all routers. Autosummarization is a feature in RIP that allows the summarization of network routes at major network boundaries. However, in this scenario, it is causing an issue because the networks 172.16.8.0/24 and 172.16.9.0/24 are not being properly advertised due to the summarization. By disabling autosummarization, the routers will advertise the specific networks and the connectivity issue should be resolved.

Submit
83. Refer to the exhibit. A technician at the ISP site asks the network administrator at theclient site to change the CHAP password as part of the routing security maintenance. Afterthe administrator makes the change and reboots the router, the technician issues a showinterfaces serial 0/0/0 command. According to the output, what can be concluded about theserial connection between the client site and ISP site?

Explanation

Based on the given information, the output of the "show interfaces serial 0/0/0" command suggests that the serial connection between the client site and ISP site is functional. However, the output also indicates that the authentication has failed, which implies that the administrator most likely configured the wrong password for CHAP authentication.

Submit
84. Refer to the exhibit. A network administrator is configuring a new router to provide routing between VLANs. The administrator removes the router from the box and connectsthe Fa0/0 interface to a trunking port on the switch. After the configuration is applied to therouter, as shown in the exhibit, the traffic between VLANs fails. What is causing this tooccur?

Explanation

The subinterfaces of the R1 router should have IP addresses applied. Without IP addresses, the subinterfaces cannot communicate with each other or with devices on the VLANs. IP addresses are necessary for routing between VLANs to occur.

Submit
85. A company uses the Frame Relay network to establish a VPN connection between headquarters and the branch office. The company wants to add a backup link in case theFrame Relay connection fails. The backup link will use the business DSL connection throughanother ISP. How should the router be configured to include the backup link?

Explanation

A floating static route should be created in order to include the backup link. A floating static route is a backup route that is only used if the primary route fails. It has a higher administrative distance than the primary route, so it will only be used if the primary route is unavailable. This ensures that traffic will be automatically rerouted to the backup link if the Frame Relay connection fails.

Submit
86. A NetworkingCompany engineer is on a support call resolving technical problems for aclient network. After the issue is resolved, the engineer also provides a training session forthe network support staff. What role is the engineer filling on the networking companyteam?

Explanation

The engineer is filling the role of a post-sales field engineer. This is because they are resolving technical problems for a client network, which is a post-sales activity. Additionally, they are providing a training session for the network support staff, which is also a post-sales activity aimed at supporting the client after the sale has been made.

Submit
87. Refer to the exhibit. The named ACL "Managers" already exists on the router. What will happen when the network administrator issues the commands that are shown in the exhibit?

Explanation

The given exhibit shows the commands that the network administrator issues. These commands do not indicate any action to delete or replace the existing "Managers" ACL. Therefore, the commands will be added at the end of the existing ACL, expanding its rules and allowing for more specific access control.

Submit
88. Refer to the exhibit. This serial interface is not functioning correctly. Based on the output shown, what is the most likely cause?

Explanation

Based on the output shown, the most likely cause for the malfunctioning of the serial interface is a PPP negotiation failure. This can be inferred from the "Serial0/0/0 is down, line protocol is down" message, which indicates that the interface is not able to establish a connection with the remote device. PPP negotiation failure occurs when there is a mismatch in the configuration parameters between the two devices, such as authentication methods or IP addressing.

Submit
89. Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of an access layer switch and connects three PCs. The engineer attempts to ping from each PC to the other connected PCs to test the configuration. Which statement describes the result of the last step?

Explanation

Host 1 can ping Host 3 because they are directly connected to the same access layer switch. However, Host 1 cannot ping Host 2 because they are not directly connected to each other. Similarly, Host 2 cannot ping any other host because it is only connected to the switch and not directly to any other host.

Submit
90. A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. The technician asks the caller to talk to nearby users to see if other machines are affected. The caller reports that several immediate neighbors in the same department have a similar problem and that they cannot ping each other. Those who are seated in other departments have connectivity. What should the technician check as the first step in troubleshooting the issue?

Explanation

The technician should check the status of the departmental workgroup switch in the wiring closet as the first step in troubleshooting the issue. Since multiple machines in the same department are affected and unable to ping each other, it suggests that the problem is localized to that department. Checking the workgroup switch will help determine if there is an issue with the switch itself or if it is causing a network connectivity problem for the affected machines.

Submit
91. What is the result when the command permit tcp 10.25.132.0 0.0.0.255 any eq smtp is added to a named access control list and applied on the inbound interface of a router?

Explanation

The command "permit tcp 10.25.132.0 0.0.0.255 any eq smtp" allows TCP traffic with a source IP address in the 10.25.132.0/24 network and a destination port of 25 (SMTP) to be permitted to all destinations. This means that any device in the 10.25.132.0/24 network will be able to send SMTP traffic to any destination using port 25.

Submit
92. A network engineer is at a customer site. After resolving technical problems in the network, the engineer provides a training session for the support staff. Which job function best fits the activities of this network engineer?

Explanation

A post-sales field engineer is the best fit for the activities of this network engineer. This is because the engineer is not only resolving technical problems in the network but also providing a training session for the support staff. This indicates that the engineer is involved in the post-sales phase, where they are providing support and training after the sale of the network equipment. The engineer is physically present at the customer site, indicating that they are a field engineer.

Submit
93. The network designer recommends using RSTP in the design of a new data center. Thereare multipl redundant Layer 2 switches and links contained in the new design. What is thebenefit of using RSTP rather than STP in this situation?

Explanation

Using RSTP (Rapid Spanning Tree Protocol) instead of STP (Spanning Tree Protocol) in a design with redundant Layer 2 switches and links reduces the convergence times of the Spanning Tree. Convergence time refers to the time it takes for the network to reconfigure itself after a change or failure. RSTP is an improvement over STP as it provides faster convergence by quickly detecting and adapting to changes in the network topology. This ensures that any disruptions or failures in the network are resolved more quickly, resulting in improved overall network performance and availability.

Submit
94. Which task would typically only require services that are located at the access layer of the hierarchical design model?

Explanation

Printing a meeting agenda on a local departmental network printer is a task that only requires services located at the access layer of the hierarchical design model. The access layer is responsible for connecting end devices, such as printers, to the network. In this case, the task is limited to the local network, so there is no need to access resources in other locations or use services from higher layers of the network hierarchy.

Submit
95. What is the purpose of a network baseline?

Explanation

A network baseline is used to establish a point of reference for comparison with current performance. By collecting data on the normal behavior and performance of a network, a baseline can be created. This baseline can then be used to identify any deviations or anomalies in the network's performance, allowing for quicker troubleshooting and identification of potential issues. It provides a benchmark for measuring the effectiveness and efficiency of the network, and helps in identifying any changes or improvements that need to be made.

Submit
96. Company XYZ needs a WAN connection between headquarters and branch offices that has a high level of security. Theconnection must provide high bandwidth to support VoIP and transactional data with as little overhead as possible. What isthe best solution for WAN connectivity for company XYZ?

Explanation

PPP (Point-to-Point Protocol) over a leased line is the best solution for WAN connectivity for Company XYZ. Leased lines provide a dedicated connection between the headquarters and branch offices, ensuring high security. PPP is a reliable and widely used protocol that supports VoIP and transactional data. It also has minimal overhead, making it suitable for high bandwidth requirements. DSL and cable connections are not as secure or reliable as leased lines, while cell relay may not provide the required bandwidth or security level.

Submit
97. A school district decides to use the 172.30.0.0/16 network for its LAN networks. The network administrator must create an addressing scheme to support 500 users in the admin office, 200 at the high school, 60 at the elementary school and 28 at the district office. Which VLSM addressing scheme will correctly address the network with minimal waste?

Explanation

The given VLSM addressing scheme correctly addresses the network with minimal waste. The /23 subnet mask for the admin office allows for 512 total addresses, which is enough to support the 500 users. The /24 subnet mask for the high school allows for 256 total addresses, which is enough to support the 200 users. The /26 subnet mask for the elementary school allows for 64 total addresses, which is enough to support the 60 users. Lastly, the /27 subnet mask for the district office allows for 32 total addresses, which is enough to support the 28 users. This addressing scheme efficiently allocates the necessary number of addresses for each location without wasting any IP addresses.

Submit
98. Which statement is true about the pairing of services and transport layer protocols for FTP and VoIP?

Explanation

FTP applications require a reliable and error-free data transfer, which is provided by TCP. TCP ensures that all data packets are received in the correct order and without any errors. On the other hand, VoIP applications require a low-latency and real-time communication, which is provided by UDP. UDP is a connectionless protocol that does not guarantee reliable delivery, but it is faster and more suitable for real-time applications like VoIP. Therefore, FTP applications use TCP at the transport layer while VoIP uses UDP at the transport layer.

Submit
99. A DHCP server is configured with a block of excluded addresses. What two devices would be assigned static addresses from the excluded address range? (Choose two.)

Explanation

The DHCP server is configured with a block of excluded addresses, which means that these addresses will not be assigned dynamically to devices on the network. Instead, they will be manually assigned as static addresses. The DNS server for the network and the network printer that is used by many different users are two devices that require static addresses for consistent and reliable network communication.

Submit
100. Refer to the exhibit. A new host needs to be connected to the switch and be assigned to VLAN 2. Router RA is attached to the switch via a trunk and is configured as shown. What IP address should be assigned to this new host?

Explanation

Based on the given information, the new host needs to be assigned to VLAN 2. Since the subnet mask is /28, it means that the first 28 bits are used for the network address and the remaining 4 bits are used for host addresses. Therefore, the network address would be 192.168.1.32. The host addresses within this network range from 192.168.1.33 to 192.168.1.46. The IP address 192.168.1.44 falls within this range, so it should be assigned to the new host.

Submit
101. Where does a service provider assume responsibility from a customer for a WAN connection?

Explanation

The demarcation point is the point where the responsibility for a WAN connection shifts from the customer to the service provider. It is the physical point at which the service provider's network ends and the customer's network begins. At this point, any issues or maintenance required for the connection are the responsibility of the service provider.

Submit
102.

Explanation

not-available-via-ai

Submit
103. What should be considered in the design of a wireless LAN on a corporate campus?

Explanation

In designing a wireless LAN on a corporate campus, the location of the concrete pillars and walls between the offices should be considered. This is because concrete can significantly impact the signal strength and coverage of wireless networks. The presence of concrete obstacles can weaken the wireless signal and cause dead spots or areas with poor connectivity. By considering the location of these obstacles, network planners can strategically place access points and antennas to optimize signal coverage and ensure reliable wireless connectivity throughout the campus.

Submit
104. A company has help desk staff that is not highly trained in VPNs. What two features ortechnologies must the network designer identify as training needs in order for the help desk to support secure remote access for teleworkers? (Choose two.)

Explanation

The help desk staff needs to be trained in tunneling protocols in order to understand how secure remote access for teleworkers is established and maintained. Tunneling protocols are used to encapsulate and encrypt data, ensuring its secure transmission over an untrusted network. Additionally, the staff needs training in encryption algorithms to understand how data is encrypted and decrypted, ensuring confidentiality and integrity during transmission.

Submit
105. A web-based retail company is considering updating its WAN connection with new technologies that are offered by the ISP.What testing platform should be used by the network team of the company to validate the performance and capacity of thenew technology using real world data?

Explanation

A pilot is the best testing platform for the network team of the company to validate the performance and capacity of the new technology using real-world data. A pilot involves implementing the new technology on a small scale in a live environment to assess its functionality, performance, and impact on the existing network infrastructure. This allows the network team to gather accurate data and insights on how the technology performs in real-world scenarios and make necessary adjustments before deploying it on a larger scale.

Submit
106. What type of Frame Relay subinterface must be used to connect remote sites without having to disable split horizon?

Explanation

To connect remote sites without disabling split horizon, a point-to-point Frame Relay subinterface must be used. This type of subinterface allows for a direct connection between two sites, without the need to broadcast or share data with multiple sites. It ensures efficient and reliable communication between the two remote sites, without the limitations of split horizon that can cause issues with routing and data transmission.

Submit
107. Company XYZ requires a WAN solution that provides flexible bandwidth options and supports one physical interface at the head office that would provide simultaneous connectivity to various remote sites. The distance from each site should not make the solution more expensive. Which WAN technology meets the requirements of the company?

Explanation

Frame Relay is the correct answer because it is a WAN technology that provides flexible bandwidth options and supports one physical interface at the head office for simultaneous connectivity to various remote sites. It is a cost-effective solution as the distance from each site does not impact the cost, making it suitable for Company XYZ's requirements. DSL, cable, and T1 leased line do not meet all the specified requirements.

Submit
108. Which statement describes the use of a network baseline?

Explanation

A network baseline is a snapshot of the normal behavior and performance of a network. It includes data such as network traffic patterns, bandwidth usage, and device performance. By establishing a network baseline, organizations can compare current network conditions to the baseline to identify any deviations or abnormalities. This allows for easier troubleshooting and evaluation of network performance over time. Therefore, the statement "It provides a point of reference for future network evaluations" accurately describes the use of a network baseline.

Submit
109. What is the result when the command permit tcp 10.25.132.0 0.0.0.255 any eq smtp is added to a named access control list and applied on the inbound interface of a router

Explanation

The command "permit tcp 10.25.132.0 0.0.0.255 any eq smtp" in a named access control list allows TCP traffic with a source IP address in the 10.25.132.0/24 network and a destination port of 25 (SMTP) to all destinations. This means that any device in the 10.25.132.0/24 network will be able to send SMTP traffic to any destination.

Submit
110.

Explanation

NetFlow is a network protocol developed by Cisco that allows network administrators to monitor and analyze network traffic. It collects information about the source and destination IP addresses, ports, protocols, and the amount of data transferred. By monitoring network traffic with NetFlow, administrators can gain insights into network usage patterns, identify potential security threats, and optimize network performance. This makes it the most suitable option for monitoring network traffic among the given choices.

Submit
111.   Refer to the exhibit. What result can be expected for STP in VLAN1?

Explanation

The correct answer suggests that DSW2 is currently the root bridge for the VLAN1 network. If DSW2 were to fail, DSW3 would become the new root bridge. This implies that DSW3 has a higher priority or a lower bridge ID than DSW1, meaning it would take over as the root bridge in the event of DSW2's failure.

Submit
112. Which two pieces of information are needed before an IOS image may be loaded on arouter from a TFTP server? (Choose two.)

Explanation

Before an IOS image can be loaded on a router from a TFTP server, two pieces of information are needed: the IP address of the TFTP server and the name of the IOS image on the TFTP server. The IP address is required to establish a connection with the TFTP server, while the name of the IOS image is necessary to specify which image should be loaded onto the router.

Submit
113. Refer to the exhibit. A NetworkingCompany designer is reviewing a diagram of a customer network. What two risks or issues can be identified in the topology that is shown? (Choose two.)

Explanation

The diagram shows that the firewall router and ISP connection are connected in a single line, indicating that they are a single point of failure. If either the firewall router or the ISP connection fails, the entire network will lose connectivity to the outside world. Additionally, the diagram shows that the Cisco Call Manager is connected to a single switch. If this switch fails, the entire IP telephony system will fail, resulting in a loss of communication. Therefore, these two risks or issues can be identified in the topology.

Submit
114. What functionality do access control lists provide in the implementation of dynamic NAT on a Cisco router?

Explanation

Access control lists (ACLs) provide the functionality to define which addresses can be translated in the implementation of dynamic NAT on a Cisco router. ACLs allow network administrators to specify the specific source addresses that are eligible for NAT translation. By configuring ACLs, administrators can control which addresses are allowed to undergo the translation process, ensuring that only authorized addresses are translated. This helps in maintaining security and controlling the flow of traffic in the network.

Submit
115. A network administrator is validating the routing for the new network design. Which command should be used to configure the s0/0/0 interface of the SALES router to advertise the Sales Department networks as one route?

Explanation

The correct answer is SALES(config-if)# ip summary-address eigrp 100 172.16.16.0 255.255.240.0. This command configures the s0/0/0 interface of the SALES router to advertise the Sales Department networks as one route. The IP address 172.16.16.0 represents the network address, and the subnet mask 255.255.240.0 represents the range of IP addresses that will be summarized into one route. This allows for more efficient routing and reduces the size of the routing table.

Submit
116. The main office of a NetworkingCompany customer currently connects to three branch offices via three separate point-to-point T1 circuits. The customer network uses RIPv2 as the routing protocol within both the LAN and the WAN. The account manager proposes a change to a Frame Relay network because the costs are lower. A single local loop connection can be installed at the main office with three separate PVCs to connect the branch offices. How can the main office edge router be configured to enable the customer to continue to use RIP as the WAN routing protocol?

Explanation

not-available-via-ai

Submit
117. Refer to the exhibit. A pre-sales systems engineer receives a diagram of the exhibited WAN implementation from a customer. EIGRP is the routing protocol that is used on theWAN. None of the parameters for EIGRP metric calculation have been modified in anyrouter configurations. Which statement is true about the routing table on router RM?

Explanation

Based on the given information, the routing protocol used on the WAN is EIGRP and none of the parameters for EIGRP metric calculation have been modified. Therefore, the routing table on router RM will only have a single route to the 192.168.24.0/24 LAN using the Metro Ethernet connection. This is because EIGRP will select the best route based on its metric calculation, and since no modifications have been made, it will choose the Metro Ethernet connection as the best route.

Submit
118. In what situation would the router display theROMMON> prompt at the end of the boot process?

Explanation

The router displaying the ROMMON> prompt at the end of the boot process suggests that it could not find a suitable IOS (Internetwork Operating System) to load into ROM (Read-Only Memory). ROM is where the router stores its basic operating system. This could happen if the IOS image is missing or corrupted, or if the router is unable to locate it in the specified location. In this situation, the router cannot proceed with the normal boot process and instead enters the ROM Monitor (ROMMON) mode, which allows for troubleshooting and recovery.

Submit
119. Which two Frame Relay header bits are used to indicate possible virtual circuit congestion? (Choose two.)

Explanation

The BECN (Backward Explicit Congestion Notification) and FECN (Forward Explicit Congestion Notification) bits in the Frame Relay header are used to indicate possible virtual circuit congestion. These bits are set by the network to notify the receiving device about congestion in the network. The BECN bit is set by the network on frames traveling in the opposite direction of congestion, while the FECN bit is set on frames traveling in the same direction as congestion. By monitoring these bits, devices can adjust their transmission rates to alleviate congestion.

Submit
120. Refer to the exhibit. RIPv2 has been configured on all routers in the network. Routers R1 and R3 have not received any RIP routing updates. What will fix the issue?

Explanation

Enabling RIP authentication on R2 will fix the issue of R1 and R3 not receiving any RIP routing updates. RIP authentication ensures that only routers with the correct authentication key can exchange routing updates. By enabling RIP authentication on R2, R1 and R3 will need to provide the correct authentication key in order to receive the updates, resolving the issue.

Submit
121. While troubleshooting a Frame Relay link, the network administrator executes the show ip interface brief command on both sides of the PVC link. All interfaces show a configured IP address and that the line protocol isup. Further investigation reveals that the IP address of the remote router does not appear in the Frame Relaytable. Which step would solve this problem?

Explanation

The problem described indicates that the IP address of the remote router is not appearing in the Frame Relay table. This suggests that the local router does not have a mapping between the IP address and the corresponding DLCI number. By configuring the router using the frame-relay map ip command, the network administrator can create this mapping and ensure that the IP address of the remote router is properly associated with the DLCI number in the Frame Relay table.

Submit
122. A network administrator is integrating IPv6 into an IPv4 network by encapsulating one protocol packet within another protocol. Which transition method is being used?

Explanation

The correct answer is tunneling. Tunneling is a transition method used by network administrators to integrate IPv6 into an IPv4 network. It involves encapsulating one protocol packet within another protocol, allowing IPv6 packets to be transmitted over an IPv4 network. This method enables communication between IPv6 and IPv4 devices by creating a tunnel through the IPv4 network.

Submit
123. Which option represents a best practice for applying ACLs?

Explanation

Applying extended ACLs closest to the source allows for more granular control over network traffic. By applying the ACLs at the source, unnecessary traffic is filtered out before it traverses the network, reducing the load on routers and improving overall network performance. This practice also ensures that only authorized traffic is allowed to enter the network, enhancing network security.

Submit
124. Refer to the exhibit. From the output of the show interfaces and pingcommands, at which layer of the OSI model is a fault indicated?

Explanation

Based on the given information, the fault is indicated at the network layer of the OSI model. This can be inferred from the output of the "show interfaces" command and the "ping" command, which both provide information about network connectivity and communication.

Submit
125. Who provides technical support and training after deploying a network solution on a large networking team?

Explanation

After deploying a network solution on a large networking team, the post-sales field engineer provides technical support and training. This individual is responsible for assisting with any issues or concerns that arise after the solution has been implemented. They are knowledgeable about the specific network solution and can provide guidance and troubleshooting to ensure the smooth operation of the network. Additionally, they offer training to the team members to ensure they are familiar with the solution and can effectively use it.

Submit
126. What is a characteristic of FTP traffic flows?

Explanation

FTP (File Transfer Protocol) is a protocol used for transferring files over a network. One characteristic of FTP traffic flows is that they typically involve large packet sizes for transfers. This is because FTP is designed to handle the transfer of large files, so it uses larger packets to optimize the transfer process and reduce overhead. By using larger packets, FTP can transfer files more efficiently, resulting in faster transfer speeds.

Submit
127. What type of ACL permits outbound traffic, but permits inbound traffic only if it is aresponse to the traffic that is initiated from inside the network?

Explanation

A reflexive ACL permits outbound traffic, allowing it to leave the network. However, it only permits inbound traffic if it is a response to the traffic that was initiated from inside the network. This means that the ACL keeps track of the state of the connection and allows the response traffic to pass through while blocking any unsolicited inbound traffic.

Submit
128. Refer to the exhibit. What can be concluded from the output that is shown?

Explanation

From the given output, it can be concluded that MDF_R1 is connected to C2960-24TT-L_IDF1 through FastEthernet0/1.

Submit
129. A network administrator has configured Frame Relay on a serial interface and issued theshow interfaces serial command. The output shows that the interface is up and the lineprotocol is up. However, pings to the remote router across the link fail. What should the nextstep be to ensure that the IP address of the remote router appears in the Frame Relay maptable of the local router?

Explanation

The correct answer is to configure the router using the frame-relay map ip command. This command is used to manually map the IP address of the remote router to the corresponding DLCI (Data Link Connection Identifier) in the Frame Relay map table of the local router. By doing this, the local router will know how to forward packets to the remote router over the Frame Relay network.

Submit
130. When NAT is in use, what is used to determine the addresses that can be translated on a Cisco router?

Explanation

When NAT (Network Address Translation) is in use on a Cisco router, an access control list (ACL) is used to determine the addresses that can be translated. An ACL is a set of rules that defines what traffic is allowed or denied based on the source and destination IP addresses, ports, and protocols. In the context of NAT, the ACL is used to specify which internal IP addresses are eligible for translation to external IP addresses. By configuring the ACL, the network administrator can control which addresses are allowed to be translated and which are not.

Submit
131. A company plans to establish Frame Relay connections between corporate headquartersand severa branch offices. The network designer recommends using one physical interface onthe edge router to support the new Frame Relay connections. The company currently usesRIPv2 for routing and plans no changes to the RIPv2 configuration. What should be done toensure that each branch office link is a separate subnet and that routing updates aresuccessful between corporate headquarters and the branch offices?

Explanation

To ensure that each branch office link is a separate subnet and that routing updates are successful between corporate headquarters and the branch offices, configuring point-to-point subinterfaces on the physical interface is the recommended solution. This configuration allows for individual subnets to be created for each branch office, ensuring separation and proper routing. By using point-to-point subinterfaces, each connection is treated as a separate link, allowing for efficient routing updates between the headquarters and branch offices.

Submit
132. Refer to the exhibit. All devices are configured as shown in the exhibit. PC1 is unable to ping the default gateway. What is the cause of the problem?

Explanation

The cause of the problem is that Port Fa0/2 on S2 is assigned to the wrong VLAN. Since PC1 is unable to ping the default gateway, it means that it is not able to communicate with the router. This suggests that there is an issue with the connection between PC1 and the router. The exhibit shows that PC1 is connected to S2 via port Fa0/2, and if this port is assigned to the wrong VLAN, it would result in a misconfiguration that prevents PC1 from reaching the default gateway.

Submit
133. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?

Explanation

Port security is a feature that can be enabled on a switch to prevent workstations with unauthorized MAC addresses from connecting to the network. It allows network administrators to specify which MAC addresses are allowed to access the network through a specific switch port. If a workstation with an unauthorized MAC address tries to connect, the switch will block the port and prevent access to the network. This helps to enhance network security by only allowing authorized devices to connect and preventing unauthorized devices from gaining access.

Submit
134. What type of system connects to the PSTN and uses a PBX to route calls via analog or digital lines?

Explanation

Traditional telephony refers to the use of analog or digital lines to connect to the Public Switched Telephone Network (PSTN) using a Private Branch Exchange (PBX) system. This system allows for the routing of calls using traditional phone lines. VPN (Virtual Private Network) is a network technology that allows for secure remote access to a private network. VoIP (Voice over Internet Protocol) refers to the transmission of voice calls over the internet. IP telephony is a broader term that encompasses both VoIP and other forms of digital voice communication. Therefore, the correct answer is traditional telephony.

Submit
135. Refer to the exhibit. Based on the EIGRP configuration that is shown, what can the field engineer conclude about the EIGRP authentication between RouterA and RouterB?

Explanation

The field engineer can conclude that the EIGRP authentication between RouterA and RouterB will succeed and EIGRP updates can be exchanged. This can be inferred from the fact that both routers have the same key chain name "EIGRP_AUTH" configured and the "key 1" command is used on both routers, indicating that a single key is configured for authentication.

Submit
136. Which data link layer encapsulation protocol is used by default for serial connections between two Cisco routers?

Explanation

HDLC (High-level Data Link Control) is the default data link layer encapsulation protocol used for serial connections between two Cisco routers. HDLC provides a simple and efficient way to encapsulate data for transmission over serial links. It is a bit-oriented protocol that ensures reliable and error-free transmission of data. HDLC is widely supported by Cisco routers and is the default encapsulation used unless otherwise specified.

Submit
137. A company is concerned with protecting internal e-commerce servers against external attacks. An application layer firewall is installed at the network edge and a host-based IDS system is installed on the internal LAN. What should be done to ensure a fast response and minimum server downtime in the event of an external attack?

Explanation

To ensure a fast response and minimum server downtime in the event of an external attack, replacing the host-based IDS with an IPS is the correct answer. Unlike an IDS, which only detects and alerts about attacks, an IPS can actively block and prevent attacks in real-time. By replacing the IDS with an IPS, the company can effectively mitigate external attacks on the e-commerce servers. This proactive approach helps in reducing response time and minimizing server downtime, ensuring the security and availability of the servers.

Submit
138. A company establishes a Frame Relay connection between corporate headquarters and abranch office. The CIR for the connection is set at 4 Mb/s. Which statement is true about thisWAN connection?

Explanation

If the company sends data faster than the CIR (committed information rate) of 4 Mb/s, some of the data frames will be flagged with a DE (discard eligible) bit. This means that the excess data will be marked as eligible for discard by the network if congestion occurs. This allows the network to prioritize important data and discard less important data during periods of high traffic.

Submit
139.  A network administrator determines that falsified routing information is propagating through the network. What action can be used to address this threat?

Explanation

To address the threat of falsified routing information propagating through the network, configuring routing protocol authentication is the most appropriate action. This authentication ensures that only trusted routers can exchange routing information, preventing unauthorized routers from injecting falsified data into the network. By implementing routing protocol authentication, the network administrator can verify the authenticity and integrity of routing updates, enhancing the security and reliability of the network infrastructure.

Submit
140. At what physical location does the responsibilty for a WAN connection change from the user to the service provider?

Explanation

The correct answer is demarcation point. The demarcation point is the physical location where the responsibility for a Wide Area Network (WAN) connection changes from the user to the service provider. It is the point where the service provider's network ends and the user's network begins. At this point, the service provider is responsible for the connection and any issues that may arise beyond the demarcation point.

Submit
141. A network administrator has removed a router from the network for maintenance. A new Cisco IOS software image has been successfully downloaded to a server and copied into the flash of the router. What should the administrator do before placing the router back into service?

Explanation

Before placing the router back into service, the administrator should restart the router and verify that the new image starts successfully. This is important to ensure that the new Cisco IOS software image has been correctly installed and is functioning properly. Restarting the router allows it to boot up with the new image, and verifying its successful start confirms that the installation was successful and the router is ready to be placed back into service.

Submit
142. Which two pieces of information should a network administrator have before starting an IOS transfer via TFTP? (Choose two.)

Explanation

Before starting an IOS transfer via TFTP, a network administrator should have the IP address of the TFTP server and the name of the IOS image on the TFTP server. The IP address is required to establish a connection with the TFTP server, while the name of the IOS image is necessary to specify which file should be transferred.

Submit
143. Refer to the exhibit. Computers on the internal network need access to all servers in the external network. The only traffic that is permitted from the external network must be responses to requests that are initiated on the internal network. Which security measure would satisfy this requirement?

Explanation

A reflexive ACL would satisfy this requirement. A reflexive ACL is a type of access control list that allows traffic to flow from the internal network to the external network and automatically permits the return traffic in response to the initiated requests. It dynamically creates temporary entries for the return traffic, ensuring that only responses to requests initiated from the internal network are allowed. This helps to prevent any unauthorized traffic from entering the internal network while still allowing necessary communication between the internal and external networks.

Submit
144. Refer to the exhibit. What is the spanning-tree role of all the enabled interfaces of SW11

Explanation

The correct answer is "designated." In a spanning tree protocol, each switch in the network is assigned a role for each of its interfaces. The designated role is given to the interface that provides the best path to reach the root bridge. In this case, all the enabled interfaces of SW11 have been assigned the designated role, indicating that they are the best paths to reach the root bridge.

Submit
145. Compared with IDS systems, what can IPS systems do to provide further protection of computer systems?

Explanation

IPS systems, or Intrusion Prevention Systems, go beyond IDS systems by not only detecting potential attacks but also taking immediate action to stop the detected attack from executing. This provides further protection for computer systems as it prevents any potential damage or compromise that could occur if the attack were allowed to proceed. Unlike IDS systems, IPS systems actively intervene and block the attack in real-time, minimizing the impact and reducing the chances of successful intrusion.

Submit
146.

Explanation

The correct answer is to erase the current IOS. This means that the current operating system on the device needs to be removed. This could be necessary if there is a need to upgrade or reinstall a new version of the IOS. By erasing the current IOS, the device will be ready to receive the new software.

Submit
147. What will be the result of adding the command ip dhcp excluded-address 192.168.24.1 192.168.24.5 to the configuration of a local router that has been configured as a DHCP server?

Explanation

By adding the command "ip dhcp excluded-address 192.168.24.1 192.168.24.5" to the configuration of the local router, the DHCP server will exclude the addresses between 192.168.24.1 and 192.168.24.5 from being assigned to clients. This means that the DHCP server will not issue these addresses to any devices requesting an IP address, ensuring that they are not assigned to any clients.

Submit
148. Which two values represent valid IPv6 addresses? (Choose two.)

Explanation

The two values that represent valid IPv6 addresses are FF01::1 and 0:0:0:0:0:0:0:1. The first address, FF01::1, is a multicast address that is used for network protocols. The second address, 0:0:0:0:0:0:0:1, is the loopback address, similar to 127.0.0.1 in IPv4, and is used to test network connectivity on the local machine. The other options are not valid IPv6 addresses because they have incorrect formatting or contain double colons (::) or extra colons.

Submit
149. A datacenter designer considers using a traditional DMZ to protect a large corporate server  f ..........hen rejects it in favor of a multilayer security topology. Why would the designer make this ..........

Explanation

The designer would reject using a traditional DMZ because it does not provide protection against internal attacks. A traditional DMZ is designed to protect against external threats, but it does not have sufficient measures to prevent attacks from within the network. In contrast, a multilayer security topology offers more comprehensive protection by implementing multiple layers of security controls, including internal network segmentation and access controls. This ensures that even if an attacker gains access to the internal network, they would still face additional barriers and restrictions, reducing the risk of successful internal attacks.

Submit
150. Refer to the exhibit. A customer has a problem with connectivity in the network. Based on the IP addressing scheme, what is causing the problem?

Explanation

The problem with connectivity in the network is caused by the WAN link that connects R1 to R2 overlapping with the R3 LAN. This overlap creates a conflict in IP addressing, resulting in connectivity issues.

Submit
151. What value is an alternative representation of the IPv6 address 2005:AED0:0000:0000:020E:0000:FE00:1111?

Explanation

The given IPv6 address 2005:AED0::020E:0000:FE00:1 can be simplified by removing leading zeros and consecutive zeros in a group. Therefore, the correct alternative representation of the address is 2005:AED0::20E:0:FE00:1111.

Submit
152. Refer to the exhibit. A NetworkingCompany engineer is characterizing an existing network for a new customer. The engineer issues a show running-config command on the branch router to gather configuration information. What is the engineer able to determine as a result of viewing the output of this command?

Explanation

The engineer is able to determine that if the Frame Relay network is unavailable, a connection through ISP-A will be used to reach the main office LANs. This information can be inferred from the output of the show running-config command on the branch router.

Submit
153.

Explanation

The correct answer is "file format". The other options, version, platform, and feature set, are not directly related to the format in which a file is stored. The file format refers to the specific structure and organization of data within a file, determining how it can be accessed, read, and interpreted by different software applications. The version refers to different iterations or updates of a software or system, the platform refers to the operating system or hardware on which the software runs, and the feature set refers to the specific capabilities and functionalities of a software or system. Therefore, file format is the most appropriate choice among the given options.

Submit
154. At the distribution layer of a hierarchical network, what are two advantages of usingLayer 3 devices instead of Layer 2 switches? (Choose two.

Explanation

At the distribution layer of a hierarchical network, using Layer 3 devices instead of Layer 2 switches provides two advantages. Firstly, it enables traffic filtering based on subnet addresses, allowing for better control and management of network traffic. Secondly, it provides connectivity between different VLANs, facilitating communication and data transfer between different virtual networks. These advantages enhance network security, improve network performance, and simplify network configuration and management.

Submit
155. A bank is planning to add a secure, authenticated WAN connection to a rural branchoffice. The connection must provide bandwidth of up to 10 Mb/s with QoS supporting VoIP.Which WAN connection type should the network designer recommend?

Explanation

A leased line would be the most suitable WAN connection type for the bank's requirements. Leased lines provide dedicated, secure, and reliable connections with guaranteed bandwidth, making them ideal for supporting VoIP and ensuring high-quality voice communication. DSL and ISDN connections may not provide sufficient bandwidth for the desired 10 Mb/s, and frame relay is an older technology that is less commonly used today.

Submit
156. What information does an administrator require before saving the running configuration from a router to a TFTP server?

Explanation

Before saving the running configuration from a router to a TFTP server, an administrator requires the TFTP server IP address and the name of the configuration file that will be saved. This information is necessary to specify the destination where the configuration file will be stored and to provide a unique name for the file.

Submit
157. If traditional phones are used when introducing VoIP to a network, what component would be required to convert the analog voice from traditional telephone signals into IP packets?

Explanation

When introducing VoIP to a network using traditional phones, a router that acts as a voice gateway would be required to convert the analog voice from traditional telephone signals into IP packets. This router would serve as the interface between the analog phone signals and the IP network, allowing for the conversion and transmission of voice data over the network.

Submit
158. refer to the exhibit. Access list 100 is applied inbound to interface serial 0/0/0 on the SOHO Router1. Which traffic will be denied by the configuration?

Explanation

The access list 100 is applied inbound on interface serial 0/0/0, which means it will filter traffic coming into the router from the ISP. The configuration does not specifically deny DNS traffic, FTP traffic, or traffic on port 23. However, it denies ICMP traffic from the ISP to server 1. Therefore, ICMP traffic from the ISP to server 1 will be denied by the configuration.

Submit
159. Refer to the exhibit. A company decides to install a new data center to improve the services available on the network. EIGRP is chosen as a routing protocol. VLAN 100 is the management VLAN. After a prototype network is built, the staff executes basic connectivity tests. The results show very slow convergence after a network failure. Which step should be taken by the engineers to improve the network performance?

Explanation

Configuring per-VLAN rapid spanning tree would improve network performance by reducing convergence time after a network failure. Rapid spanning tree protocol (RSTP) is an enhancement of the original spanning tree protocol (STP) and provides faster convergence time in case of link or network failures. By configuring per-VLAN rapid spanning tree, the network can quickly identify and reroute traffic in the event of a failure, minimizing downtime and improving overall network performance.

Submit
160. Refer to the exhibit. A network administrator is attempting to configure a Frame Relay network. The administrator enters the commands as shown in the exhibit on R2, but the Frame Relay PVCs are inactive. What is the problem?

Explanation

The problem is that the incorrect DLCI numbers are being configured on R2. The DLCI numbers are used to identify the specific PVCs (Permanent Virtual Circuits) in a Frame Relay network. By configuring incorrect DLCI numbers, the network administrator is essentially misidentifying the PVCs, which is why they are inactive.

Submit
161. Which component in a Frame Relay WAN would set the BECN bit in the Frame Relay header if congestion is experienced?

Explanation

The Frame Relay switch is responsible for setting the BECN (Backward Explicit Congestion Notification) bit in the Frame Relay header if congestion is experienced. This bit is used to inform the source device that congestion is occurring in the network, allowing it to adjust its transmission rate accordingly. The source DTE device, destination DTE device, and the router through which communication was first initiated do not have the capability to set the BECN bit. Therefore, the correct answer is the Frame Relay switch.

Submit
162. A wireless survey has been conducted before the deployment of a wireless network. What would be the benefit of the survey?

Explanation

The benefit of conducting a wireless survey before deploying a wireless network is to find the optimal number and placement of access points. This survey helps in identifying the areas with weak or no signal coverage, allowing for strategic placement of access points to ensure maximum coverage and minimize dead zones. By determining the optimal number of access points, it helps in optimizing network performance and reducing interference. This survey also helps in identifying potential sources of interference and selecting the appropriate channel settings for the access points.

Submit
163.

Explanation

The given command "RouterA(config)# ip route 172.16.75.0 255.255.255.0 192.16.35.76 200" is the correct answer because it specifies the correct destination network (172.16.75.0) and subnet mask (255.255.255.0). The next-hop IP address is also correctly specified as 192.16.35.76. Additionally, the administrative distance of 200 is specified, which is important for route selection in case there are multiple routes available.

Submit
164. Which characteristic of VPN technology prevents the contents of data communications from being read by unauthorized parties?

Explanation

Confidentiality is the characteristic of VPN technology that prevents the contents of data communications from being read by unauthorized parties. VPNs use encryption protocols to ensure that the data transmitted between the sender and receiver is secure and cannot be accessed or understood by anyone who is not authorized to do so. This ensures the privacy and confidentiality of the data being transmitted over the VPN network.

Submit
165. A designer is creating a test plan to validate a WAN design that is based on Frame Relay technology. Which network device can be used in the prototype network to serve as a Frame Relay switch?

Explanation

A Cisco router with appropriate IOS can be used in the prototype network to serve as a Frame Relay switch. Cisco routers are capable of supporting various WAN technologies, including Frame Relay. By installing the appropriate IOS (Internetwork Operating System) on the Cisco router, it can be configured to act as a Frame Relay switch, allowing the designer to validate the WAN design based on Frame Relay technology.

Submit
166. Refer to the exhibit. A network administrator is creating a prototype to verify the new WAN design. However, the communication between the two routers cannot be established. Based on the output of the commands, what can be done to solve the problem?

Explanation

Based on the output of the show controllers command, it can be observed that the serial interface on RA is in the DTE mode, while the serial interface on RB is in the DCE mode. In order for communication to be established between the two routers, a clock rate must be configured on the DCE side, which in this case is RA. Therefore, configuring RA with a clock rate command is the appropriate solution to solve the problem.

Submit
167. Refer to the exhibit. WestSW is supposed to send VLAN information to EastSW, but that did not occur. What will force WestSW to send a VLAN update to EastSW?

Explanation

Resetting the configuration revision number on EastSW to zero will force WestSW to send a VLAN update to EastSW. VTP (VLAN Trunking Protocol) uses a configuration revision number to determine if a VLAN update is necessary. When the configuration revision number on EastSW is reset to zero, it will be lower than the configuration revision number on WestSW. This difference in revision numbers will trigger WestSW to send a VLAN update to EastSW, ensuring that the VLAN information is synchronized between the two switches.

Submit
168.  An administrator is configuring a dual stack router with IPv6 and IPv4 using RIPng. The administrator receives an error message when trying to enter the IPv4 routes into RIPng. What is the cause of the problem?

Explanation

RIPng is a routing protocol specifically designed for IPv6 networks. It does not support IPv4 routes. Therefore, when the administrator tries to enter IPv4 routes into RIPng, it results in an error message. This is because RIPng is incompatible with IPv4, not the other way around.

Submit
169. Which address provides an example of an IPv6 link-local address?

Explanation

The address FE80::1324:ABCD is an example of an IPv6 link-local address. Link-local addresses are used for communication within a single network segment and are automatically assigned to devices by the operating system. These addresses are identified by the FE80 prefix, followed by a unique identifier. In this case, the unique identifier is 1324:ABCD.

Submit
170. What two factors can increase the amount of time that is required for a network to converge? (Choose two.)

Explanation

The amount of time required for a network to converge can be increased by two factors: network size and routing protocols used on the network. A larger network with more devices and connections takes longer to converge as there are more paths and routes to calculate and establish. Additionally, the choice of routing protocols can affect convergence time. Some protocols may have longer convergence times due to their algorithms or the way they handle network changes. Therefore, both network size and routing protocols can impact the time required for a network to converge.

Submit
171. What is a function of software queuing?

Explanation

The function of software queuing is to send packets on the basis of priorities that are manually set. This means that the software will prioritize certain packets over others based on the priorities that have been defined by the administrator. This allows for more efficient and controlled transmission of packets, ensuring that important packets are sent first and less important ones are sent later.

Submit
172. Which IP address and wildcard mask would be used in an ACL to block traffic from all hosts on the same subnet as host 192.168.16.43/28?

Explanation

The correct answer is "access-list 10 deny 192.168.16.32 0.0.0.15". This answer blocks traffic from all hosts on the same subnet as host 192.168.16.43/28. The wildcard mask 0.0.0.15 allows for a range of IP addresses from 192.168.16.32 to 192.168.16.47. Since the host IP address falls within this range, it will be blocked along with all other hosts on the same subnet.

Submit
173.

Explanation

The DLCI (Data Link Connection Identifier) is a specific number assigned to a virtual circuit in a Frame Relay network. It is used to identify the connection between the local and remote routers. If the DLCI is incorrect, it means that the virtual circuit is not properly established, causing communication issues between the routers.

Submit
174. Refer to the exhibit. A network engineer issues the show ip route command to validate that the newly designed network is working as anticipated. Which users will the Admin_LAN be able to communicate with?

Explanation

Based on the information provided in the exhibit, the Admin_LAN is directly connected to the Faculty_LAN. This means that the users on the Admin_LAN will be able to communicate with the users on the Faculty_LAN. There is no information given about a direct connection between the Admin_LAN and the Student_LAN, so it can be inferred that the users on the Admin_LAN will not be able to communicate with the users on the Student_LAN.

Submit
175. Refer to the exhibit. What will be the result of entering the commands as shown in the exhibit?

Explanation

The correct answer is that RIPng will be enabled on interface fa0/0 and will advertise the configured network. This is because the exhibit shows the configuration of the "ipv6 rip RIPng enable" command on interface fa0/0, which enables RIPng on that interface. Additionally, the "ipv6 rip RIPng network" command is used to specify the network that will be advertised by RIPng. Therefore, the configured network will be advertised by RIPng on interface fa0/0.

Submit
176. To reduce unwanted incoming traffic from the outside, a network technician is tasked with establishing the filtering rules for the network firewall. Which traffic should be allowed?

Explanation

The network technician should allow incoming responses to traffic that is generated from the inside. This means that the firewall should permit incoming traffic that is a response to outgoing requests initiated by internal devices. Allowing these incoming responses ensures that legitimate traffic is allowed back into the network while blocking unwanted incoming traffic from the outside.

Submit
177. While troubleshooting a problem with an e-mail server, an administrator observes that the switch port used by the server shows "up, line protocol up". The administrator cannot ping the server. At which layer of the OSI model is the problem most likely to be found?

Explanation

The problem is most likely to be found at the network layer. The fact that the switch port shows "up, line protocol up" indicates that there is a physical connection between the server and the switch, ruling out issues at the physical layer. Since the administrator cannot ping the server, it suggests a problem with network connectivity. The network layer is responsible for routing and addressing, so a problem at this layer would affect the server's ability to communicate with other devices on the network.

Submit
178. When designing a prototype network for a new server farm, a network designer chooses to use redundant links to connect to the rest of the network. Which business goal will be addressed by this choice?

Explanation

By using redundant links to connect to the rest of the network, the network designer ensures that there are multiple pathways for data to flow. This choice addresses the business goal of availability, as it increases the network's resilience and reduces the risk of downtime. If one link fails, there are still alternative paths for data to be transmitted, minimizing the impact on the server farm's operations.

Submit
179. A network designer must select a routing protocol for the network of a customer. The currently installed network contains both Cisco and non-Cisco routers, and there is no budget to replace them. The designer plans on implementing both VLSM and route summarization in the new network design. Which two protocols can provide the necessary functionality for this LAN? (Choose two.)

Explanation

RIPv2 and OSPF are the two protocols that can provide the necessary functionality for implementing both VLSM and route summarization in the network design. RIPv2 supports VLSM (Variable Length Subnet Masking), which allows for the efficient allocation of IP addresses by using different subnet mask lengths. OSPF (Open Shortest Path First) is a link-state routing protocol that supports both VLSM and route summarization. It allows for the creation of areas within the network, which helps in reducing the size of routing tables and improving network performance.

Submit
180. Which three guidelines would help contribute to creating a strong password policy? (Choose three.)

Explanation

The three guidelines that would help contribute to creating a strong password policy are deliberately misspelling words when creating passwords, creating passwords that are at least 8 characters in length, and using combinations of upper case, lower case, and special characters. Deliberately misspelling words adds complexity and makes passwords harder to guess. Creating passwords that are at least 8 characters in length ensures a minimum level of security. Using combinations of upper case, lower case, and special characters increases the complexity and makes passwords more difficult to crack.

Submit
181. Refer to the exhibit. A company with four servers in its server farm has not enabled PVRST on the switches that connect to the server farm segment. What will happen withinthe network if a primary link goes down? (nem talaltam kepet)

Explanation

If PVRST (Per-VLAN Rapid Spanning Tree) is not enabled on the switches connecting to the server farm segment, the network will experience slow convergence time in the event of a primary link failure. This means that it will take a longer time for the network to reconfigure and find an alternate path, which can result in applications timing out. Enabling PVRST allows for faster convergence by providing rapid spanning tree protocol per VLAN, ensuring that the network can quickly adapt to link failures and maintain connectivity.

Submit
182. Refer to the exhibit. An extended ACL has been created to deny traffic from host 192.168.20.254 to the web server with IP address 209.165.201.30. However, host 192.168.20.254 is allowed access to all resources on network 192.168.30.0/24. According to Cisco best practices, where should the ACL be applied?

Explanation

The ACL should be applied on the R2 Fa0/0 inbound interface because it is the interface that connects to the network where the host 192.168.20.254 is located. By applying the ACL on this interface, traffic from the host to the web server with IP address 209.165.201.30 can be denied, while still allowing access to all resources on network 192.168.30.0/24. Applying the ACL on other interfaces or devices would not effectively control the traffic from the specific host to the web server.

Submit
183. A network administrator is tasked with maintaining two remote locations in the same city. Both locations use the same service provider and have the same service plan for DSL service. When comparing download rates, it is noticed that the location on the East side of town has a faster download rate than the location on the West side of town. How can this be explained?

Explanation

The faster download rate on the East side can be explained by the fact that the service provider is closer to that location. Proximity to the service provider can result in a stronger and more reliable connection, leading to faster download rates.

Submit
184. What are two main components of data confidentiality? (Choose two.)

Explanation

Data confidentiality refers to the protection of sensitive information from unauthorized access. Encapsulation is a technique that hides the internal details of data and restricts access to it, thus ensuring confidentiality. Encryption is another important component of data confidentiality, as it transforms data into an unreadable format using algorithms, making it inaccessible to unauthorized individuals. Both encapsulation and encryption play crucial roles in maintaining the confidentiality of data.

Submit
185. Refer to the exhibit. Based on the output as shown, which two statements correctly define how the router will treat Telnet traffic that comes into interface FastEthernet 0/1? (Choose two).

Explanation

Based on the output shown in the exhibit, the router will treat Telnet traffic coming into interface FastEthernet 0/1 by denying Telnet to the 172.16.20.0/24 network and permitting Telnet to the 172.16.10.0/24 network. This can be determined by looking at the "access-list 1 permit 172.16.10.0 0.0.0.255" command, which allows Telnet traffic to the 172.16.10.0/24 network, and the "access-list 1 deny 172.16.20.0 0.0.0.255" command, which denies Telnet traffic to the 172.16.20.0/24 network. Therefore, Telnet to 172.16.20.0/24 is denied and Telnet to 172.16.10.0/24 is permitted.

Submit
186. The network infrastructure at the headquarters of an organization consists of Cisconetwork devices that are running RIPv1. As part of an upgrade project, a portion of thecompany backbone will be increased to 10 Gb/s and needs to support unequal cost loadbalancing between routers. The IP addressing scheme is also changing and needs to supportVLSM and CIDR. Which routing protocol should be selected for the network?

Explanation

EIGRP (Enhanced Interior Gateway Routing Protocol) should be selected for the network. EIGRP supports unequal cost load balancing between routers, which is a requirement for the organization's upgrade project. Additionally, EIGRP also supports VLSM (Variable Length Subnet Masking) and CIDR (Classless Inter-Domain Routing), which are necessary for the changing IP addressing scheme.

Submit
187. What are two advantages of using Layer 3 devices instead of Layer 2 switches at the distribution layer of a hierarchical network?(Choose two.)

Explanation

Layer 3 devices, such as routers, provide the advantage of allowing connectivity between different VLANs. This means that they can route traffic between different virtual LANs, enabling communication and sharing of resources between them. Additionally, Layer 3 devices enable traffic filtering based on subnet addresses. This allows for more granular control over network traffic, as specific subnets can be allowed or denied access to certain resources or services.

Submit
188. Refer to the exhibit. What can be determined about the operation of DLCI 101?

Explanation

Based on the given exhibit, it can be determined that the operation of DLCI 101 is affected by congestion in the Frame Relay network. The exhibit does not provide any information about the DLCI being shut down, traffic flowing in only one direction, packet size limitation, or all packets being marked as discard eligible. Therefore, the correct answer is that the Frame Relay network is experiencing congestion.

Submit
189. What is the result of implementing a Frame Relay service with a CIR value of zero?

Explanation

A Frame Relay service with a CIR (Committed Information Rate) value of zero means that there is no guaranteed bandwidth allocated for the traffic. When the CIR is set to zero, all frames that enter the Frame Relay WAN will be marked as DE (Discard Eligible). This means that if there is congestion on the network, these frames will be the first to be discarded, resulting in potential data loss.

Submit
190.

Explanation

The given answer is correct because it states that all traffic with a destination on another switch will exit via Gi0/1. This implies that Gi0/1 is the designated port for inter-switch traffic, meaning it is the port that provides the best path to reach other switches in the network. This is likely because Switch2 is the root bridge, and Gi0/1 is the port on Switch1 that connects to the root bridge. Therefore, all traffic destined for other switches will be forwarded through Gi0/1 to reach its destination.

Submit
191. What are two accurate descriptors of a DLCI? (Choose two.)

Explanation

A DLCI (Data Link Connection Identifier) is a Frame Relay Layer 2 address that identifies a specific circuit or virtual connection within a Frame Relay network. It is used to establish communication between devices in the network. Additionally, a DLCI is locally significant, meaning it is only recognized within the local network and does not have any significance outside of it. Therefore, the two accurate descriptors of a DLCI are that it is a Frame Relay Layer 2 address and a locally significant circuit endpoint.

Submit
192. In the Cisco Enterprise Architecture, which module would include web and e-commerce servers for access byusers external to the organization?

Explanation

The enterprise edge module in the Cisco Enterprise Architecture includes web and e-commerce servers for access by users external to the organization. This module is responsible for connecting the organization's internal network to external networks, such as the internet. It acts as a gateway and provides security, connectivity, and access control for external users. By placing web and e-commerce servers in the enterprise edge module, the organization can ensure that these services are accessible to external users while maintaining security and control over the internal network.

Submit
193. Refer to the exhibit. Results of the show vlan and show vtp status commands for switches S1 and S2 are displayed in the exhibit. VLAN 11 was created on S1. Why is VLAN 11 missing from S2?

Explanation

The VTP domain names do not match. VTP (VLAN Trunking Protocol) is used to synchronize VLAN information across switches in a network. In this case, the VTP domain name on S1 and S2 does not match, which means they are not in the same VTP domain. As a result, VLAN 11 created on S1 is not being propagated to S2.

Submit
194. An employee of XYZ corporation will begin working from home. The employee has a choice of DSL or cable technology for WAN connectivity. Which connectivity characteristic is accurately described?

Explanation

DSL provides a high-speed connection over existing copper phone wires. This means that the employee can utilize their existing phone lines to establish a fast internet connection. Unlike cable technology, which may require new fiber installation, DSL takes advantage of the infrastructure already in place. This makes DSL a convenient and cost-effective option for the employee to work from home. Additionally, DSL service shares the same frequency range as voice calls, allowing for simultaneous internet and phone usage.

Submit
195. A network administrator is asked to upgrade the enterprise network devices and to modify the addressing scheme to supportVLSM and route summarization. The current network infrastructure contains both Cisco and non-Cisco routers. The plan is toreplace old routers gradually with the latest Cisco routers. Which two routing protocols can the administrator use to support bothupgrading requirements? (Choose two.

Explanation

The network administrator can use OSPF and RIP2 routing protocols to support the upgrading requirements. OSPF (Open Shortest Path First) is a link-state routing protocol that supports VLSM (Variable Length Subnet Masking) and route summarization. It is widely used in enterprise networks and can be implemented in both Cisco and non-Cisco routers. RIP2 (Routing Information Protocol version 2) is a distance-vector routing protocol that also supports VLSM and route summarization. It is compatible with both Cisco and non-Cisco routers, making it suitable for the gradual replacement of old routers with new Cisco routers.

Submit
196. A company would like to ensure that the failure of a single access switch does not disrupt service to the mail servers located in the data center. What can be done to ensure maximum connectivity to the mail servers?

Explanation

Installing redundant access links between the servers and the access layer switches would ensure maximum connectivity to the mail servers. This means that if one access switch fails, there will be alternative links available to maintain connectivity and prevent disruption of service to the mail servers. Redundancy in the network infrastructure is crucial for high availability and fault tolerance, and in this case, it would help to mitigate the impact of a single access switch failure on the mail servers.

Submit
197. A network administrator wants to configure a router that is running EIGRP s.......route that will summarize the networks that are shown. Which network will s........ networks? 192.168.12.0/24 192.168.13.0/24 192.168.14.0/24 192.168.15.0/24

Explanation

The network 192.168.12.0/22 will summarize the given networks because it includes all the networks 192.168.0.0/16, 192.168.0.0/20, 192.168.8.0/21, 192.168.12.0/22, and 192.168.16.0/22. It has the longest prefix length (22) among all the networks, making it the most specific summary address.

Submit
198. A company has branch offices at several locations across the country. Which securityimplementation would provide a cost-effective, secure, and authenticated connection tocentralized internal resources that are located at company headquarters, without requiringconfiguration for individual employees at the branch offices?

Explanation

A site-to-site VPN would provide a cost-effective, secure, and authenticated connection to centralized internal resources located at the company headquarters without requiring configuration for individual employees at the branch offices. This type of VPN allows for secure communication between the branch offices and the headquarters by establishing a virtual network connection over the internet. It eliminates the need for individual employee configurations and ensures that all branch offices can access the centralized resources securely and efficiently.

Submit
199. Because of a remote-procedure call failure, a user is unable to access an NFS server. At what layer of the TCP/IP model does this problem occur?

Explanation

The problem occurs at the application layer of the TCP/IP model. The application layer is responsible for providing network services to the user and handling the communication between the user and the network. In this case, the remote-procedure call failure indicates a problem with the user's ability to access the NFS server, which is an application-level service. Therefore, the issue is occurring at the application layer.

Submit
200. Refer to the exhibit. Headquarters is connected through the Internet to branch office A and branch office B. Which WAN technology would be best suited to provide secure connectivity between headquarters and both branch offices?

Explanation

A VPN (Virtual Private Network) would be the best-suited WAN technology to provide secure connectivity between headquarters and both branch offices. A VPN creates a secure and encrypted connection over the Internet, allowing for secure data transmission between locations. This would ensure that the data transmitted between headquarters and the branch offices remains confidential and protected from unauthorized access.

Submit
View My Results

Quiz Review Timeline (Updated): Aug 18, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 18, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 10, 2014
    Quiz Created by
    FlessGordon
Cancel
  • All
    All (200)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A large company plans to add several servers and requires that the...
Refer to the exhibit. Which type of application communication model...
A network technician needs to install a four-port switch module in an...
Refer to the exhibit. An administrator installs a WIC-2T module into a...
Which technical requirement is satisfied when providing QoS for delay...
An administrator is charged with providing guaranteed quality of...
What can be broadcast over the wireless network to help a user connect...
Which protocol allows redundant Layer 2 links without switching loops?
Refer to the exhibit. The routers are configured with RIPv2 with...
A technician adds the command Router(config-router)# variance 5 to a...
A company has an IT staff that is not highly trained. What two...
Refer to the exhibit. A pre-sales system engineer receives a diagram...
A network engineer is designing a LAN prototype for a medium-sized...
What type of system uses a PBX for call control and connection to the...
Which protocol is enabled by default to dynamically discover and...
What makes the Cisco EasyVPN application a useful tool for VPN...
A network administrator has changed the VLAN configurations on his...
Why is it difficult for network designers to predict the patterns and...
Refer to the exhibit. The routers are configured with RIPv2 with...
Refer to the exhibit. What does the TOR router do with traffic that is...
A customer of a large multisite organization has asked a network...
Refer to the exhibit. Which summarized route would be advertised Which...
 Refer to the exhibit. What is an accurate description of the...
A user in a large office calls tech support to complain that the PC no...
A WIC-1T module needs to be installed in a Cisco 1841 router that...
In order for the IT staff of a company to understand the basic...
 
Refer to the exhibit. An extended ACL has been created to deny traffic...
 NetworkingCompany engineer is on a support call resolving...
A small bookstore would like to offer wireless connectivity for...
Which IOS component can be used for classification and protocol...
Refer to the exhibit. A networking engineer is characterizing an...
Which IOS component can be used to classify and monitor network...
Which characteristic should be considered by a network designer when...
Which feature relies on prioritization of network traffic and is used...
A new WIC is installed in an available router slot. At what point...
When implementing an IP telephony solution, why should VLANs be used?
Refer to the exhibit. A networking company designer is reviewing a...
Which technology will prioritize traffic based upon the technical...
A network designer has chosen to specify the use of a dedicated...
A network administrator is given a network address of 192.168.1.64/26...
When implementing a security policy, which two actions should be...
Using the show frame-relay pvc and debug frame-relay lmi commands to...
What is the advantage of choosing EasyVPN for a new VPN...
A network administrator of a middle-sized company is asked to upgrade...
Which two security best practices are recommended for a router...
Several key servers in an organization must be directly accessible...
How should a network engineer determine if a router module is...
What is a function that is associated with the access layer in a...
A network engineer is prototyping a new IP addressing and...
*** If a router is unable to find a suitable IOS to load into RAM, in...
In a converged network, which two types of traffic would be...
Refer to the exhibit. A network associate is configuring a new router...
On a Monday morning the help desk at a large company receives an...
What is a characteristic of voice traffic in a converged network?
What is tunneling?
Which combination of Layer 2 protocol and authentication should be...
Which feature of network design and configuration would be considered...
What is meant by "tunneling" in the context of migrating...
Which command can be used to load a new Cisco IOS image on a router?
A network administrator has moved the company intranet web server from...
During prototype testing, the network designer performs a test to...
What value is an alternative representation of the IPv6...
Which option correctly defines the capacity through the local loop...
Refer to the exhibit. Following a test plan, the network systems...
A network administrator needs to transfer an IOS image to a router...
A company has its headquarters office in Dallas and five branch...
What is used locally by a router to identify each Frame Relay PVC?
Which type of network attack exploits vulnerabilities in the...
When configuring Frame Relay, what identifies a virtual circuit to the...
As part of network monitoring, a network administrator receives an...
Refer to the exhibit. EIGRP has been configured as a routing protocol...
An administrator learns of an e-mail that has been received by a...
Which statement is true about PAP in the authentication of a PPP...
Which two technologies can provide data integrity in a VPN connection?...
During prototype testing, a LAN switch fails. As the switch...
During a review of the proposed bill of materials, an account manager...
Which two processes allow a smooth transition from IPv4 to IPv6?...
Refer to the exhibit. All router interfaces are up and RIP version 2...
Refer to the exhibit. A technician at the ISP site asks the network...
Refer to the exhibit. A network administrator is configuring a new...
A company uses the Frame Relay network to establish a VPN connection...
A NetworkingCompany engineer is on a support call resolving technical...
Refer to the exhibit. The named ACL "Managers" already exists on the...
Refer to the exhibit. This serial interface is not functioning...
Refer to the exhibit. Following a test plan, the network systems...
A user in a large office calls technical support to complain that a PC...
What is the result when the command permit tcp 10.25.132.0 0.0.0.255...
A network engineer is at a customer site. After resolving technical...
The network designer recommends using RSTP in the design of a new data...
Which task would typically only require services that are located at...
What is the purpose of a network baseline?
Company XYZ needs a WAN connection between headquarters and branch...
A school district decides to use the 172.30.0.0/16 network for its LAN...
Which statement is true about the pairing of services and transport...
A DHCP server is configured with a block of excluded addresses. What...
Refer to the exhibit. A new host needs to be connected to the switch...
Where does a service provider assume responsibility from a customer...
What should be considered in the design of a wireless LAN on a...
A company has help desk staff that is not highly trained in VPNs. What...
A web-based retail company is considering updating its WAN connection...
What type of Frame Relay subinterface must be used to connect remote...
Company XYZ requires a WAN solution that provides flexible bandwidth...
Which statement describes the use of a network baseline?
What is the result when the command permit tcp 10.25.132.0 0.0.0.255...
  ...
Which two pieces of information are needed before an IOS image may be...
Refer to the exhibit. A NetworkingCompany designer is reviewing a...
What functionality do access control lists provide in the...
A network administrator is validating the routing for the new network...
The main office of a NetworkingCompany customer currently connects to...
Refer to the exhibit. A pre-sales systems engineer receives a diagram...
In what situation would the router display theROMMON> prompt at the...
Which two Frame Relay header bits are used to indicate possible...
Refer to the exhibit. RIPv2 has been configured on all routers in the...
While troubleshooting a Frame Relay link, the network administrator...
A network administrator is integrating IPv6 into an IPv4 network by...
Which option represents a best practice for applying ACLs?
Refer to the exhibit. From the output of the show...
Who provides technical support and training after deploying a network...
What is a characteristic of FTP traffic flows?
What type of ACL permits outbound traffic, but permits inbound traffic...
Refer to the exhibit. What can be concluded from the output that is...
A network administrator has configured Frame Relay on a serial...
When NAT is in use, what is used to determine the addresses that can...
A company plans to establish Frame Relay connections between corporate...
Refer to the exhibit. All devices are configured as shown in the...
What will prevent workstations with unauthorized MAC addresses from...
What type of system connects to the PSTN and uses a PBX to route calls...
Refer to the exhibit. Based on the EIGRP configuration that is shown,...
Which data link layer encapsulation protocol is used by default for...
A company is concerned with protecting internal e-commerce servers...
A company establishes a Frame Relay connection between corporate...
 A network administrator determines that falsified routing...
At what physical location does the responsibilty for a WAN connection...
A network administrator has removed a router from the network for...
Which two pieces of information should a network administrator have...
Refer to the exhibit. Computers on the internal network need access to...
Refer to the exhibit. What is the spanning-tree role of all the...
Compared with IDS systems, what can IPS systems do to provide further...
What will be the result of adding the command ip dhcp excluded-address...
Which two values represent valid IPv6 addresses? (Choose two.)
A datacenter designer considers using a traditional DMZ to protect a...
Refer to the exhibit. A customer has a problem with connectivity in...
What value is an alternative representation of the IPv6 address...
Refer to the exhibit. A NetworkingCompany engineer is characterizing...
At the distribution layer of a hierarchical network, what are two...
A bank is planning to add a secure, authenticated WAN connection to a...
What information does an administrator require before saving the...
If traditional phones are used when introducing VoIP to a network,...
Refer to the exhibit. Access list 100 is applied inbound to interface...
Refer to the exhibit. A company decides to install a new data center...
Refer to the exhibit. A network administrator is attempting to...
Which component in a Frame Relay WAN would set the BECN bit in the...
A wireless survey has been conducted before the deployment of a...
Which characteristic of VPN technology prevents the contents of data...
A designer is creating a test plan to validate a WAN design that is...
Refer to the exhibit. A network administrator is creating a prototype...
Refer to the exhibit. WestSW is supposed to send VLAN information to...
 An administrator is configuring a dual stack router with IPv6...
Which address provides an example of an IPv6 link-local address?
What two factors can increase the amount of time that is required for...
What is a function of software queuing?
Which IP address and wildcard mask would be used in an ACL to block...
Refer to the exhibit. A network engineer issues the show ip route...
Refer to the exhibit. What will be the result of entering the commands...
To reduce unwanted incoming traffic from the outside, a network...
While troubleshooting a problem with an e-mail server, an...
When designing a prototype network for a new server farm, a network...
A network designer must select a routing protocol for the network of a...
Which three guidelines would help contribute to creating a strong...
Refer to the exhibit. A company with four servers in its server farm...
Refer to the exhibit. An extended ACL has been created to deny traffic...
A network administrator is tasked with maintaining two remote...
What are two main components of data confidentiality? (Choose two.)
Refer to the exhibit. Based on the output as shown, which two...
The network infrastructure at the headquarters of an organization...
What are two advantages of using Layer 3 devices instead of Layer 2...
Refer to the exhibit. What can be determined about the operation of...
What is the result of implementing a Frame Relay service with a CIR...
What are two accurate descriptors of a DLCI? (Choose two.)
In the Cisco Enterprise Architecture, which module would include web...
Refer to the exhibit. Results of the show vlan and show vtp status...
An employee of XYZ corporation will begin working from home. The...
A network administrator is asked to upgrade the enterprise network...
A company would like to ensure that the failure of a single access...
A network administrator wants to configure a router that is running...
A company has branch offices at several locations across the country....
Because of a remote-procedure call failure, a user is unable to access...
Refer to the exhibit. Headquarters is connected through the Internet...
Alert!

Advertisement