CCNA Dcompnwk Final 1

276 Questions | Total Attempts: 50

SettingsSettingsSettings
CCNA Dcompnwk Final 1

Questions and Answers
  • 1. 
    Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of an access layer switch and connects three PCs. The engineer attempts to ping from each PC to the other connected PCs to test the configuration. Which statement describes the result of the last step?
    • A. 

      Host 1 can ping Host 2.

    • B. 

      Host 1 can ping Host 3.

    • C. 

      Host 2 can ping Host 3.

    • D. 

      No hosts can ping any other host.

  • 2. 
    Refer to the exhibit. Based on the EIGRP configuration that is shown, what can the field engineer conclude about the EIGRP authentication between RouterA and RouterB?
    • A. 

      Authentication will fail because only one key is configured.

    • B. 

      Authentication will fail because the key chain names do not match.

    • C. 

      Authentication will succeed and EIGRP updates can be exchanged.

    • D. 

      Authentication will fail because the key chain names must match the router names.

  • 3. 
    What is a characteristic of FTP traffic flows?
    • A. 

      Low-volume traffic

    • B. 

      Predictable bandwidth usage

    • C. 

      Large packet sizes for transfers

    • D. 

      Low throughput with high response-time requirements

  • 4. 
    *** If a router is unable to find a suitable IOS to load into RAM, in what mode does the bootprocess end?
    • A. 

      Setup mode

    • B. 

      User mode

    • C. 

      Rommon mode

    • D. 

      Privileged mode

  • 5. 
    In a converged network, which two types of traffic would be categorized as real-timetraffic? (Choose two.)
    • A. 

      E-mail

    • B. 

      File transfer

    • C. 

      Web browsing

    • D. 

      Videoconferencing

    • E. 

      Voice over IP

    • F. 

      Video on demand

  • 6. 
    A company uses the Frame Relay network to establish a VPN connection between headquarters and the branch office. The company wants to add a backup link in case theFrame Relay connection fails. The backup link will use the business DSL connection throughanother ISP. How should the router be configured to include the backup link?
    • A. 

      Create a static route with the administrative distance of 1.

    • B. 

      Create a floating static route

    • C. 

      Add a new route to the routing protocol configuration.

    • D. 

      Create a second default route for the backup path

  • 7. 
    Refer to the exhibit. What is the spanning-tree role of all the enabled interfaces of SW11
    • A. 

      Alternate

    • B. 

      Backup

    • C. 

      Designated

    • D. 

      Root

  • 8. 
    A WIC-1T module needs to be installed in a Cisco 1841 router that currently has a WIC-2T module in slot 0. What should the network technician do first?
    • A. 

      Install the hot-swappable option module

    • B. 

      Turn off the power to the router before installing the new module.

    • C. 

      Remove the WIC-2T module so that the new module can be installed in slot 0.

    • D. 

      Shut down all Fast Ethernet ports on the router until the new WIC module installation is complete.

    • E. 

      Configure the Cisco IOS software to support an internal trunk link between the two WIC modules.

  • 9. 
    During prototype testing, a LAN switch fails. As the switch re-initializes using the default parameters, a port that has a PC attached transitions to the forwarding state within onesecond. What protocol would support this feature?
    • A. 

      STP

    • B. 

      RIP

    • C. 

      BGP

    • D. 

      VTP

    • E. 

      RSTP

  • 10. 
    What are two accurate descriptors of a DLCI? (Choose two.)
    • A. 

      Frame Relay Layer 2 address

    • B. 

      One DLCI allowed per local loop

    • C. 

      Locally significant circuit endpoint

    • D. 

      Signaling standard between DTE and DCE

    • E. 

      Establishes the data transfer rate through a Frame Relay network

  • 11. 
    A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. The technician asks the caller to talk to nearby users to see if other machines are affected. The caller reports that several immediate neighbors in the same department have a similar problem and that they cannot ping each other. Those who are seated in other departments have connectivity. What should the technician check as the first step in troubleshooting the issue?
    • A. 

      The power outlet to the PC that is used by the caller

    • B. 

      The trunks between switches in the wiring closet

    • C. 

      The status of the departmental workgroup switch in the wiring closet

    • D. 

      The cable that connects the PC of the caller to the network jack

    • E. 

      The cable connection between a PC and a network outlet that is used by a neighbor

  • 12. 
    A NetworkingCompany engineer is on a support call resolving technical problems for aclient network. After the issue is resolved, the engineer also provides a training session forthe network support staff. What role is the engineer filling on the networking companyteam?
    • A. 

      post-sales field engineer

    • B. 

      pre-sales engineer

    • C. 

      Network designer

    • D. 

      Account manager

  • 13. 
    Refer to the exhibit. The network administrator has used the Cisco Feature Navigator to choose a Cisco IOS image to install on a router. Given the exhibited output of the showversion command, which statement is true about the capacity of the router to use this CiscoIOS image?
    • A. 

      There is enough DRAM and flash.

    • B. 

      There is not enough DRAM and flash.

    • C. 

      There is enough DRAM but not enough flash

    • D. 

      There is not enough DRAM but enough flash

  • 14. 
    Refer to the exhibit. The named ACL “Managers” already exists on the router. What will happen when the network administrator issues the commands that are shown in the exhibit?
    • A. 

      The commands overwrite the existing Managers ACL

    • B. 

      The commands are added at the end of the existing Managers ACL.

    • C. 

      The commands are added at the beginning of the existing Managers ACL.

    • D. 

      The network administrator receives an error that states that the ACL already exists.

  • 15. 
    Refer to the exhibit. A company with four servers in its server farm has not enabled PVRST on the switches that connect to the server farm segment. What will happen withinthe network if a primary link goes down? (nem talaltam kepet)
    • A. 

      Access to the the servers will be los

    • B. 

      Convergence time will be slow and possibly cause applications to time out.

    • C. 

      Routing protocols will not send the triggered updates in the event of a failure of the root bridge.

    • D. 

      Switches that connect the servers to the network will not be found by other switches in thenetwork

  • 16. 
    What type of ACL permits outbound traffic, but permits inbound traffic only if it is aresponse to the traffic that is initiated from inside the network?
    • A. 

      Dynamic

    • B. 

      Reflexive

    • C. 

      Standard

    • D. 

      Extended

    • E. 

      Time-based

  • 17. 
    A network administrator has configured Frame Relay on a serial interface and issued theshow interfaces serial command. The output shows that the interface is up and the lineprotocol is up. However, pings to the remote router across the link fail. What should the nextstep be to ensure that the IP address of the remote router appears in the Frame Relay maptable of the local router?
    • A. 

      Configure the router using the no inverse-arp command

    • B. 

      Ensure that the LMI type is correct for the circuit.

    • C. 

      Configure the router using the frame-relay map ip command

    • D. 

      Verify that the remote router has Frame Relay encapsulation enabled

  • 18. 
    Refer to the exhibit. A pre-sales systems engineer receives a diagram of the exhibited WAN implementation from a customer. EIGRP is the routing protocol that is used on theWAN. None of the parameters for EIGRP metric calculation have been modified in anyrouter configurations. Which statement is true about the routing table on router RM?
    • A. 

      There is a single route to the 192.168.24.0/24 LAN using the T1 connection

    • B. 

      There is a single route to the 192.168.24.0/24 LAN using the DSL connection

    • C. 

      There is a single route to the 192.168.24.0/24 LAN using the Metro Ethernet connection

    • D. 

      EIGRP installs all three routes to the 192.168.24.0/24 LAN and load balances the traffic

  • 19. 
    Refer to the exhibit. A network administrator is configuring a new router to provide routing between VLANs. The administrator removes the router from the box and connectsthe Fa0/0 interface to a trunking port on the switch. After the configuration is applied to therouter, as shown in the exhibit, the traffic between VLANs fails. What is causing this tooccur?
    • A. 

      The R1 router needs a routing protocol configured

    • B. 

      The subinterfaces of the R1 router should have IP addresses applied

    • C. 

      The R1 router needs three additional Fast Ethernet interfaces installed.

    • D. 

      The subinterfaces of the R1 router should be configured in the same VLAN.

  • 20. 
    A bank is planning to add a secure, authenticated WAN connection to a rural branchoffice. The connection must provide bandwidth of up to 10 Mb/s with QoS supporting VoIP.Which WAN connection type should the network designer recommend?
    • A. 

      DSL

    • B. 

      ISDN

    • C. 

      Leased line

    • D. 

      Frame relay

  • 21. 
    A company has branch offices at several locations across the country. Which securityimplementation would provide a cost-effective, secure, and authenticated connection tocentralized internal resources that are located at company headquarters, without requiringconfiguration for individual employees at the branch offices?
    • A. 

      Leased line with PPP authentication

    • B. 

      Site-to-site VPN

    • C. 

      Remote-access VPN

    • D. 

      Access control list

  • 22. 
    Refer to the exhibit. An extended ACL has been created to deny traffic from the192.168.35.0/24 network to the web server with IP address 209.165.201.15. According to Cisco best practices, where should the ACL be applied
    • A. 

      RTB Fa0/0 inbound

    • B. 

      RTC S0/0/1 inbound

    • C. 

      RTD Fa0/0 outbound

    • D. 

      RTC S0/1/0 outbound

  • 23. 
    Which EIGRP configuration commands should a network administrator enter on router R1 to correctly advertise a single summary route to router MAIN for the campus LAN?
    • A. 

      Router eigrp 11 network 10.5.0.0 network 192.168.0.0 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252

    • B. 

      Router eigrp 11 network 192.168.0.0 0.0.3.255 network 192.168.8.0 0.0.3.255 network 10.5.0.0 0.0.0.3 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252

    • C. 

      Router eigrp 11 network 10.5.0.0 0.0.0.3 network 192.168.0.0 0.0.3.255 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252 ip summary-address eigrp 11 192.168.0.0 255.255.252.0

    • D. 

      router eigrp 11 network 10.5.0.0 0.0.0.3 network 192.168.8.0 network 192.168.28.0 network 192.168.20.0 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252 ip summary-address eigrp 11 192.168.0.0 255.255.224.0

  • 24. 
     Refer to the exhibit. What is an accurate description of the first neighbor that is displayedin the output?
    • A. 

      24 port 2950 switch with a non-default native VLAN

    • B. 

      24 port 2950 switch that is connected to Fa0/0 on Router1

    • C. 

      24 port 2950 switch that is assigned to the administrator-defined VTP domain

    • D. 

      24 port 2950 switch with interface GigabitEthernet0/1 that is operating at 1000 Mb/s

  • 25. 
    During prototype testing, the network designer performs a test to determine the ability of the network to recover from a link or device failure. Which design goal is validated if the testis a success?
    • A. 

      Scalability

    • B. 

      Manageability

    • C. 

      Availability

    • D. 

      Security

Related Topics
Back to Top Back to top