CCNA 4 Set 3

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Badboysline
B
Badboysline
Community Contributor
Quizzes Created: 2 | Total Attempts: 101
Questions: 44 | Attempts: 64

SettingsSettingsSettings
CCNA 4 Set 3 - Quiz

Questions and Answers
  • 1. 

    What does an access control list determine when used with NAT on a Cisco route

    • A.

      Addresses that are to be translated

    • B.

      Addresses that are assigned to a NAT pool

    • C.

      Addresses that are allowed out of the router

    • D.

      Addresses that are accessible from the inside network

    Correct Answer
    A. Addresses that are to be translated
    Explanation
    An access control list (ACL) determines which addresses will be translated when used with Network Address Translation (NAT) on a Cisco router. This means that the ACL specifies which IP addresses will undergo the translation process, allowing them to be converted from private IP addresses to public IP addresses, or vice versa. The ACL helps control the flow of traffic and determines which addresses will be affected by the NAT process.

    Rate this question:

  • 2. 

    A technician has been asked to run the Cisco SDM one-step lockdown on a customer router. What will be the result of this process?

    • A.

      Traffic is only accepted from and forwarded to SDM-trusted Cisco routers.

    • B.

      Security testing is performed and the results are saved as a text file stored in NVRAM.

    • C.

      All traffic that enters the router is quarantined and checked for viruses before being forwarded.

    • D.

      The router is tested for any potential security problems and all recommended security-related configuration changes will be automatically applied.

    Correct Answer
    D. The router is tested for any potential security problems and all recommended security-related configuration changes will be automatically applied.
    Explanation
    Running the Cisco SDM one-step lockdown on a customer router will result in the router being tested for potential security problems. Additionally, any recommended security-related configuration changes will be automatically applied. This process helps to enhance the security of the router by identifying vulnerabilities and making necessary adjustments to prevent potential threats.

    Rate this question:

  • 3. 

           Refer to the exhibit. Which data transmission technology is being represented

    • A.

      TDM

    • B.

      PPP

    • C.

      HDLC

    • D.

      SLIP

    Correct Answer
    A. TDM
    Explanation
    The correct answer is TDM. TDM stands for Time Division Multiplexing, which is a data transmission technology that allows multiple signals to be transmitted simultaneously over a single communication channel. In TDM, each signal is assigned a specific time slot during which it can transmit data. This allows for efficient and organized transmission of multiple signals, making TDM a commonly used technology in telecommunications and networking.

    Rate this question:

  • 4. 

    A network administrator is instructing a technician on best practices for applying ACLs. Which two suggestions should the administrator provide? (Choose two.)

    • A.

      Named ACLs are less efficient than numbered ACLs.

    • B.

      Standard ACLs should be applied inside the core layer.

    • C.

      Place standard ACLs as close to the destination as possible.

    • D.

      ACLs applied to outbound interfaces require fewer router resources.

    • E.

      Extended ACLs should be applied closest to the source that is specified by the ACL.

    Correct Answer(s)
    C. Place standard ACLs as close to the destination as possible.
    E. Extended ACLs should be applied closest to the source that is specified by the ACL.
  • 5. 

    Refer to the exhibit. Which configuration command would result in the output in the exhibit

    • A.

      Ip nat inside source static 10.1.200.254 172.16.76.3

    • B.

      Ip nat inside source static 10.1.200.254 192.168.0.10

    • C.

      Ip nat inside source static 172.16.76.3 10.1.200.254

    • D.

      Ip nat inside source static 172.16.76.3 192.168.0.10

    • E.

      Ip nat inside source static 192.168.0.10 172.16.76.3

    • F.

      Ip nat inside source static 192.168.0.10 10.1.200.254

    Correct Answer
    E. Ip nat inside source static 192.168.0.10 172.16.76.3
    Explanation
    The correct answer is "ip nat inside source static 192.168.0.10 172.16.76.3". This command would result in the output shown in the exhibit because it configures a static NAT translation where the source IP address 192.168.0.10 is translated to 172.16.76.3. This means that any traffic originating from the inside network with the source IP address of 192.168.0.10 will be translated to 172.16.76.3 when it goes through the NAT process.

    Rate this question:

  • 6. 

     What are three important reasons to establish a network baseline? (Choose three.)

    • A.

      To determine the time it takes for the network to self recover from a failure

    • B.

      To determine which areas in the network are underutilized or overutilized

    • C.

      To determine the performance of the network during the normal hours of operation

    • D.

      To determine what thresholds should be set for the devices that need to be monitored

    • E.

      To determine the areas in the network which should not be included in the monitoring process

    • F.

      To determine the number of users whose access to network resources should be restricted

    Correct Answer(s)
    B. To determine which areas in the network are underutilized or overutilized
    C. To determine the performance of the network during the normal hours of operation
    D. To determine what thresholds should be set for the devices that need to be monitored
    Explanation
    Establishing a network baseline is important for several reasons. Firstly, it allows us to determine which areas in the network are underutilized or overutilized. This information is crucial for optimizing network resources and ensuring efficient performance. Secondly, it helps us evaluate the performance of the network during normal hours of operation, providing insights into potential bottlenecks or areas needing improvement. Lastly, establishing a baseline helps determine the appropriate thresholds that should be set for devices that need to be monitored, enabling effective monitoring and troubleshooting.

    Rate this question:

  • 7. 

     Which two statements are true about creating and applying access lists? (Choose two.)

    • A.

      There is an implicit deny at the end of all access lists.

    • B.

      One access list per port, per protocol, per direction is permitted

    • C.

      Access list entries should filter in the order from general to specific.

    • D.

      The term “inbound” refers to traffic that enters the network from the router interface where the ACL is applied.

    • E.

      Standard ACLs should be applied closest to the source while extended ACLs should be applied closest to the destination

    Correct Answer(s)
    A. There is an implicit deny at the end of all access lists.
    B. One access list per port, per protocol, per direction is permitted
    Explanation
    Access lists are used to filter network traffic based on specific criteria. The statement "There is an implicit deny at the end of all access lists" is true because if a packet does not match any of the permit statements in an access list, it is denied by default. The statement "One access list per port, per protocol, per direction is permitted" is also true because access lists are applied to interfaces and can be configured to filter traffic based on the source and destination ports, protocols, and directions.

    Rate this question:

  • 8. 

    Which functions are provided by LCP and NCP as part of the PPP layered architecture

    • A.

      LCP sets up the PPP connection and its parameters. NCP terminates the PPP connection

    • B.

      LCP sets up the PPP connection and its parameters. NCP handles higher layer protocol configurations

    • C.

      LCP includes the link-establishment phase. NCP includes link-maintenance and link-termination phases.

    • D.

      LCP negotiates options for multiple network layer protocols. NCP agrees automatically on encapsulation formats.

    Correct Answer
    B. LCP sets up the PPP connection and its parameters. NCP handles higher layer protocol configurations
    Explanation
    LCP (Link Control Protocol) is responsible for setting up the PPP (Point-to-Point Protocol) connection and its parameters. This includes establishing the link, negotiating options for multiple network layer protocols, and agreeing automatically on encapsulation formats. On the other hand, NCP (Network Control Protocol) handles higher layer protocol configurations, such as configuring and managing network layer protocols like IP (Internet Protocol) or IPX (Internetwork Packet Exchange). It is responsible for link-maintenance and link-termination phases, ensuring the proper functioning of the network protocols.

    Rate this question:

  • 9. 

    Refer to the exhibit. EIGRP has been configured on routers R1 and R2. Connectivity across the Frame Relay switch between routers R1 and R2 is successfully verified using the ping command. However, no EIGRP routes are appearing in the routing table. What could be a cause for this failure

    • A.

      The Frame Relay switch has failed.

    • B.

      The frame-relay map statement is incorrect

    • C.

      The S0/0/0 interface of router R1 is administratively down.

    • D.

      The S0/0/0 interface of router R2 has an incorrect IP address.

    Correct Answer
    D. The S0/0/0 interface of router R2 has an incorrect IP address.
    Explanation
    The reason for the failure could be that the S0/0/0 interface of router R2 has an incorrect IP address. This would prevent proper communication between the routers and result in EIGRP routes not appearing in the routing table.

    Rate this question:

  • 10. 

    Refer to the exhibit. Results of the show vlan and show vtp status commands for switches S1 and S2 are displayed in the exhibit. VLAN 11 was created on S1. Why is VLAN 11 missing from S2?

    • A.

      There is a Layer 2 loop.

    • B.

      The VTP domain names do not match.

    • C.

      Only one switch can be in server mode

    • D.

      S2 has a higher spanning-tree priority for VLAN 11 than S1 does.

    Correct Answer
    B. The VTP domain names do not match.
    Explanation
    The VTP domain names do not match between switches S1 and S2. VTP (VLAN Trunking Protocol) is used to manage VLAN configurations across multiple switches in a domain. In order for VLAN information to be synchronized between switches, they must be in the same VTP domain with matching domain names. Since VLAN 11 was created on S1, but is missing on S2, it suggests that S1 and S2 are not in the same VTP domain or their domain names do not match.

    Rate this question:

  • 11. 

    Refer to the exhibit. A network administrator is considering updating the IOS on Router1. What version of IOS is currently installed on Router1

    • A.

      1

    • B.

      12.4

    • C.

      15

    • D.

      1841

    Correct Answer
    B. 12.4
    Explanation
    Based on the given options, the answer 12.4 indicates that the current version of IOS installed on Router1 is 12.4.

    Rate this question:

  • 12. 

    Refer to the exhibit. What is placed in the address field in the header of a frame that will travel from the San Jose router to the DC router?

    • A.

      DLCI 103

    • B.

      DLCI 301

    • C.

      172.16.1.18

    • D.

      172.16.1.19

    Correct Answer
    B. DLCI 301
    Explanation
    The address field in the header of a frame that will travel from the San Jose router to the DC router is DLCI 301. This is because DLCI (Data Link Connection Identifier) is used in Frame Relay networks to identify virtual circuits between routers. DLCI 301 specifically indicates the virtual circuit that connects the San Jose router to the DC router.

    Rate this question:

  • 13. 

    Refer to the exhibit. Which statement about the configuration is true?

    • A.

      10.10.10.1 is most likely assigned to the local LAN interface.

    • B.

      10.10.10.1 through 10.10.10.255 is available to be assigned to users.

    • C.

      All DHCP clients looking for an IP address will use 10.10.10.1 and 10.10.10.2.

    • D.

      All DHCP clients in the 10.10.10.0/24 network will use 10.10.10.2 as the default gateway.

    Correct Answer
    D. All DHCP clients in the 10.10.10.0/24 network will use 10.10.10.2 as the default gateway.
    Explanation
    The correct answer is "All DHCP clients in the 10.10.10.0/24 network will use 10.10.10.2 as the default gateway." This is because the given configuration shows that the IP address 10.10.10.2 is assigned to the interface GigabitEthernet0/0, which is the default gateway for the DHCP clients in the 10.10.10.0/24 network. The IP address 10.10.10.1 is not mentioned in the configuration, so it is not likely to be assigned to the local LAN interface. The range 10.10.10.1 through 10.10.10.255 is not mentioned in the configuration either, so it cannot be assumed that it is available to be assigned to users.

    Rate this question:

  • 14. 

    Which statement is true about an interface that is configured with the IPv6 address command? 

    • A.

      IPv6 traffic-forwarding is enabled on the interface.

    • B.

      A link-local IPv6 address is automatically configured on the interface.

    • C.

      A global unicast IPv6 address is dynamically configured the interface.

    • D.

      Any IPv4 addresses that are assigned to the interface are replaced with an IPv6 address.

    Correct Answer
    B. A link-local IPv6 address is automatically configured on the interface.
    Explanation
    When an interface is configured with the IPv6 address command, a link-local IPv6 address is automatically configured on the interface. This link-local address is automatically generated by the interface using the EUI-64 format and is used for communication within the local network segment. It is important to note that this command only configures a link-local address and does not assign a global unicast IPv6 address or enable IPv6 traffic-forwarding on the interface. Additionally, assigning an IPv6 address does not replace any existing IPv4 addresses on the interface.

    Rate this question:

  • 15. 

    Which statement is true about PAP in the authentication of a PPP session? 

    • A.

      PAP uses a two-way handshake.

    • B.

      The password is unique and random.

    • C.

      PAP conducts periodic password challenges.

    • D.

      PAP uses MD5 hashing to keep the password secure.

    Correct Answer
    A. PAP uses a two-way handshake.
    Explanation
    PAP (Password Authentication Protocol) is a simple authentication protocol used in PPP (Point-to-Point Protocol) sessions. It involves a two-way handshake process where the client sends its username and password to the server, and the server responds with an acknowledgment or rejection. This process allows the client and server to verify each other's identity before establishing the connection. PAP does not use MD5 hashing or conduct periodic password challenges, and the uniqueness and randomness of the password are not specified in the question.

    Rate this question:

  • 16. 

    Refer to the exhibit. Communication between two peers has failed. Based on the output that is shown, what is the most likely cause?

    • A.

      Interface reset

    • B.

      Unplugged cable

    • C.

      Improper LMI type

    • D.

      PPP negotiation failure

    Correct Answer
    D. PPP negotiation failure
    Explanation
    Based on the given output, the most likely cause of the communication failure is PPP negotiation failure. The output shows that the LCP (Link Control Protocol) state is down, which indicates that the PPP negotiation process failed to establish a link between the two peers. This could be due to mismatched configuration settings or authentication issues during the negotiation process.

    Rate this question:

  • 17. 

    Refer to the exhibit. A network administrator is tasked with completing the Frame Relay topology that interconnects two remote sites. How should the point-to-point subinterfaces be configured on HQ to complete the topology?

    • A.

      Frame-relay interface-dlci 103 on Serial 0/0/0.1 frame-relay interface-dlci 203 on Serial 0/0/0.2

    • B.

      Frame-relay interface-dlci 301 on Serial 0/0/0.1 frame-relay interface-dlci 302 on Serial 0/0/0.2

    • C.

      Frame-relay map ip 192.168.1.1 103 broadcast on Serial 0/0/0.1 frame-relay map ip 192.168.2.2 203 broadcast on Serial 0/0/0.2

    • D.

      Frame-relay map ip 192.168.1.1 301 broadcast on Serial 0/0/0.1 frame-relay map ip 192.168.2.2 302 broadcast on Serial 0/0/0.2

    Correct Answer
    D. Frame-relay map ip 192.168.1.1 301 broadcast on Serial 0/0/0.1 frame-relay map ip 192.168.2.2 302 broadcast on Serial 0/0/0.2
    Explanation
    The correct answer is to configure the point-to-point subinterfaces on HQ by mapping the IP addresses 192.168.1.1 and 192.168.2.2 to the DLCIs 301 and 302 respectively. This ensures that the traffic from the HQ router will be correctly forwarded to the remote sites via the appropriate DLCIs on the Serial interfaces 0/0/0.1 and 0/0/0.2. The "broadcast" keyword indicates that the Frame Relay network should treat these IP addresses as broadcast addresses.

    Rate this question:

  • 18. 

    Which data link layer encapsulation protocol is used by default for serial connections between two Cisco routers?

    • A.

      ATM

    • B.

      Frame Relay

    • C.

      HDLC

    • D.

      PPP

    • E.

      SDLC

    Correct Answer
    C. HDLC
    Explanation
    HDLC (High-Level Data Link Control) is the default data link layer encapsulation protocol used for serial connections between Cisco routers. HDLC is a bit-oriented protocol that provides reliable and error-free communication between devices. It is a simple and efficient protocol that offers basic functionality for point-to-point connections. HDLC is widely supported by Cisco routers and is the default encapsulation used unless otherwise specified.

    Rate this question:

  • 19. 

    Refer to the exhibit. Company ABC expanded its business and recently opened a new branch office in another country. IPv6 addresses have been used for the company network. The data servers Server1 and Server2 run applications which require end-to-end functionality, with unmodified packets that are forwarded from the source to the destination. The edge routers R1 and R2 support dual stack configuration. What solution should be deployed at the edge of the company network in order to successfully interconnect both offices?

    • A.

      A new WAN service supporting only IPv6

    • B.

      NAT overload to map inside IPv6 addresses to outside IPv4 address

    • C.

      A manually configured IPv6 tunnel between the edge routers R1 and R2

    • D.

      Static NAT to map inside IPv6 addresses of the servers to an outside IPv4 address and dynamic NAT for the rest of the inside IPv6 addresses

    Correct Answer
    C. A manually configured IPv6 tunnel between the edge routers R1 and R2
    Explanation
    A manually configured IPv6 tunnel between the edge routers R1 and R2 should be deployed at the edge of the company network in order to successfully interconnect both offices. This solution allows for the transmission of unmodified packets from the source to the destination, ensuring end-to-end functionality for the applications running on Server1 and Server2. By manually configuring the IPv6 tunnel, the routers R1 and R2 can establish a secure and reliable connection between the two offices, enabling seamless communication over the IPv6 network.

    Rate this question:

  • 20. 

    Which variable is permitted or denied by a standard access control list?

    • A.

      Protocol type

    • B.

      Source IP address

    • C.

      Source MAC address

    • D.

      Destination IP address

    • E.

      Destination MAC address

    Correct Answer
    B. Source IP address
    Explanation
    A standard access control list (ACL) permits or denies access based on the source IP address. This means that the ACL can be configured to allow or block traffic based on the specific IP address or range of IP addresses from which it originates. The ACL does not consider other variables such as the protocol type, source MAC address, destination IP address, or destination MAC address when making access control decisions.

    Rate this question:

  • 21. 

    Refer to the exhibit. The link between the CTRL and BR_1 routers is configured as shown in the exhibit. Why are the routers unable to establish a PPP session?

    • A.

      The clock rate must be 56000.

    • B.

      The usernames are misconfigured.

    • C.

      The IP addresses are on different subnets.

    • D.

      The clock rate is configured on the wrong end of the link.

    • E.

      The CHAP passwords must be different on the two routers.

    • F.

      The CHAP passwords must be different on the two routers.

    Correct Answer
    B. The usernames are misconfigured.
    Explanation
    The routers are unable to establish a PPP session because the usernames are misconfigured. This means that the usernames entered on both routers do not match, which prevents the authentication process from being successful.

    Rate this question:

  • 22. 

    Which three statements accurately describe a security policy? (Choose three.)

    • A.

      It creates a basis for legal action if necessary.

    • B.

      It defines a process for managing security violations.

    • C.

      It defines acceptable and unacceptable use of network resources.

    • D.

      The remote access policy is a component of the security policy that governs acceptable use of e-mail systems.

    • E.

      It is kept private from users to prevent the possibility of circumventing security measures.

    • F.

      It provides step-by-step procedures to harden routers and other network devices

    Correct Answer(s)
    A. It creates a basis for legal action if necessary.
    B. It defines a process for managing security violations.
    F. It provides step-by-step procedures to harden routers and other network devices
    Explanation
    A security policy is a set of rules and guidelines that outline how an organization will protect its information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The three statements that accurately describe a security policy are:

    1. It creates a basis for legal action if necessary: A security policy clearly outlines the rules and regulations that employees must follow. If these policies are violated, legal action can be taken to hold individuals accountable.

    2. It defines a process for managing security violations: A security policy provides guidelines on how to handle security incidents or violations. It outlines the steps to be taken in case of a breach or unauthorized access.

    3. It provides step-by-step procedures to harden routers and other network devices: A security policy includes procedures and best practices to secure network devices, such as routers. This ensures that the devices are configured correctly and have the necessary security measures in place to protect against potential threats.

    Rate this question:

  • 23. 

    A network administrator has changed the VLAN configurations on his network switches over the past weekend. How can the administrator determine if the additions and changes improved performance and availability on the company intranet?

    • A.

      Conduct a performance test and compare with the baseline that was established previously.

    • B.

      Interview departmental secretaries and determine if they think load time for web pages has improved.

    • C.

      Determine performance on the intranet by monitoring load times of company web pages from remote sites.

    • D.

      Compare the hit counts on the company web server for the current week to the values that were recorded in previous weeks.

    Correct Answer
    A. Conduct a performance test and compare with the baseline that was established previously.
    Explanation
    To determine if the VLAN configurations have improved performance and availability on the company intranet, the network administrator should conduct a performance test and compare it with the previously established baseline. This will provide quantitative data on the network's performance and help identify any improvements or issues. By comparing the test results with the baseline, the administrator can assess whether the changes made to the VLAN configurations have positively impacted performance and availability.

    Rate this question:

  • 24. 

    Refer to the exhibit. Headquarters is connected through the Internet to branch office A and branch office B. Which WAN technology would be best suited to provide secure connectivity between headquarters and both branch offices? 

    • A.

      ATM

    • B.

      VPN

    • C.

      ISDN

    • D.

      Frame Relay

    • E.

      Broadband DSL

    Correct Answer
    B. VPN
    Explanation
    A VPN (Virtual Private Network) would be the best WAN technology to provide secure connectivity between headquarters and both branch offices. VPNs use encryption and tunneling protocols to create a secure and private network over a public network, such as the Internet. This ensures that data transmitted between the headquarters and branch offices is protected from unauthorized access and interception. Additionally, VPNs are cost-effective and scalable, making them a suitable choice for connecting multiple locations securely.

    Rate this question:

  • 25. 

    Which statement about a VPN is true?

    • A.

      VPN link establishment and maintenance is provided by LCP.

    • B.

      DLCI addresses are used to identify each end of the VPN tunnel.

    • C.

      VPNs use virtual Layer 3 connections that are routed through the Internet.

    • D.

      Only IP packets can be encapsulated by a VPN for tunneling through the Internet.

    Correct Answer
    C. VPNs use virtual Layer 3 connections that are routed through the Internet.
  • 26. 

    A company is deciding which WAN connection type it should implement between its main office and branch offices. The company wants to use a cost-effective service that provides virtual circuits between each office. The company also wants to be able to transmit variable-length packets on these circuits. Which solution best meets these requirements?

    • A.

      ATM

    • B.

      ATM

    • C.

      ISDN

    • D.

      Frame Relay

    Correct Answer
    D. Frame Relay
    Explanation
    Frame Relay is the best solution that meets the company's requirements. Frame Relay is a cost-effective WAN connection type that provides virtual circuits between each office. It is capable of transmitting variable-length packets, making it suitable for the company's needs. ATM and ISDN are not mentioned to be cost-effective or capable of transmitting variable-length packets, so they are not the best solutions.

    Rate this question:

  • 27. 

    A technician is talking to a colleague at a rival company and comparing DSL transfer rates between the two companies. Both companies are in the same city, use the same service provider, and have the same rate/service plan. What is the explanation for why company 1 reports higher download speeds than company 2 reports?

    • A.

      Company 1 only uses microfilters at branch locations.

    • B.

      Company 1 has a lower volume of POTS traffic than company 2 has.

    • C.

      Company 2 is located farther from the service provider than company 1 is.

    • D.

      Company 2 shares the connection to the DSLAM with more clients than company 1 shares with.

    Correct Answer
    C. Company 2 is located farther from the service provider than company 1 is.
    Explanation
    The explanation for why company 1 reports higher download speeds than company 2 reports is that company 2 is located farther from the service provider than company 1. The distance between a company and the service provider can affect the quality and speed of the DSL connection. The farther the distance, the more likely there will be signal degradation and slower transfer rates. Therefore, company 2 experiences slower download speeds compared to company 1.

    Rate this question:

  • 28. 

    Refer to the exhibit. Which configuration command would result in the output in the exhibit?

    • A.

      Ip nat inside source static 10.1.200.254 172.16.76.3

    • B.

      Ip nat inside source static 10.1.200.254 192.168.0.10

    • C.

      Ip nat inside source static 172.16.76.3 10.1.200.254

    • D.

      Ip nat inside source static 172.16.76.3 192.168.0.10

    • E.

      Ip nat inside source static 192.168.0.10 172.16.76.3

    • F.

      Ip nat inside source static 192.168.0.10 10.1.200.254

    Correct Answer
    E. Ip nat inside source static 192.168.0.10 172.16.76.3
    Explanation
    The correct answer is "ip nat inside source static 192.168.0.10 172.16.76.3" because this command configures a static NAT translation where the internal IP address 192.168.0.10 is translated to the external IP address 172.16.76.3. This means that any traffic originating from the internal IP address will appear to come from the external IP address when it goes out to the internet.

    Rate this question:

  • 29. 

    What can a network administrator do to recover from a lost router password? 

    • A.

      Boot the router to ROM monitor mode and configure the router to ignore the startup configuration when it initializes

    • B.

      Telnet from another router and issue the show running-config command to view the password

    • C.

      Boot the router to bootROM mode and enter the b command to load the IOS manually

    • D.

      Use the copy tftp: flash: command

    Correct Answer
    A. Boot the router to ROM monitor mode and configure the router to ignore the startup configuration when it initializes
    Explanation
    To recover from a lost router password, a network administrator can boot the router to ROM monitor mode and configure the router to ignore the startup configuration when it initializes. This allows the administrator to bypass the password and gain access to the router.

    Rate this question:

  • 30. 

    Refer to the exhibit. ACL 120 is configured to allow traffic coming from 192.168.10.0/24 network to go to any destination limited to ports 80 and 443. ACL 130 should allow only requested HTTP traffic to flow back into the network. What additional configuration is needed in order for the access lists to fulfill the requirements

    • A.

      Option 1

    • B.

      Option 2

    • C.

      Option 3

    • D.

      Option 4

    Correct Answer
    B. Option 2
  • 31. 

    A system administrator must provide Internet connectivity for ten hosts in a small remote office. The ISP has assigned two public IP addresses to this remote office. How can the system administrator configure the router to provide Internet access to all ten users at the same time? 

    • A.

      Configure static NAT.

    • B.

      Configure dynamic NAT.

    • C.

      Configure static NAT with overload.

    • D.

      Configure dynamic NAT with overload.

    Correct Answer
    D. Configure dynamic NAT with overload.
    Explanation
    The system administrator should configure dynamic NAT with overload in order to provide Internet access to all ten users at the same time. Dynamic NAT allows multiple private IP addresses to be translated to a single public IP address from the pool of assigned IP addresses. Overload, also known as Port Address Translation (PAT), allows multiple private IP addresses to share a single public IP address by using different port numbers. This allows for efficient use of the limited number of public IP addresses assigned to the remote office.

    Rate this question:

  • 32. 

    Which statement is true about the PPP authentication phase? 

    • A.

      CHAP uses a 2-way handshake to exchange the credentials.

    • B.

      CHAP uses a 2-way handshake to exchange the credentials.

    • C.

      CHAP sends an encrypted username and password during the authentication process.

    • D.

      The authentication phase takes place before the NCP configuration phase begins.

    Correct Answer
    C. CHAP sends an encrypted username and password during the authentication process.
    Explanation
    CHAP, or Challenge Handshake Authentication Protocol, is a PPP authentication method that uses a 3-way handshake to exchange credentials. During the authentication process, the client sends a username to the server, which responds with a random challenge value. The client then encrypts the challenge value along with its password using a one-way hash function and sends it back to the server. The server performs the same encryption process and compares the results. If they match, the authentication is successful. Therefore, the statement "CHAP sends an encrypted username and password during the authentication process" is true.

    Rate this question:

  • 33. 

    Refer to the exhibit. A network administrator is configuring Frame Relay on router HQ. It is desired that each Frame Relay PVC between the routers be in a separate subnet. Which two commands on HQ will accomplish this task for the connection to R1? (Choose two.)

    • A.

      HQ(config)# interface S0/0/0

    • B.

      HQ(config)# interface S0/0/0.1 multipoint

    • C.

      HQ(config)# interface S0/0/0.1 point-to-point

    • D.

      HQ(config-subif)# frame-relay interface dlci 103

    • E.

      HQ(config-subif)# frame-relay interface dlci 301

    • F.

      HQ(config-if)# frame-relay map ip 172.16.1.1 255.255.255.0 301 broadcast

    Correct Answer(s)
    C. HQ(config)# interface S0/0/0.1 point-to-point
    F. HQ(config-if)# frame-relay map ip 172.16.1.1 255.255.255.0 301 broadcast
    Explanation
    The command "HQ(config)# interface S0/0/0.1 point-to-point" configures the subinterface S0/0/0.1 as a point-to-point connection, which means each PVC will have its own subnet. This ensures that each Frame Relay PVC between the routers is in a separate subnet.

    The command "HQ(config-if)# frame-relay map ip 172.16.1.1 255.255.255.0 301 broadcast" maps the IP address 172.16.1.1 with a subnet mask of 255.255.255.0 to the DLCI 301. This command establishes the mapping between the IP address and the DLCI, allowing communication between the routers. The "broadcast" keyword indicates that broadcast packets should be sent to the mapped DLCI.

    Rate this question:

  • 34. 

    Which wildcard mask would specify all IP addresses from 192.168.8.0 through 192.168.15.255? 

    • A.

      0.0.0.7

    • B.

      0.0.7.255

    • C.

      0.0.8.255

    • D.

      0.0.15.255

    • E.

      0.0.255.255

    Correct Answer
    B. 0.0.7.255
    Explanation
    The correct wildcard mask that would specify all IP addresses from 192.168.8.0 through 192.168.15.255 is 0.0.7.255. This is because the subnet range is determined by the number of bits in the wildcard mask that are set to 0. In this case, the first 21 bits are set to 0 (0.0.7.255 in binary representation), which allows for a range of IP addresses from 192.168.8.0 to 192.168.15.255.

    Rate this question:

  • 35. 

    Refer to the exhibit. WestSW is supposed to send VLAN information to EastSW, but that did not occur. What will force WestSW to send a VLAN update to EastSW?

    • A.

      Change EastSW to be a VTP server.

    • B.

      Reload both WestSW and EastSW at the same time.

    • C.

      Erase the VLAN database on EastSW and reload the switch.

    • D.

      Reset the configuration revision number on EastSW to zero.

    • E.

      Reload EastSW.

    Correct Answer
    D. Reset the configuration revision number on EastSW to zero.
    Explanation
    Resetting the configuration revision number on EastSW to zero will force WestSW to send a VLAN update to EastSW. In VTP (VLAN Trunking Protocol), switches exchange VLAN information using VTP advertisements. Each switch keeps track of the configuration revision number, and if a switch receives an advertisement with a higher revision number, it will update its VLAN database. By resetting the revision number on EastSW to zero, it will be lower than the revision number on WestSW, causing WestSW to send a VLAN update to EastSW.

    Rate this question:

  • 36. 

    Which three physical network problems should be checked when a bottom-up troubleshooting approach has been chosen to troubleshoot network performance? (Choose three.) 

    • A.

      Cable connectivity

    • B.

      High collision counts

    • C.

      STP failures and loops

    • D.

      Address mapping errors

    • E.

      High CPU utilization rates

    • F.

      Excess packets that are filtered by the firewall

    Correct Answer(s)
    A. Cable connectivity
    B. High collision counts
    E. High CPU utilization rates
    Explanation
    In a bottom-up troubleshooting approach, the focus is on identifying and resolving physical network problems that could be causing network performance issues. Checking cable connectivity is important as loose or damaged cables can result in intermittent or no connectivity. High collision counts indicate network congestion or faulty network interfaces, which can impact performance. High CPU utilization rates can be a sign of a network device being overwhelmed, leading to performance degradation. Therefore, these three physical network problems should be checked when using a bottom-up troubleshooting approach.

    Rate this question:

  • 37. 

    What is the result when the command permit tcp 192.168.4.0 0.0.3.255 any eq telnet is entered in an access control list and applied on the inbound interface of a router? 

    • A.

      All traffic that originates from 192.168.4.0/24 is permitted.

    • B.

      All TCP traffic is permitted, and all other traffic is denied.

    • C.

      All Telnet traffic from the 192.168.0.0/16 network is permitted.

    • D.

      All traffic from the 192.168.4.0/22 network is permitted on TCP port 23.

    Correct Answer
    D. All traffic from the 192.168.4.0/22 network is permitted on TCP port 23.
    Explanation
    The command "permit tcp 192.168.4.0 0.0.3.255 any eq telnet" in an access control list allows all traffic from the 192.168.4.0/22 network to pass through on TCP port 23 (Telnet). The wildcard mask 0.0.3.255 indicates that the first 22 bits of the IP address must match exactly, while the last 10 bits can be any value. Therefore, any traffic originating from the IP addresses within the range of 192.168.4.0 to 192.168.7.255 will be permitted on TCP port 23.

    Rate this question:

  • 38. 

    What translation method will allow a server to always keep the same public address? 

    • A.

      Static NAT

    • B.

      Dynamic NAT

    • C.

      Static NAT with overload

    • D.

      Dynamic NAT with overload

    Correct Answer
    A. Static NAT
    Explanation
    Static NAT is a translation method that allows a server to always keep the same public address. With static NAT, a specific private IP address is mapped to a specific public IP address, ensuring that the server's public address remains constant. This is useful for servers that need to provide consistent services, such as web servers or mail servers, as clients can always access them using the same public address.

    Rate this question:

  • 39. 

    Refer to the exhibit. Which statement correctly describes how Router1 processes an FTP request packet that enters interface S0/0/0, and is destined for an FTP server at IP address 172.16.1.5?

    • A.

      The router matches the incoming packet to the statement that is created by access-list 201 permit ip any any command and allows the packet into the router.

    • B.

      The router reaches the end of ACL 101 without matching a condition and drops the packet because there is no statement that was created by access-list 101 permit ip any any command.

    • C.

      The router matches the incoming packet to the statement that was created by the access-list 101 permit ip any 172.16.1.0 0.0.0.255 command, ignores the remaining statements in ACL 101, and allows the packet into the router.

    • D.

      The router matches the incoming packet to the statement that was created by the access-list 201 deny icmp 172.16.1.0 0.0.0.255 any command, continues comparing the packet to the remaining statements in ACL 201 to ensure that no subsequent statements allow FTP, and then the router drops the packet.

    Correct Answer
    C. The router matches the incoming packet to the statement that was created by the access-list 101 permit ip any 172.16.1.0 0.0.0.255 command, ignores the remaining statements in ACL 101, and allows the packet into the router.
    Explanation
    The correct answer is that the router matches the incoming packet to the statement that was created by the access-list 101 permit ip any 172.16.1.0 0.0.0.255 command, ignores the remaining statements in ACL 101, and allows the packet into the router. This means that the router has a specific rule in the access list 101 that permits any IP address to connect to the FTP server at IP address 172.16.1.5. The router does not need to check any other statements in ACL 101 because it has found a match and allows the packet to pass through.

    Rate this question:

  • 40. 

    Refer to the exhibit. A system administrator must provide connectivity to a foreign network for ten hosts in a small remote office. The commands that are listed in the exhibit were entered into the router that connects the foreign network. The users in the remote office report occasional failure to connect to resources in the foreign network. What is the likely problem?

    • A.

      The source addresses are not correctly designated.

    • B.

      The translated address pool is not correctly sized.

    • C.

      The access-list command is referencing the wrong addresses.

    • D.

      The wrong interface is designated as the source for translations.

    Correct Answer
    B. The translated address pool is not correctly sized.
    Explanation
    The likely problem is that the translated address pool is not correctly sized. This means that there are not enough available IP addresses in the pool to provide connectivity for all ten hosts in the remote office. As a result, some hosts may experience occasional failures to connect to resources in the foreign network.

    Rate this question:

  • 41. 

     Which method is most effective in protecting the routing information that is propagated between routers on the network? 

    • A.

      Disable IP source routing.

    • B.

      Configure passive interfaces.

    • C.

      Configure routing protocol authentication.

    • D.

      Secure administrative lines with Secure Shell.

    Correct Answer
    C. Configure routing protocol authentication.
    Explanation
    Configuring routing protocol authentication is the most effective method in protecting the routing information that is propagated between routers on the network. This method ensures that only authorized routers can exchange routing information by using authentication mechanisms such as passwords or digital certificates. By implementing routing protocol authentication, unauthorized routers or malicious entities are prevented from injecting false or malicious routing information into the network, thereby enhancing the overall security and integrity of the routing infrastructure.

    Rate this question:

  • 42. 

    Refer to the exhibit. What happens if the network administrator issues the commands shown when an ACL called Managers already exists on the router?

    • A.

      The commands overwrite the existing Managers ACL.

    • B.

      The commands are added at the end of the existing Managers ACL.

    • C.

      The network administrator receives an error stating that the ACL already exists.

    • D.

      The commands will create a duplicate Managers ACL containing only the new commands being entered.

    Correct Answer
    B. The commands are added at the end of the existing Managers ACL.
    Explanation
    The given answer states that if the network administrator issues the commands shown when an ACL called Managers already exists on the router, the commands will be added at the end of the existing Managers ACL. This means that the new commands will be appended to the existing ACL, without overwriting or creating a duplicate ACL.

    Rate this question:

  • 43. 

     A network administrator can ping the Perth router, but gets a ‘Password Required but None Set’ message when trying to connect remotely via Telnet. Which command sequence must be applied to the Perth router to allow remote access? 

    • A.

      Router(config)# line console 0 Router(config-line)# login Router(config-line)# password cisco

    • B.

      Router(config)# line vty 0 4 Router(config-line)# login Router(config-line)# password cisco

    • C.

      Router(config)# line vty 0 4 Router(config-line)# enable secret Router(config-line)# password cisco

    • D.

      Router(config)# line vty 0 4 Router(config-line)# enable secret Router(config-line)# password cisco

    • E.

      Router(config)# line virtual terminal Router(config-line)# enable login Router(config-line)# password cisco

    Correct Answer
    B. Router(config)# line vty 0 4 Router(config-line)# login Router(config-line)# password cisco
    Explanation
    The correct answer is Router(config)# line vty 0 4 Router(config-line)# login Router(config-line)# password cisco. This command sequence configures the virtual terminal lines (vty) on the router to allow remote access. The "line vty 0 4" command specifies that the configuration applies to the virtual terminal lines 0 through 4. The "login" command enables the login prompt for remote access, and the "password cisco" command sets the password for authentication. This allows the network administrator to connect remotely via Telnet by entering the correct password.

    Rate this question:

  • 44. 

    A router does not load its configuration after a power failure. After running the show startup-configuration command, the administrator finds that the original configuration is intact. What is the cause of this problem? 

    • A.

      The configuration register is set for 0×2100.

    • B.

      The configuration register is set for 0×2101

    • C.

      The configuration register is set for 0×2102

    • D.

      The configuration register is set for 0×2142.

    • E.

      Boot system commands are not configured.

    • F.

      Flash memory is empty causing the router to bypass the configuration in NVRAM

    Correct Answer
    D. The configuration register is set for 0×2142.
    Explanation
    The configuration register is set for 0×2142. The configuration register is a 16-bit value that determines how the router boots up and whether it loads its configuration from NVRAM or not. When the configuration register is set to 0×2142, it tells the router to ignore the startup configuration in NVRAM and load the router with the factory default configuration. This is why after a power failure, the router does not load its configuration and the original configuration remains intact.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 17, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 05, 2014
    Quiz Created by
    Badboysline
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.