14
Showing 1 of 4 Next > Page: GO <Pre v 1 The network administrator can ping a remote router but is unable to to it. At what layer of the OSI model does this error occur? physical network data link application 2 What should be the first step in a structured cable project? Locate all sources of EMI. Obtain an accurate floor plan. Identify the network backbone. Design efficient cable management systems. 3 When should an ISP helpdesk technician start documentation during th customer troubleshooting process? when the issue is resolved when the technician answers the initial call from the customer wh reports a problem when it is necessary to create a work order so that the onsite technician can visit the customer site when the technician cannot resolve the issue and the case needs t escalated to the next level technician 4 Which action would a network security administrator take under the principle of least privilege? Provide users with access to only necessary resources. Encrypt all data for transmission across unsecured networks. Restrict all users except administrators to the lowest privilege Require authentication for access to all resources including file folders. 5 Which two statements are true about the c:\> ping command? (Choose t It tests the accessibility of an IP address. It sends a TCP packet to the destination IP address. It sends an ICMP echo request packet to the destination address. It traces the route of a data packet from the source to the desti It determines where a packet was lost or delayed during transmiss 6 A network technician begins troubleshooting by checking the status o light on the network interface card on the web server. Which troubleshooting method is the technician using? top-down bottom-up 1

Sem 2 final exam v4.1 20/4/2010

Embed Size (px)

Citation preview

Page 1: Sem 2 final exam v4.1 20/4/2010

Showing 1 of 4 Next> Page:   GO <Prev

The network administrator can ping a remote router but is unable to telnet to it. At what layer of the OSI model does this error occur?physical

network

data link

applicationWhat should be the first step in a structured cable project?Locate all sources of EMI.

Obtain an accurate floor plan.

Identify the network backbone.

Design efficient cable management systems.When should an ISP helpdesk technician start documentation during the customer troubleshooting process?when the issue is resolved

when the technician answers the initial call from the customer who reports a problem

when it is necessary to create a work order so that the onsite technician can visit the customer site

when the technician cannot resolve the issue and the case needs to be escalated to the next level technicianWhich action would a network security administrator take under the principle of least privilege?Provide users with access to only necessary resources.

Encrypt all data for transmission across unsecured networks.

Restrict all users except administrators to the lowest privilege level.

Require authentication for access to all resources including files and folders.Which two statements are true about the c:\> ping command? (Choose two.)It tests the accessibility of an IP address.

It sends a TCP packet to the destination IP address.

It sends an ICMP echo request packet to the destination address.

It traces the route of a data packet from the source to the destination.

It determines where a packet was lost or delayed during transmission.A network technician begins troubleshooting by checking the status of the light on the network interface card on the web server. Which troubleshooting method is the technician using?top-down

bottom-up

divide-and-conquer

from hardware to software

1

Page 2: Sem 2 final exam v4.1 20/4/2010

Refer to the exhibit. All hosts and router interfaces are configured correctly. Pings to the server from both H1 and H2 and pings between H1 and H2 are not successful. What is causing this problem?RIPv2 does not support VLSM.

RIPv2 is misconfigured on router R1.

RIPv2 is misconfigured on router R2.

RIPv2 is misconfigured on router R3.

RIPv2 does not support private IP addressing.Why are port numbers included in the TCP header of a segment?to indicate the correct router interface that should be used to forward a segment

to identify which switch ports should receive or forward the segment

to determine which Layer 3 protocol should be used to encapsulate the data

to enable a receiving host to forward the data to the appropriate application

to allow the receiving host to assemble the packet in the proper orderDuring the process of upgrading the IOS image on a router, the network administrator notices that the downloaded image in flash is corrupt. If ROMMON is used to perform the upgrade process again, by default which port on the router will be used to download the replacement image?AUX port

console port

first available LAN port

first available serial portWhich routes are automatically added to the routing table on a neighbor router when routing protocols exchange information about directly connected networks?dynamic routes

static routes

default routes

directly connected routes

Page 3: Sem 2 final exam v4.1 20/4/2010

Which two parameters are stored in the routing table? (Choose two.)the best route to reach remote networks

the interfaces used to forward packets

the ARP requests from connected routers

the number of times a route has been used by the router

the packets that are placed in the buffer before being forwardedWhat is one purpose of the TCP three-way handshake?sending echo requests from the source to the destination host to establish the presence of the destination

determining the IP address of the destination host in preparation for data transfer

requesting the destination to transfer a binary file to the source

synchronizing sequence numbers between source and destination in preparation for data transferWhich notation is an example of a supernet?192.168.1.0/24

172.16.1.0/25

10.0.0.0/8

192.168.0.0/19Which AAA process requires users to prove their identity with a username and password to gain access to a network?accounting

authorization

authentication

acknowledgment

Refer to the exhibit. The network administrator is validating a WAN connection design that supports authentication between the two routers. Which statement is true about the effect of the current configuration?The serial connection cannot be established.

Page 4: Sem 2 final exam v4.1 20/4/2010

The configuration does not meet the design objective.

The clock rate must be configured on both routers.

The serial connection will be established and meet the design objective.

Showing 2 of 4 Next> Page:   GO <Prev

An experienced network technician has decided to use a divide-and-conquer approach to troubleshooting a network problem. What is an advantage to this approach?works well for simple problems

quickly resolves user-related issues

easiest to use in a multi-vendor environment

targets the problem layer more quickly than other methods doA Catalyst switch is used as a temporary replacement for another switch that needs to be repaired. About a minute after the switch has started, the SYST LED on the front of the switch transitions from blinking green to amber. What is the meaning of the amber SYST LED?The switch has no configuration file in NVRAM.

The switch has failed POST and must be sent for service.

The switch is functioning properly.

The switch is in half-duplex mode.Which statement correctly describes the importance of an SLA?It outlines the range of services received by the ISP.

It outlines the process to resolve planned incidents.

It outlines the management, monitoring, and maintenance of a network.

It outlines the termination costs according to the budget cycle of the customer.

Refer to the exhibit. The network administrator uses the exhibited commands to configure R1 and R2. The administrator confirms Layer 1 connectivity between the two routers is functioning properly. However, R1 is unable to ping the serial interface of R2.

What could be the reason for this problem?

2

Page 5: Sem 2 final exam v4.1 20/4/2010

The subnet mask is incorrectly configured on both routers.

A static route is not configured on both routers.

Different encapsulations are configured on the two routers.

The clock rate is not set on any of the router serial interfaces.What are two reasons for issuing the show ip route command on a router? (Choose two.)It displays the routing activity in real time.

It displays the length of time until the next routing update.

It displays the directly connected networks.

It displays all of the routing protocols that are configured on the neighboring routers.

It displays the routing protocol that is receiving updates from the neighboring routers.What is the purpose of using the copy tftp flash command on a router?to back up the current IOS image to a server

to restore the IOS image from a server

to back up the router configuration to a server

to restore the router configuration from flashA host has been properly cabled and configured with a unique hostname and valid IP address. Which two additional components should be configured to enable the host to access remote resources? (Choose two.)the subnet mask

the MAC address

the default gateway

the loopback IP address

the DHCP server IP address

Refer to the exhibit. As part of the troubleshooting process, a network administrator wishes to determine the MAC address of H1. The administrator issues a successful ping to H1. Which Cisco IOS command can now be used to gather the desired information?show arp

show version

show interfaces

show cdp neighbors

show ip interfaces brief

Page 6: Sem 2 final exam v4.1 20/4/2010

Refer to the exhibit. Based on the DHCP configuration commands, what is the reason that a PC is receiving an IP address but is unable to communicate outside of the local network?The default gateway is misconfigured.

Excluded addresses must be configured.

The DNS server is on the incorrect network.

There are not enough addresses to support the 28 hosts that are required for this LAN.What contributes to the fact that transmitting a file using TCP will take longer than transmitting the same file using UDP?UDP does not need to add a header to a data packet.

UDP utilizes a more efficient error checking mechanism than TCP.

The UDP authentication process is faster than the process that is used by TCP.

The TCP verification process adds more transmissions during the file transfer.A user is able to ping an FTP server across a WAN but is unable to download files from the server. What should be checked to resolve this problem?the NIC drivers

the IP configuration

the LED status of the NIC

firewall settingsWhat is the function of the forward lookup DNS zone in the DNS name resolution process?It resolves fully qualified domain names into IP addresses.

It stores the information about the domain namespace structure.

It forwards zone information updates to the secondary server.

It maintains a database of ARP entries for all servers.

Page 7: Sem 2 final exam v4.1 20/4/2010

Refer to the exhibit. Which cable path segments require the use of crossover cables?A, D, F

B, C, E

B, D, E

A, C, FA new router is connected to an existing network. Which two tasks must be completed on the new router to include it in the dynamic routing process? (Choose two.)Enter the new network IP address on all existing routers.

Assign an appropriate IP address and subnet mask to the serial interface.

Update the ip host configuration information with the device name and new interface IP address.

Configure a routing protocol with the directly connected network IP addresses.

Configure a routing protocol to include all networks from all existing routers.When does a router enter the setup mode?when the Cisco IOS is missing in flash

when the configuration is missing in NVRAM

when the setup command is run from the user mode

when the boot system command is missing in the configuration

Which WAN connection provides a dedicated circuit with fixed bandwidth available at all times?point-to-point

circuit-switched

packet-switched

cableWhat happens when a segment is encapsulated into a packet?Data is converted to bits for transmission.

The destination port number is specified.

A header with logical addresses is added.

A session with a destination is established.When troubleshooting a connectivity issue for the WAN connection between the headquarters and a branch office of a customer, the ISP technician verifies the router to ensure that the router configuration is not altered

Page 8: Sem 2 final exam v4.1 20/4/2010

from the original configuration by the network administrator of the customer. What equipment type does the router represent?CPE

POP

IXP

CSU/DSUWhich cable type provides a foil shielding to protect from outside electromagnetic interference?STP

UTP

coaxial

fiber-opticAfter an unsuccessful ping to the local router, the technician decides to investigate the router. The technician observes that the lights and fan on the router are not operational. In which layer of the OSI model is the problem most likely occurring?transport

network

data link

physicalWhat is the purpose of the debug ip rip command?shows the installed routing table

allows RIP to advertise triggered updates

displays routing update activity in real time

shows the administrative distance of all routesWhat is the most commonly used exterior routing protocol?BGP

RIP

OSPF

EIGRPA network administrator is asked to design a system to allow simultaneous access to the Internet for 250 users. The ISP can only supply five public IP addresses for this network. What technology can the administrator use to accomplish this task?classful subnetting

variable length subnet masks

classless interdomain routing

port-based Network Address Translation

Page 9: Sem 2 final exam v4.1 20/4/2010

Refer to the exhibit. There is no routing protocol configured on either router. Which command will create a default route on R1 to forward the traffic to R2?R1(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.1

R1(config)# ip route 0.0.0.0 0.0.0.0 192.168.0.2

R1(config)# ip route 0.0.0.0 0.0.0.0 192.168.0.1

R1(config)# ip route 0.0.0.0 0.0.0.0 S0/0/1

Refer to the exhibit. Which subnet mask would accommodate the number of hosts indicated for all subnets if the major network address was 192.168.25.0/24?255.255.0.0

255.255.224.0

255.255.255.0

255.255.255.224

255.255.255.240

255.255.255.248

Page 10: Sem 2 final exam v4.1 20/4/2010

Refer to the exhibit. All cables are working and all devices have IP addresses. However, H1 cannot ping the server. What is the cause of the problem?The default gateway is incorrect on R1.

The switch should be assigned an IP address.

H1 and the server are on different subnetworks.

H1 does not know the physical address of the server.Which address does a switch use for implementing port security?the source IP address

the source MAC address

the destination IP address

the destination MAC addressWhat function would a server running the RADIUS protocol provide to a router that is configured with AAA?It saves accounting information about who accessed what resource and at what time it was accessed.

It contains the database that network devices use to authenticate users trying to gain access to the network.

It lists the commands that a particular user is authorized to execute on the network device.

It contains the MIB that devices use to keep information about themselves and network performance.

Page 11: Sem 2 final exam v4.1 20/4/2010

Refer to the exhibit. What is the possible reason that a technician is unable to telnet into the HQ router and make configuration changes?A password is required for vty 0.

A password for line con 0 is required.

All five virtual interfaces must be configured before Telnet is possible.

The service password-encryption command is preventing Telnet access.Which two statements are correct about the DNS hierarchy? (Choose two.)The root server maintains records for all servers in the Internet.

DNS relies on a hierarchy of decentralized servers to maintain records.

The root servers maintain records about how to reach top-level domain servers.

All DNS servers manage databases that store name-to-IP mappings for the entire DNS structure.A query requesting a name resolution starts from the client and is passed directly to the server at the top of the DNS hierarchy.

Showing 4 of 4 Next> Page:   GO <Prev 4

Page 12: Sem 2 final exam v4.1 20/4/2010

Refer to the exhibit. The network administrator has added networks A and B to router R1. Which two subnetwork numbers should be used to address networks A and B so that these networks use the same subnet mask as networks C and D? (Choose two.)192.168.1.32/26

192.168.1.64/26

192.168.1.96/26

192.168.1.160/26

192.168.1.192/26

Refer to the exhibit. A computer with the displayed IP settings is unable to access a server on the 192.168.2.0 network using the server IP address but can access hosts on the 192.168.1.0 network. What should the network administrator do to troubleshoot this problem?Issue the ping 192.168.1.1 command on the host to determine if the host can communicate with the default gateway.Issue the ipconfig /all command to determine if a DNS server IP address was configured.

Verify that the host has a link light.

Check the cabling of the host.

Page 13: Sem 2 final exam v4.1 20/4/2010

Refer to the exhibit. What two conclusions can be drawn about the exhibited command output? (Choose two.)Router RTB is directly connected to a router and a switch.

Router RTB is able to ping both of its directly connected neighbors.

RTA is not connected to any other Cisco devices except RTB.

Router RTB has Layer 2 connectivity with two neighboring devices.

Router RTB is connected to two Cisco devices by FastEthernet links.What is the function of the service password-encryption command in the Cisco IOS?encrypts passwords sent over serial interfaces

validates encrypted passwords by the use of an authentication server

encrypts passwords for transmission across insecure networks

prevents passwords in configuration files from being easily readWhich protocol defines the types of messages that a client uses to request a web page and the messages a server uses to respond to those requests?FTP

TCP

HTTP

HTML