Upload
hamzabintalip
View
5.936
Download
1
Embed Size (px)
Citation preview
Showing 1 of 4 Next> Page: GO <Prev
The network administrator can ping a remote router but is unable to telnet to it. At what layer of the OSI model does this error occur?physical
network
data link
applicationWhat should be the first step in a structured cable project?Locate all sources of EMI.
Obtain an accurate floor plan.
Identify the network backbone.
Design efficient cable management systems.When should an ISP helpdesk technician start documentation during the customer troubleshooting process?when the issue is resolved
when the technician answers the initial call from the customer who reports a problem
when it is necessary to create a work order so that the onsite technician can visit the customer site
when the technician cannot resolve the issue and the case needs to be escalated to the next level technicianWhich action would a network security administrator take under the principle of least privilege?Provide users with access to only necessary resources.
Encrypt all data for transmission across unsecured networks.
Restrict all users except administrators to the lowest privilege level.
Require authentication for access to all resources including files and folders.Which two statements are true about the c:\> ping command? (Choose two.)It tests the accessibility of an IP address.
It sends a TCP packet to the destination IP address.
It sends an ICMP echo request packet to the destination address.
It traces the route of a data packet from the source to the destination.
It determines where a packet was lost or delayed during transmission.A network technician begins troubleshooting by checking the status of the light on the network interface card on the web server. Which troubleshooting method is the technician using?top-down
bottom-up
divide-and-conquer
from hardware to software
1
Refer to the exhibit. All hosts and router interfaces are configured correctly. Pings to the server from both H1 and H2 and pings between H1 and H2 are not successful. What is causing this problem?RIPv2 does not support VLSM.
RIPv2 is misconfigured on router R1.
RIPv2 is misconfigured on router R2.
RIPv2 is misconfigured on router R3.
RIPv2 does not support private IP addressing.Why are port numbers included in the TCP header of a segment?to indicate the correct router interface that should be used to forward a segment
to identify which switch ports should receive or forward the segment
to determine which Layer 3 protocol should be used to encapsulate the data
to enable a receiving host to forward the data to the appropriate application
to allow the receiving host to assemble the packet in the proper orderDuring the process of upgrading the IOS image on a router, the network administrator notices that the downloaded image in flash is corrupt. If ROMMON is used to perform the upgrade process again, by default which port on the router will be used to download the replacement image?AUX port
console port
first available LAN port
first available serial portWhich routes are automatically added to the routing table on a neighbor router when routing protocols exchange information about directly connected networks?dynamic routes
static routes
default routes
directly connected routes
Which two parameters are stored in the routing table? (Choose two.)the best route to reach remote networks
the interfaces used to forward packets
the ARP requests from connected routers
the number of times a route has been used by the router
the packets that are placed in the buffer before being forwardedWhat is one purpose of the TCP three-way handshake?sending echo requests from the source to the destination host to establish the presence of the destination
determining the IP address of the destination host in preparation for data transfer
requesting the destination to transfer a binary file to the source
synchronizing sequence numbers between source and destination in preparation for data transferWhich notation is an example of a supernet?192.168.1.0/24
172.16.1.0/25
10.0.0.0/8
192.168.0.0/19Which AAA process requires users to prove their identity with a username and password to gain access to a network?accounting
authorization
authentication
acknowledgment
Refer to the exhibit. The network administrator is validating a WAN connection design that supports authentication between the two routers. Which statement is true about the effect of the current configuration?The serial connection cannot be established.
The configuration does not meet the design objective.
The clock rate must be configured on both routers.
The serial connection will be established and meet the design objective.
Showing 2 of 4 Next> Page: GO <Prev
An experienced network technician has decided to use a divide-and-conquer approach to troubleshooting a network problem. What is an advantage to this approach?works well for simple problems
quickly resolves user-related issues
easiest to use in a multi-vendor environment
targets the problem layer more quickly than other methods doA Catalyst switch is used as a temporary replacement for another switch that needs to be repaired. About a minute after the switch has started, the SYST LED on the front of the switch transitions from blinking green to amber. What is the meaning of the amber SYST LED?The switch has no configuration file in NVRAM.
The switch has failed POST and must be sent for service.
The switch is functioning properly.
The switch is in half-duplex mode.Which statement correctly describes the importance of an SLA?It outlines the range of services received by the ISP.
It outlines the process to resolve planned incidents.
It outlines the management, monitoring, and maintenance of a network.
It outlines the termination costs according to the budget cycle of the customer.
Refer to the exhibit. The network administrator uses the exhibited commands to configure R1 and R2. The administrator confirms Layer 1 connectivity between the two routers is functioning properly. However, R1 is unable to ping the serial interface of R2.
What could be the reason for this problem?
2
The subnet mask is incorrectly configured on both routers.
A static route is not configured on both routers.
Different encapsulations are configured on the two routers.
The clock rate is not set on any of the router serial interfaces.What are two reasons for issuing the show ip route command on a router? (Choose two.)It displays the routing activity in real time.
It displays the length of time until the next routing update.
It displays the directly connected networks.
It displays all of the routing protocols that are configured on the neighboring routers.
It displays the routing protocol that is receiving updates from the neighboring routers.What is the purpose of using the copy tftp flash command on a router?to back up the current IOS image to a server
to restore the IOS image from a server
to back up the router configuration to a server
to restore the router configuration from flashA host has been properly cabled and configured with a unique hostname and valid IP address. Which two additional components should be configured to enable the host to access remote resources? (Choose two.)the subnet mask
the MAC address
the default gateway
the loopback IP address
the DHCP server IP address
Refer to the exhibit. As part of the troubleshooting process, a network administrator wishes to determine the MAC address of H1. The administrator issues a successful ping to H1. Which Cisco IOS command can now be used to gather the desired information?show arp
show version
show interfaces
show cdp neighbors
show ip interfaces brief
Refer to the exhibit. Based on the DHCP configuration commands, what is the reason that a PC is receiving an IP address but is unable to communicate outside of the local network?The default gateway is misconfigured.
Excluded addresses must be configured.
The DNS server is on the incorrect network.
There are not enough addresses to support the 28 hosts that are required for this LAN.What contributes to the fact that transmitting a file using TCP will take longer than transmitting the same file using UDP?UDP does not need to add a header to a data packet.
UDP utilizes a more efficient error checking mechanism than TCP.
The UDP authentication process is faster than the process that is used by TCP.
The TCP verification process adds more transmissions during the file transfer.A user is able to ping an FTP server across a WAN but is unable to download files from the server. What should be checked to resolve this problem?the NIC drivers
the IP configuration
the LED status of the NIC
firewall settingsWhat is the function of the forward lookup DNS zone in the DNS name resolution process?It resolves fully qualified domain names into IP addresses.
It stores the information about the domain namespace structure.
It forwards zone information updates to the secondary server.
It maintains a database of ARP entries for all servers.
Refer to the exhibit. Which cable path segments require the use of crossover cables?A, D, F
B, C, E
B, D, E
A, C, FA new router is connected to an existing network. Which two tasks must be completed on the new router to include it in the dynamic routing process? (Choose two.)Enter the new network IP address on all existing routers.
Assign an appropriate IP address and subnet mask to the serial interface.
Update the ip host configuration information with the device name and new interface IP address.
Configure a routing protocol with the directly connected network IP addresses.
Configure a routing protocol to include all networks from all existing routers.When does a router enter the setup mode?when the Cisco IOS is missing in flash
when the configuration is missing in NVRAM
when the setup command is run from the user mode
when the boot system command is missing in the configuration
Which WAN connection provides a dedicated circuit with fixed bandwidth available at all times?point-to-point
circuit-switched
packet-switched
cableWhat happens when a segment is encapsulated into a packet?Data is converted to bits for transmission.
The destination port number is specified.
A header with logical addresses is added.
A session with a destination is established.When troubleshooting a connectivity issue for the WAN connection between the headquarters and a branch office of a customer, the ISP technician verifies the router to ensure that the router configuration is not altered
from the original configuration by the network administrator of the customer. What equipment type does the router represent?CPE
POP
IXP
CSU/DSUWhich cable type provides a foil shielding to protect from outside electromagnetic interference?STP
UTP
coaxial
fiber-opticAfter an unsuccessful ping to the local router, the technician decides to investigate the router. The technician observes that the lights and fan on the router are not operational. In which layer of the OSI model is the problem most likely occurring?transport
network
data link
physicalWhat is the purpose of the debug ip rip command?shows the installed routing table
allows RIP to advertise triggered updates
displays routing update activity in real time
shows the administrative distance of all routesWhat is the most commonly used exterior routing protocol?BGP
RIP
OSPF
EIGRPA network administrator is asked to design a system to allow simultaneous access to the Internet for 250 users. The ISP can only supply five public IP addresses for this network. What technology can the administrator use to accomplish this task?classful subnetting
variable length subnet masks
classless interdomain routing
port-based Network Address Translation
Refer to the exhibit. There is no routing protocol configured on either router. Which command will create a default route on R1 to forward the traffic to R2?R1(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.1
R1(config)# ip route 0.0.0.0 0.0.0.0 192.168.0.2
R1(config)# ip route 0.0.0.0 0.0.0.0 192.168.0.1
R1(config)# ip route 0.0.0.0 0.0.0.0 S0/0/1
Refer to the exhibit. Which subnet mask would accommodate the number of hosts indicated for all subnets if the major network address was 192.168.25.0/24?255.255.0.0
255.255.224.0
255.255.255.0
255.255.255.224
255.255.255.240
255.255.255.248
Refer to the exhibit. All cables are working and all devices have IP addresses. However, H1 cannot ping the server. What is the cause of the problem?The default gateway is incorrect on R1.
The switch should be assigned an IP address.
H1 and the server are on different subnetworks.
H1 does not know the physical address of the server.Which address does a switch use for implementing port security?the source IP address
the source MAC address
the destination IP address
the destination MAC addressWhat function would a server running the RADIUS protocol provide to a router that is configured with AAA?It saves accounting information about who accessed what resource and at what time it was accessed.
It contains the database that network devices use to authenticate users trying to gain access to the network.
It lists the commands that a particular user is authorized to execute on the network device.
It contains the MIB that devices use to keep information about themselves and network performance.
Refer to the exhibit. What is the possible reason that a technician is unable to telnet into the HQ router and make configuration changes?A password is required for vty 0.
A password for line con 0 is required.
All five virtual interfaces must be configured before Telnet is possible.
The service password-encryption command is preventing Telnet access.Which two statements are correct about the DNS hierarchy? (Choose two.)The root server maintains records for all servers in the Internet.
DNS relies on a hierarchy of decentralized servers to maintain records.
The root servers maintain records about how to reach top-level domain servers.
All DNS servers manage databases that store name-to-IP mappings for the entire DNS structure.A query requesting a name resolution starts from the client and is passed directly to the server at the top of the DNS hierarchy.
Showing 4 of 4 Next> Page: GO <Prev 4
Refer to the exhibit. The network administrator has added networks A and B to router R1. Which two subnetwork numbers should be used to address networks A and B so that these networks use the same subnet mask as networks C and D? (Choose two.)192.168.1.32/26
192.168.1.64/26
192.168.1.96/26
192.168.1.160/26
192.168.1.192/26
Refer to the exhibit. A computer with the displayed IP settings is unable to access a server on the 192.168.2.0 network using the server IP address but can access hosts on the 192.168.1.0 network. What should the network administrator do to troubleshoot this problem?Issue the ping 192.168.1.1 command on the host to determine if the host can communicate with the default gateway.Issue the ipconfig /all command to determine if a DNS server IP address was configured.
Verify that the host has a link light.
Check the cabling of the host.
Refer to the exhibit. What two conclusions can be drawn about the exhibited command output? (Choose two.)Router RTB is directly connected to a router and a switch.
Router RTB is able to ping both of its directly connected neighbors.
RTA is not connected to any other Cisco devices except RTB.
Router RTB has Layer 2 connectivity with two neighboring devices.
Router RTB is connected to two Cisco devices by FastEthernet links.What is the function of the service password-encryption command in the Cisco IOS?encrypts passwords sent over serial interfaces
validates encrypted passwords by the use of an authentication server
encrypts passwords for transmission across insecure networks
prevents passwords in configuration files from being easily readWhich protocol defines the types of messages that a client uses to request a web page and the messages a server uses to respond to those requests?FTP
TCP
HTTP
HTML