THANK YOU VERY MUCH FOR VISITING THIS SITE ! HELP STUDENTS LEARN NETWORKING


A.  ip route 0.0.0.0 0.0.0.0 192.168.2.2
B.  ip route 192.168.1.0 255.255.255.0 192.168.2.1
C.  ip route 192.168.1.0 255.255.255.0 s0/0/0
D.  ip route 10.0.0.0 255.255.255.0 s0/0/0
E.  ip route 0.0.0.0 255.255.255.0 192.168.2.2

Answer: A
Section: Chapter 6: IP Routing

Explanation/Reference:



QUESTION 271
Which of the following IP addresses can be assigned to the host devices? (Choose two.)

A.
205.7.8.32/27
B.
191.168.10.2/23
C.
127.0.0.1
D.
224.0.0.10
E.
203.123.45.47/28
F.
10.10.0.0/13

Answer: BF
Section: Chapter 3: IP Addressing and VLSM

Explanation/Reference:



QUESTION 272
What is valid reason for a switch to deny port access to new devices when port security is enabled?

A.  The denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN.
B.  The denied MAC address are statically configured on the port. C.  The minimum MAC threshold has been reached.
D.  The absolute aging times for the denied MAC addresses have expired.

Answer: B
Section: Chapter 9: Switching

Explanation/Reference:



QUESTION 273
Which statement is correct about the internetwork shown in the diagram?


A.  Switch2 is the root bridge.

B.  Spanning Tree is not running.
C.  HostD and Server1 are in the same subnet.
D.  No collision can occur in traffic between Host B and Host C. E.  If Fa0/0 is down on Router1, HostA cannot access Server1. F.  If Fa0/1 is down on Switch3, HostC cannot access Server 2.

Answer: E
Section: Chapter 10: VLAN

Explanation/Reference:



QUESTION 274
Which statement is correct regarding the operation of DHCP?

A.  A DHCP client uses a ping to detect address conflicts.
B.  A DHCP server uses a gratuitous ARP to detect DHCP clients. C.  A DHCP client uses a gratuitous ARP to detect a DHCP server.
D.  If an address conflict is detected, the address is removed from the pool and an administrator must resolve the conflict.
E.  If an address conflict is detected, the address removed from the pool for an amount of time configurable by the administrator.
F.  If an address conflict is detected, the address is removed from the pool and will not be reused until server is rebooted.

Answer: E
Section: Chapter 2: TCP/IP

Explanation/Reference:



QUESTION 275
Refer to the diagram. What is the largest configuration file that can be stored on this router?


A.  191K bytes
B.  16384K bytes C.  31369K bytes D.  114688K bytes
                                               
Answer: A
Section: Chapter 4: Introduction to Cisco IOS

Explanation/Reference:



QUESTION 276
Users have been complaining that their Fram Relay connection to the corporate site is very slow. The network administrator suspects that the link is overloaded. Based on the partial output of the Router# show frame relay pvc command show in the graphic, Which output value indicates to the local router that traffic sent to the corporate site is experiencing congestion?


A.  DLCE=100
B.  last time PVC status changed 00:25:40
C.  in BECN packets 192
D.  in FECN packets 147
E.  in DF packet 0

Answer: C
Section: Chapter 14: Wide Area Network (WAN)

Explanation/Reference:



QUESTION 277
A network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port?

A.  This is a 10Mb/s switch port. B.  This is a 100Mbs switch port.
C.  This is an Ethernet port operating at half duplex. D.  This is an Ethernet port operating at full duplex.
E.  This is a port on a network interface card in a PC.

Answer: C
Section: Chapter 1: Introduction

Explanation/Reference:



QUESTION 278
A network administrator needs to allow only one Telnet connection to a router. For anyone viewing the confguration and issuing the show run command, the password for Telnet access should be encrypted. Which set of commands will accomplish this task?

A.  service password-encryption
access-list 1 permit 192.168.1.0 0.0.0.255
line vty 0 4
login
password cisco
access-class 1
B.  enable password secret line vty 0
login
password cisco
C.  service password-encryption line vty 1
login
password cisco
D.  service password-encryption line vty 0 4
login
password cisco

Answer: C
Section: Chapter 4: Introduction to Cisco IOS

Explanation/Reference:



QUESTION 279
Refer to the exhibit. What is the meaning of the output MTU 1500 bytes?


A.  The maximum number of bytes that can traverse this interface per second is 1500. B.  The minimum segment size that can traverse this interface is 1500 bytes.
C.  The minimum segment size that can traverse this interface is 1500 bytes. D.  The minimum packet size that can traverse this interface is 1500 bytes.
E.  The maximum packet size that can traverse this interface is 1500 bytes. F.  The maximum frame size that can traverse this interface is 1500 bytes.

Answer: E
Section: Chapter 4: Introduction to Cisco IOS

Explanation/Reference:



QUESTION 280
Refer to the exhibit. A network administrator configures a new router and enters the copy startup-config running-

config on the router. The network administrator powers down the router and sets it up at a remote location. When the router starts, it enter the system configuration dialog as shown. What is the caust of the problem?


A.  The network administrator faled to save the configuration. B.  The configuration register is set to 0x2100.
C.  The boot system flash command is missing from the configuration. D.  The configuraiton register is set to 0x2102.
E.  The router is configured with the boot system startup command.

Answer: A
Section: Chapter 4: Introduction to Cisco IOS

Explanation/Reference:



QUESTION 281
Refer to the exhibit. An organization connect two locations, supporting two VLANs, through two switches as shown. Inter-VLANs communicated is not required. The network is working properly and there is fully connectivity. The organization needs to add additional VLANs, so it has been decided to implement VTP. Both switches are configured as VTP servers in the same VTP domain. VLANs added to Switch1 are not learned by Switch2. Based on this information and partial configuration is the exhibit, what is the problem?


A.  Switch2 should be configured as a VTP client.
B.  VTP is Cisco proprietory and requires a different trunking encapsulation
C.  A router is required to route VTP advertisements between the swtiches.
D.  STP has blocked on of the links between the switches, limiting connectivity. E.  The links between the switches are access links.

Answer: E
Section: Chapter 10: VLAN

Explanation/Reference:



QUESTION 282
The administrator is unable to establish connectivity between two Cisco routers. Upon reviewing the command output of both routers, what is the most likely caust of the problem?



A.  Authentication needs to be changed to PAP for both routers. B.  Serial IP addresses of routers are not on the same subnet. C.  Username/password is incorrectly configured.
D.  Router names are incorrectly configured.

Answer: C
Section: Chapter 14: Wide Area Network (WAN)

Explanation/Reference:



QUESTION 283
Refer to the exhibit. The network manager is evaluating the efficiency of the current network design. RIPv2 is enabled on all Layer 3 devices in the network. What network devices participate in passing traffic from the PC at
10.10.1.7 to File Server at 10.20.1.6 in the older that they will forward traffic from source to destination?


A.  Switch1, Switch2
B.  Switch1, Switch2, Switch2, Switch2
C.  Switch1, Router1, Switch1, Switch2
D.  Switch1, Router1, Router2, Switch2

Answer: D
Section: Chapter 10: VLAN

Explanation/Reference:



QUESTION 284
Acknowldgement, Sequencing, and Flow control are characteristics of which OSI layer?

A.  Layer 2
B.  Layer 3
C.  Layer 4
D.  Layer 5
E.  Layer 6
F.  Layer 7

Answer: C
Section: Chapter 1: Introduction

Explanation/Reference:



QUESTION 285
Refer to the exhibit. Router A has interfaces with addresses 192.168.1.1 and 172.16.1.1. Router B, which connected to router A over a serial link, has interfaces with 172.16.1.2 and 10.1.1.2.


Which sequence of commands will configured RIPv2 on router B?
                 
A.  B(config)# router rip
B(config-router)# version 2
B(config-router)# network 172.16.0.0
B(config-router)# network 10.0.0.0
B(config-router)# end
B.  B(config)# router rip
B(config-router)# network 172.16.0.0
B(config-router)# network 10.0.0.0
B(config-router)# end
C.  B(config)# router rip
B(config-router)# version 2
B(config-router)# network 172.16.0.0
B(config-router)# network 192.168.1.0
B(config-router)# end
D.  B(config)# router rip version 2
B(config-router)# network 172.16.0.0
B(config-router)# network 10.0.0.0
B(config-router)# end

Answer: A
Section: Chapter 6: IP Routing

Explanation/Reference:



QUESTION 286
Refer to the exhibit. S0/0 on R1 is configured as a multipoint interface to communicate with R2 and R3 in the hub-and-spoke Frame Relay topology. While testing this configuration, a technician notes that pings are successfully from hosts on the 172.16.1.0/24 network to hosts on both the 172.16.2.0/25 and 172.16.0.2.128/25 networks. However, pings between hosts on the 172.16.2.0/25 and 172.16.2.128/25 network are not successful. What could explain this connectivity problem?



.  The ip subnet-zero command has been issued on the R1 router.
B.  The RIPv2 dynamic routing protocol cannot be used across a Frame Relay network.
C.  Split horizon is preventing R2 from learning about the R3 networks and R3 from learning about R2 networks. D.  The 172.16.2.0/25 and 172.16.2.128/25 networks are overlapping networks that can be seen by R1, but not
between R2 and R3.
E.  The 172.16.3.0/29 network used on the Frame Relay links is creating a discontiguous network between the
R2 and R3 router subnetworks.

Answer: C
Section: Chapter 14: Wide Area Network (WAN)

Explanation/Reference:



QUESTION 287
A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?

A.  application B.  presentation C.  session
D.  transport E. internet F.  data link

Answer: A
Section: Chapter 1: Introduction

Explanation/Reference:



QUESTION 288
Refer to the topology and router output shown in the exhibit. A technician is troubleshooting host connectivity issues on the switches. The hosts in VLANs 10 and 15 on Sw11 are unable to communicate with hosts in the same VLANs on Sw12. Hosts in the Admin VLAN are able to communicate. The port-to-VLAN assignments are identical on the two switches. What could be the problem?




A.  The Fa0/1 port is not operational on one of the switches.
B.  The Link connecting the switches has not been configured as a trunk.
C.  At lease one port needs to be configured in VLAN 1 for VLANs 10 and 15 to be able to communicate. D.  Port FastEthernet 0/1 needs to be configured as an access link on both switches.
E.  A router is required for hosts on Sw11 in VLANs 10 and 15 to communicate with hosts in the same VLAN on
Sw12.
                                                                                             
Answer: B
Section: Chapter 10: VLAN

Explanation/Reference:



QUESTION 289
You have finished physically installing an access point on the ceiling at your office. At a minimum, which paramenter must be configured on the access point in order to allow a wireless client to operate on it?

A.  AES B.  PSK C.  SSID D.  TKIP E.  WEP

Answer: C
Section: Chapter 11: Wireless

Explanation/Reference:



QUESTION 290
Refer to the exhibit. A network administrator needs to add a new VLAN, named VLAN3, to the network shown. Unfortunately, there is not another FastEthernet interface on R1 to connect to the new VLAN3. Which approach is the most cost effective solution for this problem?


A.  Purchase a new FastEthernet module and install it on R1
B.  Replace R1 with a new router that has at least three FastEthernet interfaces.
C.  Configure a second switch to support VLAN3 with a VLAN trunk between SW1 and the new switch.
D.  Configure a single VLAN trunk between R1 and SW1 and configure subinterface on R1 interface for each
VLAN.
E.  Connect another router to a serial interface of R1. Use a FastEthernet interface on the new router for
VLAN3.

Answer: D
Section: Chapter 10: VLAN

Explanation/Reference:



QUESTION 291
Refer to the exhibit. When running EIGRP, What is required for RouterA to exchange routing updates with
RouterC?


A.  As numbers must be changed to match on all the routers. B.  Loopback interface must be configured so a DR is elected.
C.  The  no auto-summary command is needed on Router A and Router C.
D.  Router B needs to have two network statements, one for each connected network.

Answer: A
Section: Chapter 6: IP Routing

Explanation/Reference:



QUESTION 292
Refer to the exhibit. The two exhibit devices are the only Cisco devices on the network. The serial network between the two devices has a mask of 255.255.255.252. Given the output that is shown, what three statements are true of these devices? (Choose three.)



A.  The Manchester serial address is 10.1.1.1
B.  The Manchester serial address is 10.1.1.2
C.  The London router is a Cisco 2610.

D.  The Manchester router is a Cisco 2610.
E.  The CDP information was received on port Serial0/0 of the Manchester router. F.  The CDP information was sent by port Serial0/0 of the London Router.

Answer: ACE
Section: Chapter 5: Managing Cisco IOS

Explanation/Reference:



QUESTION 293
How is an EUI-64 format interface ID created from a 48-bit MAC address?

A.  by appending 0xFF to the MAC address.
B.  by prefixing the MAC address with 0xFFEE.
C.  by prefixing the MAC address with 0xFF and appending 0xFF to it.
D.  by inserting 0xFFFE between the upper three bytes and the lower three bytes of the MAC address
E.  by prefixing the MAC address with 0xF and inserting 0xF after each of its first three bytes.

Answer: D
Section: Chapter 13: IPv6

Explanation/Reference:



QUESTION 294
Refer to the exhibit. After a RIP route is marked invalid on Router_1, how much time will elapse before that route is removed from the routing table?


A.  30 seconds B.  60 seconds C.  90 seconds D.  180 seconds E.  240 seconds
                                                                 
Answer: B
Section: Chapter 6: IP Routing

Explanation/Reference:


QUESTION 295
Refer to the exhibit. A network associate has configured the internetwork that is shown in the exhibit, but has failed to configure routing properly.


Which configuration will allow the hosts on the Branch LAN to access resources on the HQ LAN with the least impact on router processing and WAN bandwidth?

A.  HQ(config)# ip route 192.168.1.0 255.255.255.0 192.168.2.5
Branch(config)# ip route 172.16.25.0 255.255.255.0 192.168.2.6
B.  HQ(config)# router rip
HQ(config-router)# network 192.168.2.0
HQ(config-router)# network 172.16.0.0
Branch(config)# router rip
Branch(config-router)# network 192.168.1.0
Branch(config-router)# network 192.168.2.0
C.  HQ(config)# router eigrp 56
HQ(config-router)# network 192.168.2.4
HQ(config-router)# network 172.16.25.0
Branch(config)# router eigrp 56
Branch(config-router)# network 192.168.1.0
Branch(config-router)# network 192.168.2.4
D.  HQ(config)# router ospf 1
HQ(config-router)# network 192.168.2.4 0.0.0.3 area 0
HQ(config-router)# network 172.16.25.0 0.0.0.255 area 0
Branch(config)# router ospf 1
Branch(config-router)# network 192.168.1.0 0.0.0.255 area 0

Answer: A
Section: Chapter 6: IP Routing

Explanation/Reference:



QUESTION 296
Which additional configuration step is necessary in order to connect to an access point that has SSID
broadcasting disabled?

A.  Set the SSID value in the client software to public.
B.  Configure open authentication on the AP and the client.
C.  Set the SSID value on the client to the SSID configured on the AP.
D.  Configured MAC address filtering to permit the client to connect to the AP.

Answer: C

Section: Chapter 11: Wireless

Explanation/Reference:



QUESTION 297
What is one reason that WPA encryption is preferred over WEP?

A.  A WPA key is longer and requires more special characters than the WEP key.
B.  The access point and the client are manually configured with different WPA key values. C.  WPA key values remain the same until the client configuration is changed.
D.  The values of WPA keys can change dynamically while the system is used.

Answer: D
Section: Chapter 11: Wireless

Explanation/Reference:



QUESTION 298
A network administrator is troubleshooing an EIGRP problem on a router and needs to confirm the IP addresses of the devices with which the router has established adjacency. The retransmit interval and the queue counts for the adjacent routers also need to be checked. What command will display the required information?

A.  Router# show ip eigrp adjacency
B.  Router# show ip eigrp topology
C.  Router# show ip eigrp interfaces
D.  Router# show ip eigrp neighbors

Answer: D
Section: Chapter 6: IP Routing

Explanation/Reference:



QUESTION 299
All WAN links inside the ABC University network use PPP with CHAP for authentication security. Which command will display the CHAP authentication process as it occur between two routers in the network?

A.  show chap authentication
B.  show interface serial0
C.  debug ppp authentication
D.  debug chap authentication
E.  show ppp authentication chap

Answer: C
Section: Chapter 14: Wide Area Network (WAN)

Explanation/Reference:

QUESTION 300
Refer to the exhibit. A network technician is asked to design a small network with redundancy. The exhibit represents this design, with all hosts configured in the same VLAN. What conclusions can be made about this design?


A.  The design will function as intended
B.  Spanning-tree will need to be used.
C.  The router will not accept the addressing scheme.
D.  The connection between switches should be a trunk.
E.  The router interfaces must be encapsulated with the 802.1Q protocol.

Answer: C
Section: Chapter 10: VLAN

Explanation/Reference:



QUESTION 301
Refer to the exhibit. How should the FastEthernet0/1 port on the 2950 model switches that are shown in the exhibit be configured to allow connectivity between all devices?


A.  The ports only need to be connected by a crossover cable.
B.  SwitchX(config)# interface FastEthernet 0/1
SwitchX(config-if)# switchport mode trunk
C.  SwitchX(config)# interface FastEthernet 0/1
SwitchX(config-if)# switchport mode access
SwitchX(config-if)# switchport access vlan 1
D.  SwitchX(config)# interface FastEthernet 0/1
SwitchX(config-if)# switchport mode trunk
SwitchX(config-if)# switchport trunk vlan 1
SwitchX(config-if)# switchport trunk vlan 10
SwitchX(config-if)# switchport trunk vlan 20

Answer: B
Section: Chapter 10: VLAN

Explanation/Reference:



QUESTION 302

IP address and routing for the network are configured as shown in the exhibit. The network administrator issues the show ip eigrp neighbors command from Router1 and receives the output shown below the topology. Which statement is true?




A.  It is normal for Router1 to show one active neighbor at a time to prevent routing loops. B.  Routing is not completely configured on Router3.
C.  The IP addresses are not configured properly on the Router1 and Router3 interfaces.
D.  The no auto-summary command configured on the routers prevents Router1 and Router2 from forming a neighbor relationship.

Answer: B
Section: Chapter 6: IP Routing

Explanation/Reference:



QUESTION 303
Refer to the exhibit. After SwitchB was added to the network, VLAN connectivity problems started to occur. What caused this problem?



A.  Both switches are in sever mode in the same domain
B.  The revision number of SwitchB was higher than the revision number of SwitchA C.  SwitchA was not rebooted prior to adding SwitchB to the network.

D.  V2-mode is not enabled.
E.  VTP pruning is not activated, so the new paths in the network have not been recalculated.

Answer: B
Section: Chapter 10: VLAN

Explanation/Reference:



QUESTION 304
Refer to the exhibit. The output that is shown is generated at a switch. Which three of these statements are true? (Choose three.)


A.  All ports will be in a state of discarding, learning, or forwarding. B.  Thiry VLANs have been configured on this switch.
C.  The bridge priority is lower than the default value for spanning tree. D.  All interfaces that are shown are on shared media.
E.  All designated ports are in a forwarding state.
F.  The switch must be the root bridge for all VLANs on this switch.

Answer: CEF
Section: Chapter 9: Switching

Explanation/Reference:



QUESTION 305
Refer to the exhibit. A network administrator attempts to ping Host1 from Host1 and receives the result that are shown. What is a possible problem?


Router1 and Router2 is down. D.  The default gateway on Host1 is incorrect.
E.  Interface Fa0/0 on Router1 is shudown.
F.  The link between Switch1 and Router1 is down.

Answer: C
Section: Chapter 6: IP Routing

Explanation/Reference:



QUESTION 306
Refer to the exhibit. The Bigtime router is unable to authenticate to the Littletime router. What is the cause of the



A.  The usernames are incorrectly configured on the two routers. B.  The passwords do not match on the two routers.
C.  CHAP authentication cannot be used on a serial interface.
D.  The routers cannot be connected from interface S0/0 to interface S0/0.
E.  With CHAP authentication, one router must authenticate to another router. The routers cannot be configured to authenticate to each other.

Answer: B
Section: Chapter 14: Wide Area Network (WAN)

Explanation/Reference:



QUESTION 307
S0/0 on R1 is configured as a multipoint interface to communicate with R2 and R3 in the hub-and-spoke Frame Relay topology shown in the exhibit. Originally, static routes were configured between these routers to successfully route traffic between the attached networks. What will need to be done in order to use RIPv2 in place of the static routes?


?
A.  Configure the no ip subnet-zero command on R1, R2, and R3.
B.  Dynamic routing protocols such as RIPv2 cannot be used across Frame Relay networks.
C.  Configure the S0/0 interface on R1 as two subinterfaces and configure point-to-point links to R2 and R3.
D.  Change the 172.16.2.0/25 and 172.16.2.128/25 subnetworks so that at least two bits are borrowed from the last octet.
E.  Change the network address configuration to eliminate the discontiguous 172.16.2.0/25 and
172.16.2.128/25 subnetwork.

Answer: C
Section: Chapter 14: Wide Area Network (WAN)

Explanation/Reference:



QUESTION 308
Refer to the exhibit. A router interface is being configured for Frame Relay. However, as the exhibit shows, the router will not accept the command to configure the LMI type. What is the problem


A.  The interface does not support Frame Relay connections.
B.  The interface does not have an IP address assigned to it yet.
C.  The interface requires that the no shutdown command be configured first. 


QUESTION 309
Refer to the exhibit. Two buildings on the San Jose campus of a small company must be connected to use Ethernet with a bandwidth of at least 100 Mbps. The company is concerned about possible problems from voltage potential difference between the two buildings. Which media type should be used for the connection?
D.  the interface requires that the encapsulation frame-relay command be configured first.

Answer: D
Section: Chapter 14: Wide Area Network (WAN)

Explanation/Reference:


A.  UTP cable
B.  STP cable
C.  Coaxial cable
D.  Fiber optic cable

Answer: D
Section: Chapter 1: Introduction

Explanation/Reference:

QUESTION 310
Users have been complaining that their Frame Relay connection to the corporate site is very slow. The network administrator suspects that the link is overloaded. Based on the partial output of the Router# show frame relay pvc command shown in the graphic, which output value indicates to the local router that traffic sent to the corporate site is experiencing congestion?


A.  DLCI = 100
B.  last time PVC status changed 00:25:40
C.  in BECN packets 192
D.  in FECN packets 147
E.  in DE packets 0

Answer: C
Section: Chapter 14: Wide Area Network (WAN)

Explanation/Reference:



QUESTION 311
Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?

A.  denial of service
B.  brute force
C.  reconnaissance
D.  Trojan horse

Answer: A
Section: Chapter 7: Security

Explanation/Reference:



QUESTION 312
Refer to the exhibit. A router boots to the prompt shown in the exhibit. What does this signify, and how should the network administrator respond?

A.  Check the trunk encapsulation mode for SwitchC's fa0/1 port. B.  Check the duplex mode for SwitchC's fa0/1 port.
C.  Check the duplex mode for SwitchA's fa0/2 port.
D.  Check the trunk encapsulation mode for SwitchA's fa0/2 port.

xx



Answer: C
Section: Chapter 9: Switching

Explanation/Reference:



QUESTION 314
Refer to the exhibit. Which of these statements correctly describes the state of the switch once the boot process has been completed?



















































0 Response to " "

Post a Comment

Free Web Directory Work High Pagerank Google PR Link Directory - Transops.Net Gateway-Worldwide.com PR5 Links To Your Website- Submit Today