Click to see it! (Fixed!)
When using NAT on a router, what is the term for the IP address of an inside host as it appears to the outside network?
inside globaloutside local
In order to load an initial configuration on a new switch, a network administrator has connected a laptop to the switch via the use of a console cable. About a minute after the network administrator powers on the switch, the SYST LED on the front of the switch changes from blinking green to amber. What does this indicate?
The network administrator has made an improper physical connection to the switch.
The switch is ready to have a configuration file loaded.
A port on the switch is bad.
The switch failed POST.
Which routing protocol excludes the subnet information from routing updates?
Which layer of the OSI model handles common protocols and technologies including Ethernet, WLAN, Wi-Fi, ATM, and PPP?
Layer 2Layer 3
Refer to the exhibit. Which three IP addresses could be assigned to the hosts? (Choose three.)
What are three features of the TCP protocol? (Choose three.)
It provides retransmission of data packets if they are lost during transmission.It is a connectionless protocol.
It uses a three-way handshake between the sending and receiving systems to establish each conversation.
It specifies how messages are reassembled at the destination host.It requires only 8 bytes of overhead.
It breaks the data packet into datagrams.
Which combination of network address and subnet mask allows 62 hosts to be connected in a single subnet?
Network address 10.1.1.4 Subnet mask 255.255.255.240
Network address 10.1.1.0 Subnet mask 255.255.255.252
Network address 10.1.1.0 Subnet mask 255.255.255.192
Network address 10.1.1.4 Subnet mask 255.255.255.248
What occurs during a static NAT translation?
Multiple local addresses are mapped to one global address.
The host device is configured with a permanent outside global address.
A one-to-one mapping is created between an inside local and outside global address.
The router is forced to return the inside global address to the address pool when a session ends.
Refer to the exhibit. A network administrator is troubleshooting the serial connection between R1 and R2. There is no communication between R1 and R2. Based on the output of the show ip interface brief command, what is the cause of the problem?
There is a misconfiguration of IP addresses.There is a mismatch of encapsulation methods.
The no shutdown command should be issued on R2.
The routing protocols are not compatible.
What is a feature of PAT?
It maps IP addresses to URLs.
It displays private IP addresses to public networks.
It sends acknowledgments of received packets.
It allows multiple hosts on a single LAN to share globally unique IP addresses.
Which protocol allows secure in-band management so that a network administrator can monitor and configure network devices without fear of any passwords being compromised?
Refer to the exhibit. A PC has an IP address of 192.168.87.30 but is unable to contact a web server on the Internet. A network administrator is troubleshooting the DHCP configuration on a Cisco 1841 router. What is the possible error?
The IP address of the PC is outside the network range.
A domain name is required in the DHCP configuration.
The DHCP service has not been activated.
The default-router command needs to be included in the DHCP configuration.The DHCP pool has not been applied to an active interface.
What is the maximum unrepeated distance set by industry standards for UTP cable?
Refer to the exhibit. The network administrator uses the command below to configure a default route on RTB:
RTB(config)# ip route 0.0.0.0 0.0.0.0 fa0/0
A ping issued from PC3 is successful to RTB. However, echo request packets arrive at PC1 but the echo replies do not make it back to PC3. What will fix this problem?
RTA must be configured to forward packets to the 192.168.2.0 network.
The ip route command needs to be edited so that the next hop address is 10.1.1.5.The ip route command needs to be edited so that the 192.168.2.1 address is the next hop address.
The ip route command should be removed from the RTB router configuration.
Another default route should be configured on RTA with a next hop address of 10.1.1.6.
Refer to the exhibit. What does the highlighted value 120 represent?
the number of hops between the router and network 10.0.5.0
the administrative distance of the routing protocolthe UDP port number that is used for forwarding traffic
the bandwidth that is allocated to the serial interface
Refer to the exhibit. What is the device named "Distribution"?
a switchan IP phone
Refer to the exhibit. Router R1 has been configured with the commands that are displayed. Which fact can be determined from the configuration?
All passwords are encrypted.The privileged EXEC mode password is “password1.”
The router can support four Telnet sessions simultaneously.
The router can be accessed from the console without using any password.
Refer to the exhibit. A NOC technician at an ISP enters the command c:\ping 188.8.131.52. What are two reasons to use this command? (Choose two.)
map the path to 184.108.40.206
test reachability to 220.127.116.11
locate connectivity problems along the route to 18.104.22.168
identify ISPs that interconnect the NOC and remote host with IP 22.214.171.124
measure the time that packets take to reach 126.96.36.199 and return to the technician's workstation
Which statement describes a route that has been learned dynamically?
It is automatically updated and maintained by routing protocols.
It is unaffected by changes in the topology of the network.
It has an administrative distance of 1.
It is identified by the prefix C in the routing table.
Which cable should be used to connect a PC to the console port of a Cisco router?
Refer to the exhibit. Which combination of cable types should be used to complete the connection?
Cable A - straight-through; Cable B - straight-through; Cable C - serialCable A - straight-through; Cable B - straight-through; Cable C - rollover
Cable A - rollover; Cable B - straight-through; Cable C - crossover
Cable A - straight-through; Cable B - crossover; Cable C - serial
To manage a Cisco switch using Telnet, where would the management IP address be configured on the switch?
VLAN 1 interfacefirst vty port
first trunk port
FastEthernet 0/1 interface
Refer to the exhibit. A user who is connected to RTA is trying to telnet to RTB, but the connection is failing. Based on the output of theshow running-config command on router RTB, why is the Telnet session failing?
Telnet has not been configured on the console line.
The login command has not been issued on the console line.
No password has been configured on the VTY lines.A session limit has not been configured for Telnet.
Refer to the exhibit. R2 is connected to the Serial0/0/1 interface of R1 and is properly configured to share routing updates with R1. Which network will R2 exclude from installing in its routing table?
R 192.168.10.0/24 [120/2] via 192.168.1.2, 00:00:10, Serial0/0/1
R 192.168.7.0/24 [120/1] via 192.168.1.2, 00:00:10, Serial0/0/1
R 192.168.6.0/24 [120/15] via 192.168.3.2, 00:00:10, Serial0/0/0
R 192.168.8.0/24 [120/2] via 192.168.3.2, 00:00:10, Serial0/0/0
If the configuration register is currently set to 0x2102, what is the first action that a router will take after the bootstrap program loads successfully?
load the IOS from flashload the IOS from NVRAM
load the IOS from the TFTP server
load the startup configuration file from flash
load the startup configuration file from NVRAM
load the startup configuration file from the TFTP server
How does a switch interface that uses sticky port security handle MAC addresses?
The addresses are configured manually and are saved in the running configuration.
They are configured manually and are not saved in the running configuration.
They are configured dynamically and are saved in the running configuration.
They are configured dynamically and are not saved in the running configuration.
A network engineer is asked to specify the type of cable for a new network installation. The engineer plans horizontal cable runs of less than 90 feet (27.4 meters) using cable that is not expensive and is easy to implement. It will be positioned away from electrically noisy areas to avoid EMI. Which cable should the engineer choose?
A network is spread across two buildings that are separated by a distance of 500 feet (152 meters). An electrical transformer is installed near the cable route. Which type of cable should be used in this network?
In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another?
destination network address
source network address
source MAC address
well known port destination address
A network technician is using a network management station to gather data about the performance of devices and links within the ISP. Which application layer protocol makes this possible?
How do port filtering and access lists help provide network security?
They prevent specified types of traffic from reaching specified network destinations.
They alert network administrators to various type of denial of service attacks as they occur.
They prevent viruses, worms, and Trojans from infecting host computers and servers.
They enable encryption and authentication of confidential data communications.
In the URL http://dev.cisco.com/wwwdocs/procedures.htm, what is identified by wwwdocs?
the server name where the resource is located
the protocol that is used for the resource request
the domain name of the server that is being accessed
the folder where the requested resource is stored
What are two purposes of DNS? (Choose two.)
to dynamically assign IP addressing information to network hosts
to simplify the administration of host and default gateway addressing on client computers
to assign TCP port numbers to hosts as part of the data transfer process
to resolve human-readable domain names to numeric IP addresses
to replace the static HOSTS file with a more practical dynamic system
As a host prepares a message for communication, a header and trailer are added and the data is placed on the medium for transmission to the next directly connected device. At which two layers of the OSI model do these activities occur? (Choose two.)
Which two procedures are solutions if a duplex mismatch error is discovered on a switch port that is connected to a server NIC? (Choose two.)
Replace the NIC on the server.
Set the server NIC to half-duplex.
Set the speed and duplex to match on both devices.Power cycle both devices to reinitialize the autonegotiation process.
Set both the switch port and the server NIC to autonegotiate speed and duplex.Change the cable that connects the server and the switch to a crossover cable.
Which protocol allows encryption of any application layer protocol?
Which application can be delivered using UDP?
Refer to the exhibit. Which two statements describe the data conversation shown? (Choose two.)
The data conversation was started by the HTTP application process running on the client.
The data conversation is identified by TCP port 80 on the client.
The user started the data conversation by sending an e-mail.
The IP address of the Internet server is 192.168.17.43.
The Internet server will send data to port 8547 on the client.
Which WAN service provides point-to-point connections with a predefined communications path?
Refer to the exhibit. The S0/0/0 interface of R2 is configured correctly with the default encapsulation. Which configuration should be implemented at the S0/0/0 interface of R1 to complete the connection between the two routers?
R1(config-if)# ip address 192.168.1.31 255.255.255.252
R1(config-if)# no shutdown
R1(config-if)# ip address 192.168.1.33 255.255.255.252
R1(config-if)# encapsulation PPP
R1(config-if)# no shutdown
R1(config-if)# ip address 192.168.1.28 255.255.255.252
R1(config-if)# encapsulation PPP
R1(config-if)# no shutdown
R1(config-if)# ip address 192.168.1.29 255.255.255.252
R1(config-if)# no shutdown
When selecting a WAN service, a customer estimates that it may need about 20 Mb/s of the upstream bandwidth to support various server services on the Internet. Which WAN connection should the network designer recommend?
The command copy tftp running-config has been entered on the router. What will this command do?
copy the configuration in RAM to a server
copy the configuration file from a server to RAM
copy the configuration file in NVRAM to RAM
copy the configuration file in NVRAM to a server
copy the configuration file from a server to NVRAM
A company has formed a team that must analyze the probability of a disaster occurring and the associated effects and costs to their business. Which step of the disaster recovery plan is the team tasked with completing?
risk assessmentvulnerability assessment
disaster scenario prioritization
disaster recovery strategy development
Which statement correctly describes the function of AAA?
It prevents unauthorized access to a network.
It filters traffic based on destination IP and port number.
It enables users to send information to a daemon that is running on a management station.
It encrypts data to provide network security.
Which statement correctly describes the difference between HTTP and HTTPS?
The maximum number of simultaneous connections that a server can support for HTTPS is more than for HTTP.
HTTPS and HTTP use different client request-server response processes.
HTTPS authenticates and encrypts the data being transferred between the client and the web server.HTTPS specifies the rules for passing data between the physical layer and the data link layer.
What routing protocol would be appropriate to use for exchanging routes between ISPs?
A user reports being able to access the Internet but not being able to download e-mail from the mail server at the ISP. What should the user check on the user workstation?
the POP3 and SMTP server settings in the e-mail application
the patch cable connections at the back of the workstation and at the wall plate
the DHCP settings in the operating system
the IP address, mask, and default gateway values
the NIC drivers
What is the primary function of a Level 1 support technician in an ISP help desk department with multiple levels of customer support?
to install hardware replacements for the customer
to accompany an on-site technician to provide additional technical support
to diagnose and document the symptoms of hardware, software, and system problemsto design network enhancements that support the new technology requirements of the customer
A user reports being unable to access the Internet. The help desk technician employs a bottom-up approach to troubleshooting. The technician first has the user check the patch cable connection from the PC to the wall, and then has the user verify that the NIC has a green link light. What will the technician have the user do next?
Enter an IP address into the WWW browser address bar to see if DNS is at fault.
Use traceroute to identify the device along the path to the ISP that may be at fault.
Verify the IP address, subnet, and gateway settings using ipconfig on the PC.
Connect to the user home router to check firewall settings for blocked TCP ports.
A customer reports connectivity problems to an ISP technician. Upon questioning the customer, the technician discovers that all network applications are functioning except for FTP. What should the technician suspect is the problem?
bad port on switch or hub
misconfigured IP addressing on the customer's workstation
wrong DNS server configured on the customer's workstation
wrong default gateway configured on the customer's workstation
What is used by a routing protocol to determine the best path to include in the routing table?
Type of router