Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Inside Global

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 13

1

When using NAT on a router, what is the term for the IP address of an inside host as it
appears to the outside network?
inside local
inside global
outside local
outside global

2
In order to load an initial configuration on a new switch, a network administrator has
connected a laptop to the switch via the use of a console cable. About a minute after the
network administrator powers on the switch, the SYST LED on the front of the switch
changes from blinking green to amber. What does this indicate?
The network administrator has made an improper physical connection to the switch.
The switch is ready to have a configuration file loaded.
A port on the switch is bad.
The switch failed POST.

3
Which routing protocol excludes the subnet information from routing updates?
EIGRP
OSPF
RIPv1
BGP

4
Which layer of the OSI model handles common protocols and technologies including
Ethernet, WLAN, Wi-Fi, ATM, and PPP?
Layer 1
Layer 2
Layer 3
Layer 4
Layer 7

5
Refer to the exhibit. Which three IP addresses could
be assigned to the hosts? (Choose three.)
192.168.88.1
192.168.88.8
192.168.88.9
192.168.88.12
192.168.88.14
192.168.88.15
192.168.88.16
192.168.88.18

6
What are three features of the TCP protocol? (Choose three.)
It provides retransmission of data packets if they are lost during transmission.
It is a connectionless protocol.
It uses a three-way handshake between the sending and receiving systems to establish each
conversation.
It specifies how messages are reassembled at the destination host.
It requires only 8 bytes of overhead.
It breaks the data packet into datagrams.

7
Which combination of network address and subnet mask allows 62 hosts to be connected in
a single subnet?
Network address 10.1.1.4 Subnet mask 255.255.255.240
Network address 10.1.1.0 Subnet mask 255.255.255.252
Network address 10.1.1.0 Subnet mask 255.255.255.192
Network address 10.1.1.4 Subnet mask 255.255.255.248

8
What occurs during a static NAT translation?
Multiple local addresses are mapped to one global address.
The host device is configured with a permanent outside global address.
A one-to-one mapping is created between an inside local and outside global address.
The router is forced to return the inside global address to the address pool when a session
ends.

Refer to the exhibit.


A network administrator is troubleshooting the serial connection between R1 and R2.
There is no communication between R1 and R2. Based on the output of the show ip
interface brief command, what is the cause of the problem?
There is a misconfiguration of IP addresses.
There is a mismatch of encapsulation methods.
The no shutdown command should be issued on R2.
The routing protocols are not compatible.

10
What is a feature of PAT?
It maps IP addresses to URLs.
It displays private IP addresses to public networks.
It sends acknowledgments of received packets.
It allows multiple hosts on a single LAN to share globally unique IP addresses.

11
Which protocol allows secure in-band management so that a network administrator can
monitor and configure network devices without fear of any passwords being compromised?
SSH
HTTP
SNMP
Telnet

12
Refer to the exhibit. A
PC has an IP address of 192.168.87.30 but is unable to contact a web server on the
Internet. A network administrator is troubleshooting the DHCP configuration on a Cisco
1841 router. What is the possible error?
The IP address of the PC is outside the network range.
A domain name is required in the DHCP configuration.
The DHCP service has not been activated.
The default-router command needs to be included in the DHCP configuration.
The DHCP pool has not been applied to an active interface.

13
What is the maximum unrepeated distance set by industry standards for UTP cable?
10 meters
75 meters
100 meters
325 meters

14

Refer to the exhibit. The network administrator uses the command below to configure a
default route on RTB:

RTB(config)# ip route 0.0.0.0 0.0.0.0 fa0/0

A ping issued from PC3 is successful to RTB. However, echo request packets arrive at PC1
but the echo replies do not make it back to PC3. What will fix this problem?
RTA must be configured to forward packets to the 192.168.2.0 network.
The ip route command needs to be edited so that the next hop address is 10.1.1.5.
The ip route command needs to be edited so that the 192.168.2.1 address is the next hop
address.
The ip route command should be removed from the RTB router configuration.
Another default route should be configured on RTA with a next hop address of 10.1.1.6.

15

Refer to the
exhibit. What does the highlighted value 120 represent?
the number of hops between the router and network 10.0.5.0
the administrative distance of the routing protocol
the UDP port number that is used for forwarding traffic
the bandwidth that is allocated to the serial interface

16

Refer to the
exhibit. What is the device named "Distribution"?
a firewall
a router
a switch
an IP phone

17
Refer to the exhibit.
Router R1 has been configured with the commands that are displayed. Which fact can be
determined from the configuration?
All passwords are encrypted.
The privileged EXEC mode password is “password1.”
The router can support four Telnet sessions simultaneously.
The router can be accessed from the console without using any password.

18

Refer to the exhibit. A


NOC technician at an ISP enters the command c:\ping 209.165.201.7. What are two
reasons to use this command? (Choose two.)
map the path to 209.165.201.7
test reachability to 209.165.201.7
locate connectivity problems along the route to 209.165.201.7
identify ISPs that interconnect the NOC and remote host with IP 209.165.201.7
measure the time that packets take to reach 209.165.201.7 and return to the technician's
workstation

19
Which statement describes a route that has been learned dynamically?
It is automatically updated and maintained by routing protocols.
It is unaffected by changes in the topology of the network.
It has an administrative distance of 1.
It is identified by the prefix C in the routing table.

20
Which cable should be used to connect a PC to the console port of a Cisco router?
serial
crossover
rollover
straight-through

21

Refer to the exhibit. Which combination of cable types should be used to complete the
connection?
Cable A - straight-through; Cable B - straight-through; Cable C - serial
Cable A - straight-through; Cable B - straight-through; Cable C - rollover
Cable A - rollover; Cable B - straight-through; Cable C - crossover
Cable A - straight-through; Cable B - crossover; Cable C - serial

22
To manage a Cisco switch using Telnet, where would the management IP address be
configured on the switch?
VLAN 1 interface
first vty port
first trunk port
console port
FastEthernet 0/1 interface

23

Ref
er to the exhibit. A user who is connected to RTA is trying to telnet to RTB, but the
connection is failing. Based on the output of theshow running-config command on router
RTB, why is the Telnet session failing?
Telnet has not been configured on the console line.
The login command has not been issued on the console line.
No password has been configured on the VTY lines.
A session limit has not been configured for Telnet.

24

Refer to the
exhibit. R2 is connected to the Serial0/0/1 interface of R1 and is properly configured to
share routing updates with R1. Which network will R2 exclude from installing in its
routing table?
R 192.168.10.0/24 [120/2] via 192.168.1.2, 00:00:10, Serial0/0/1
R 192.168.7.0/24 [120/1] via 192.168.1.2, 00:00:10, Serial0/0/1
R 192.168.6.0/24 [120/15] via 192.168.3.2, 00:00:10, Serial0/0/0
R 192.168.8.0/24 [120/2] via 192.168.3.2, 00:00:10, Serial0/0/0

25
If the configuration register is currently set to 0x2102, what is the first action that a router
will take after the bootstrap program loads successfully?
load the IOS from flash
load the IOS from NVRAM
load the IOS from the TFTP server
load the startup configuration file from flash
load the startup configuration file from NVRAM
load the startup configuration file from the TFTP server

26
How does a switch interface that uses sticky port security handle MAC addresses?
The addresses are configured manually and are saved in the running configuration.
They are configured manually and are not saved in the running configuration.
They are configured dynamically and are saved in the running configuration.
They are configured dynamically and are not saved in the running configuration.

27
A network engineer is asked to specify the type of cable for a new network installation. The
engineer plans horizontal cable runs of less than 90 feet (27.4 meters) using cable that is
not expensive and is easy to implement. It will be positioned away from electrically noisy
areas to avoid EMI. Which cable should the engineer choose?
STP
UTP
coaxial
fiber optic

28
A network is spread across two buildings that are separated by a distance of 500 feet (152
meters). An electrical transformer is installed near the cable route. Which type of cable
should be used in this network?
STP
UTP
coaxial
fiber-optic

29
In an IPv4 environment, what information is used by the router to forward data packets
from one interface of a router to another?
destination network address
source network address
source MAC address
well known port destination address

30
A network technician is using a network management station to gather data about the
performance of devices and links within the ISP. Which application layer protocol makes
this possible?
SNMP
FTP
DHCP
SMTP

31
How do port filtering and access lists help provide network security?
They prevent specified types of traffic from reaching specified network destinations.
They alert network administrators to various type of denial of service attacks as they occur.
They prevent viruses, worms, and Trojans from infecting host computers and servers.
They enable encryption and authentication of confidential data communications.

32
In the URL http://dev.cisco.com/wwwdocs/procedures.htm, what is identified by wwwdocs?
the server name where the resource is located
the protocol that is used for the resource request
the domain name of the server that is being accessed
the folder where the requested resource is stored

33
What are two purposes of DNS? (Choose two.)
to dynamically assign IP addressing information to network hosts
to simplify the administration of host and default gateway addressing on client computers
to assign TCP port numbers to hosts as part of the data transfer process
to resolve human-readable domain names to numeric IP addresses
to replace the static HOSTS file with a more practical dynamic system

34
As a host prepares a message for communication, a header and trailer are added and the
data is placed on the medium for transmission to the next directly connected device. At
which two layers of the OSI model do these activities occur? (Choose two.)
session
network
physical
transport
data link
application
presentation

35
Which two procedures are solutions if a duplex mismatch error is discovered on a switch
port that is connected to a server NIC? (Choose two.)
Replace the NIC on the server.
Set the server NIC to half-duplex.
Set the speed and duplex to match on both devices.
Power cycle both devices to reinitialize the autonegotiation process.
Set both the switch port and the server NIC to autonegotiate speed and duplex.
Change the cable that connects the server and the switch to a crossover cable.

36
Which protocol allows encryption of any application layer protocol?
FTP
FTPS
HTTPS
IPsec
Telnet

37
Which application can be delivered using UDP?
FTP
DNS
HTTP
SMTP

38

Refer to the exhibit.


Which two statements describe the data conversation shown? (Choose two.)
The data conversation was started by the HTTP application process running on the client.
The data conversation is identified by TCP port 80 on the client.
The user started the data conversation by sending an e-mail.
The IP address of the Internet server is 192.168.17.43.
The Internet server will send data to port 8547 on the client.

39
Which WAN service provides point-to-point connections with a predefined communications
path?
E1
T1
dialup
leased line

40

Refer to the exhibit. The S0/0/0


interface of R2 is configured correctly with the default encapsulation. Which configuration
should be implemented at the S0/0/0 interface of R1 to complete the connection between
the two routers?
R1(config-if)# ip address 192.168.1.31 255.255.255.252
R1(config-if)# no shutdown
R1(config-if)# ip address 192.168.1.33 255.255.255.252
R1(config-if)# encapsulation PPP
R1(config-if)# no shutdown
R1(config-if)# ip address 192.168.1.28 255.255.255.252
R1(config-if)# encapsulation PPP
R1(config-if)# no shutdown
R1(config-if)# ip address 192.168.1.29 255.255.255.252
R1(config-if)# no shutdown

41
When selecting a WAN service, a customer estimates that it may need about 20 Mb/s of the
upstream bandwidth to support various server services on the Internet. Which WAN
connection should the network designer recommend?
T1
DSL
ATM
Frame Relay
fractional T3

42
The command copy tftp running-config has been entered on the router. What will this
command do?
copy the configuration in RAM to a server
copy the configuration file from a server to RAM
copy the configuration file in NVRAM to RAM
copy the configuration file in NVRAM to a server
copy the configuration file from a server to NVRAM

43
A company has formed a team that must analyze the probability of a disaster occurring and
the associated effects and costs to their business. Which step of the disaster recovery plan is
the team tasked with completing?
risk assessment
vulnerability assessment
disaster scenario prioritization
disaster recovery strategy development

44
Which statement correctly describes the function of AAA?
It prevents unauthorized access to a network.
It filters traffic based on destination IP and port number.
It enables users to send information to a daemon that is running on a management station.
It encrypts data to provide network security.

45
Which statement correctly describes the difference between HTTP and HTTPS?
The maximum number of simultaneous connections that a server can support for HTTPS is
more than for HTTP.
HTTPS and HTTP use different client request-server response processes.
HTTPS authenticates and encrypts the data being transferred between the client and the web
server.
HTTPS specifies the rules for passing data between the physical layer and the data link layer.

46
What routing protocol would be appropriate to use for exchanging routes between ISPs?
RIPv2
BGP
OSPF
EIGRP

47
A user reports being able to access the Internet but not being able to download e-mail from
the mail server at the ISP. What should the user check on the user workstation?
the POP3 and SMTP server settings in the e-mail application
the patch cable connections at the back of the workstation and at the wall plate
the DHCP settings in the operating system
the IP address, mask, and default gateway values
the NIC drivers

48
What is the primary function of a Level 1 support technician in an ISP help desk
department with multiple levels of customer support?
to install hardware replacements for the customer
to accompany an on-site technician to provide additional technical support
to diagnose and document the symptoms of hardware, software, and system problems
to design network enhancements that support the new technology requirements of the
customer

49
A user reports being unable to access the Internet. The help desk technician employs a
bottom-up approach to troubleshooting. The technician first has the user check the patch
cable connection from the PC to the wall, and then has the user verify that the NIC has a
green link light. What will the technician have the user do next?
Enter an IP address into the WWW browser address bar to see if DNS is at fault.
Use traceroute to identify the device along the path to the ISP that may be at fault.
Verify the IP address, subnet, and gateway settings using ipconfig on the PC.
Connect to the user home router to check firewall settings for blocked TCP ports.

51
A customer reports connectivity problems to an ISP technician. Upon questioning the
customer, the technician discovers that all network applications are functioning except for
FTP. What should the technician suspect is the problem?
misconfigured firewall
bad port on switch or hub
misconfigured IP addressing on the customer's workstation
wrong DNS server configured on the customer's workstation
wrong default gateway configured on the customer's workstation

52
What is used by a routing protocol to determine the best path to include in the routing
table?
Convergence time
Default distance
Metric
Type of router

You might also like