Inside Global
Inside Global
Inside Global
When using NAT on a router, what is the term for the IP address of an inside host as it
appears to the outside network?
inside local
inside global
outside local
outside global
2
In order to load an initial configuration on a new switch, a network administrator has
connected a laptop to the switch via the use of a console cable. About a minute after the
network administrator powers on the switch, the SYST LED on the front of the switch
changes from blinking green to amber. What does this indicate?
The network administrator has made an improper physical connection to the switch.
The switch is ready to have a configuration file loaded.
A port on the switch is bad.
The switch failed POST.
3
Which routing protocol excludes the subnet information from routing updates?
EIGRP
OSPF
RIPv1
BGP
4
Which layer of the OSI model handles common protocols and technologies including
Ethernet, WLAN, Wi-Fi, ATM, and PPP?
Layer 1
Layer 2
Layer 3
Layer 4
Layer 7
5
Refer to the exhibit. Which three IP addresses could
be assigned to the hosts? (Choose three.)
192.168.88.1
192.168.88.8
192.168.88.9
192.168.88.12
192.168.88.14
192.168.88.15
192.168.88.16
192.168.88.18
6
What are three features of the TCP protocol? (Choose three.)
It provides retransmission of data packets if they are lost during transmission.
It is a connectionless protocol.
It uses a three-way handshake between the sending and receiving systems to establish each
conversation.
It specifies how messages are reassembled at the destination host.
It requires only 8 bytes of overhead.
It breaks the data packet into datagrams.
7
Which combination of network address and subnet mask allows 62 hosts to be connected in
a single subnet?
Network address 10.1.1.4 Subnet mask 255.255.255.240
Network address 10.1.1.0 Subnet mask 255.255.255.252
Network address 10.1.1.0 Subnet mask 255.255.255.192
Network address 10.1.1.4 Subnet mask 255.255.255.248
8
What occurs during a static NAT translation?
Multiple local addresses are mapped to one global address.
The host device is configured with a permanent outside global address.
A one-to-one mapping is created between an inside local and outside global address.
The router is forced to return the inside global address to the address pool when a session
ends.
10
What is a feature of PAT?
It maps IP addresses to URLs.
It displays private IP addresses to public networks.
It sends acknowledgments of received packets.
It allows multiple hosts on a single LAN to share globally unique IP addresses.
11
Which protocol allows secure in-band management so that a network administrator can
monitor and configure network devices without fear of any passwords being compromised?
SSH
HTTP
SNMP
Telnet
12
Refer to the exhibit. A
PC has an IP address of 192.168.87.30 but is unable to contact a web server on the
Internet. A network administrator is troubleshooting the DHCP configuration on a Cisco
1841 router. What is the possible error?
The IP address of the PC is outside the network range.
A domain name is required in the DHCP configuration.
The DHCP service has not been activated.
The default-router command needs to be included in the DHCP configuration.
The DHCP pool has not been applied to an active interface.
13
What is the maximum unrepeated distance set by industry standards for UTP cable?
10 meters
75 meters
100 meters
325 meters
14
Refer to the exhibit. The network administrator uses the command below to configure a
default route on RTB:
A ping issued from PC3 is successful to RTB. However, echo request packets arrive at PC1
but the echo replies do not make it back to PC3. What will fix this problem?
RTA must be configured to forward packets to the 192.168.2.0 network.
The ip route command needs to be edited so that the next hop address is 10.1.1.5.
The ip route command needs to be edited so that the 192.168.2.1 address is the next hop
address.
The ip route command should be removed from the RTB router configuration.
Another default route should be configured on RTA with a next hop address of 10.1.1.6.
15
Refer to the
exhibit. What does the highlighted value 120 represent?
the number of hops between the router and network 10.0.5.0
the administrative distance of the routing protocol
the UDP port number that is used for forwarding traffic
the bandwidth that is allocated to the serial interface
16
Refer to the
exhibit. What is the device named "Distribution"?
a firewall
a router
a switch
an IP phone
17
Refer to the exhibit.
Router R1 has been configured with the commands that are displayed. Which fact can be
determined from the configuration?
All passwords are encrypted.
The privileged EXEC mode password is “password1.”
The router can support four Telnet sessions simultaneously.
The router can be accessed from the console without using any password.
18
19
Which statement describes a route that has been learned dynamically?
It is automatically updated and maintained by routing protocols.
It is unaffected by changes in the topology of the network.
It has an administrative distance of 1.
It is identified by the prefix C in the routing table.
20
Which cable should be used to connect a PC to the console port of a Cisco router?
serial
crossover
rollover
straight-through
21
Refer to the exhibit. Which combination of cable types should be used to complete the
connection?
Cable A - straight-through; Cable B - straight-through; Cable C - serial
Cable A - straight-through; Cable B - straight-through; Cable C - rollover
Cable A - rollover; Cable B - straight-through; Cable C - crossover
Cable A - straight-through; Cable B - crossover; Cable C - serial
22
To manage a Cisco switch using Telnet, where would the management IP address be
configured on the switch?
VLAN 1 interface
first vty port
first trunk port
console port
FastEthernet 0/1 interface
23
Ref
er to the exhibit. A user who is connected to RTA is trying to telnet to RTB, but the
connection is failing. Based on the output of theshow running-config command on router
RTB, why is the Telnet session failing?
Telnet has not been configured on the console line.
The login command has not been issued on the console line.
No password has been configured on the VTY lines.
A session limit has not been configured for Telnet.
24
Refer to the
exhibit. R2 is connected to the Serial0/0/1 interface of R1 and is properly configured to
share routing updates with R1. Which network will R2 exclude from installing in its
routing table?
R 192.168.10.0/24 [120/2] via 192.168.1.2, 00:00:10, Serial0/0/1
R 192.168.7.0/24 [120/1] via 192.168.1.2, 00:00:10, Serial0/0/1
R 192.168.6.0/24 [120/15] via 192.168.3.2, 00:00:10, Serial0/0/0
R 192.168.8.0/24 [120/2] via 192.168.3.2, 00:00:10, Serial0/0/0
25
If the configuration register is currently set to 0x2102, what is the first action that a router
will take after the bootstrap program loads successfully?
load the IOS from flash
load the IOS from NVRAM
load the IOS from the TFTP server
load the startup configuration file from flash
load the startup configuration file from NVRAM
load the startup configuration file from the TFTP server
26
How does a switch interface that uses sticky port security handle MAC addresses?
The addresses are configured manually and are saved in the running configuration.
They are configured manually and are not saved in the running configuration.
They are configured dynamically and are saved in the running configuration.
They are configured dynamically and are not saved in the running configuration.
27
A network engineer is asked to specify the type of cable for a new network installation. The
engineer plans horizontal cable runs of less than 90 feet (27.4 meters) using cable that is
not expensive and is easy to implement. It will be positioned away from electrically noisy
areas to avoid EMI. Which cable should the engineer choose?
STP
UTP
coaxial
fiber optic
28
A network is spread across two buildings that are separated by a distance of 500 feet (152
meters). An electrical transformer is installed near the cable route. Which type of cable
should be used in this network?
STP
UTP
coaxial
fiber-optic
29
In an IPv4 environment, what information is used by the router to forward data packets
from one interface of a router to another?
destination network address
source network address
source MAC address
well known port destination address
30
A network technician is using a network management station to gather data about the
performance of devices and links within the ISP. Which application layer protocol makes
this possible?
SNMP
FTP
DHCP
SMTP
31
How do port filtering and access lists help provide network security?
They prevent specified types of traffic from reaching specified network destinations.
They alert network administrators to various type of denial of service attacks as they occur.
They prevent viruses, worms, and Trojans from infecting host computers and servers.
They enable encryption and authentication of confidential data communications.
32
In the URL http://dev.cisco.com/wwwdocs/procedures.htm, what is identified by wwwdocs?
the server name where the resource is located
the protocol that is used for the resource request
the domain name of the server that is being accessed
the folder where the requested resource is stored
33
What are two purposes of DNS? (Choose two.)
to dynamically assign IP addressing information to network hosts
to simplify the administration of host and default gateway addressing on client computers
to assign TCP port numbers to hosts as part of the data transfer process
to resolve human-readable domain names to numeric IP addresses
to replace the static HOSTS file with a more practical dynamic system
34
As a host prepares a message for communication, a header and trailer are added and the
data is placed on the medium for transmission to the next directly connected device. At
which two layers of the OSI model do these activities occur? (Choose two.)
session
network
physical
transport
data link
application
presentation
35
Which two procedures are solutions if a duplex mismatch error is discovered on a switch
port that is connected to a server NIC? (Choose two.)
Replace the NIC on the server.
Set the server NIC to half-duplex.
Set the speed and duplex to match on both devices.
Power cycle both devices to reinitialize the autonegotiation process.
Set both the switch port and the server NIC to autonegotiate speed and duplex.
Change the cable that connects the server and the switch to a crossover cable.
36
Which protocol allows encryption of any application layer protocol?
FTP
FTPS
HTTPS
IPsec
Telnet
37
Which application can be delivered using UDP?
FTP
DNS
HTTP
SMTP
38
39
Which WAN service provides point-to-point connections with a predefined communications
path?
E1
T1
dialup
leased line
40
41
When selecting a WAN service, a customer estimates that it may need about 20 Mb/s of the
upstream bandwidth to support various server services on the Internet. Which WAN
connection should the network designer recommend?
T1
DSL
ATM
Frame Relay
fractional T3
42
The command copy tftp running-config has been entered on the router. What will this
command do?
copy the configuration in RAM to a server
copy the configuration file from a server to RAM
copy the configuration file in NVRAM to RAM
copy the configuration file in NVRAM to a server
copy the configuration file from a server to NVRAM
43
A company has formed a team that must analyze the probability of a disaster occurring and
the associated effects and costs to their business. Which step of the disaster recovery plan is
the team tasked with completing?
risk assessment
vulnerability assessment
disaster scenario prioritization
disaster recovery strategy development
44
Which statement correctly describes the function of AAA?
It prevents unauthorized access to a network.
It filters traffic based on destination IP and port number.
It enables users to send information to a daemon that is running on a management station.
It encrypts data to provide network security.
45
Which statement correctly describes the difference between HTTP and HTTPS?
The maximum number of simultaneous connections that a server can support for HTTPS is
more than for HTTP.
HTTPS and HTTP use different client request-server response processes.
HTTPS authenticates and encrypts the data being transferred between the client and the web
server.
HTTPS specifies the rules for passing data between the physical layer and the data link layer.
46
What routing protocol would be appropriate to use for exchanging routes between ISPs?
RIPv2
BGP
OSPF
EIGRP
47
A user reports being able to access the Internet but not being able to download e-mail from
the mail server at the ISP. What should the user check on the user workstation?
the POP3 and SMTP server settings in the e-mail application
the patch cable connections at the back of the workstation and at the wall plate
the DHCP settings in the operating system
the IP address, mask, and default gateway values
the NIC drivers
48
What is the primary function of a Level 1 support technician in an ISP help desk
department with multiple levels of customer support?
to install hardware replacements for the customer
to accompany an on-site technician to provide additional technical support
to diagnose and document the symptoms of hardware, software, and system problems
to design network enhancements that support the new technology requirements of the
customer
49
A user reports being unable to access the Internet. The help desk technician employs a
bottom-up approach to troubleshooting. The technician first has the user check the patch
cable connection from the PC to the wall, and then has the user verify that the NIC has a
green link light. What will the technician have the user do next?
Enter an IP address into the WWW browser address bar to see if DNS is at fault.
Use traceroute to identify the device along the path to the ISP that may be at fault.
Verify the IP address, subnet, and gateway settings using ipconfig on the PC.
Connect to the user home router to check firewall settings for blocked TCP ports.
51
A customer reports connectivity problems to an ISP technician. Upon questioning the
customer, the technician discovers that all network applications are functioning except for
FTP. What should the technician suspect is the problem?
misconfigured firewall
bad port on switch or hub
misconfigured IP addressing on the customer's workstation
wrong DNS server configured on the customer's workstation
wrong default gateway configured on the customer's workstation
52
What is used by a routing protocol to determine the best path to include in the routing
table?
Convergence time
Default distance
Metric
Type of router