CCENT
D
Which option is a valid hostname for a switch? A. 5witch-Cisco B. Switch-Cisco! C. 5witchCisc0 D. SwitchCisc0
D
For security reasons, information about RTA, including platform and IP addresses, should not be accessible from the Internet. This information should, however, be accessible to devices on the internal networks of RTA. Which command or series of commands will accomplish these objectives? A. RTA(config)#no cdp run B. RTA(config)#no cdp enable C. RTA(config)#interface s0/0 RTA(config-if)#no cdp run D. RTA(config)#interface s0/0 RTA(config-if)#no cdp enable
C
From which of the following attacks can Message Authentication Code (MAC) shield your network? A. DoS B. DDoS C. spoofing D. SYN floods
D
HQ# configure terminal HQ(config)# interface fastethernet 0/0 HQ(config-if)#ip address 192.168.1.17 255.255.255.0 HQ(config-if)#no shutdown HQ(config-if)#interface serial 0/0 HQ(config-if)#ip address 192.168.1.65 255.255.255.240 HQ(config-if)#no shutdown % 192.168.1.0 overlaps with FastEthernet0/0 After configuring two interfaces on the HQ router, the network administrator notices an error message. What must be done to fix this error? A. The serial interface must be configured first. B. The serial interface must use the address 192.168.1.2 C. The subnet mask of the serial interface should be changed to 255.255.255.0 D. The subnet mask of the FastEthernet interface should be changed to 255.255.255.240 E. The address of the FastEthernet interface should be changed to 192.168.1.66
B
Host A can communicate with Host B but not with Hosts C or D. How can the network administrator solve this problem? A. Configure Hosts C and D with IP addresses in the 192.168.2.0 network. B. Install a router and configure a route to route between VLANs 2 and 3. C. Install a second switch and put Hosts C and D on that switch while Hosts A and B remain on the original switch. D. Enable the VLAN trunking protocol on the switch.
B
How can you ensure that only the MAC address of a server is allowed by switch port Fa0/1? A. Configure port Fa0/1 to accept connections only from the static IP address of the server. B. Configure the server MAC address as a static entry of port security. C. Use a proprietary connector type on Fa0/1 that is incomputable with other host connectors. D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
B
How many addresses will be available for dynamic NAT translation when a router is configured with the following commands? Router(config)#ip nat pool TAME 209.165.201.23 209.165.201.30 netmask 255.255.255.224 Router(config)#ip nat inside source list 9 pool TAME A. 7 B. 8 C. 9 D. 10 E. 24 F. 32
D
Which MTU size can cause a baby giant error? A. 1500 B. 9216 C. 1600 D. 1518
D
Which NTP command configures the local device as an NTP reference clock source? A. ntp peer B. ntp broadcast C. ntp master D. ntp server
A
Which OSI layer are VLAN's on? A. Layer 2 B. Layer 3 C. Layer 5 D. Layer 7
A
Which RFC was created to alleviate the depletion of IPv4 public address? A. RFC 1918 B. RFC 4193 C. RFC 1519 D. RFC 1631
D
Which RFC was created to alleviate the depletion of IPv4 public addresses A. RFC 4193 B. RFC 1519 C. RFC 1518 D. RFC 1918
A
Which command means NAT 1 to many? A. overload B. pool C. enable D. disable
A
Which component of the routing table ranks routing protocols according to their preferences? A. administrative distance B. next hop C. metric D. routing protocol code
B
Which destination IP address can a host use to send one message to multiple devices across different subnets? A. 127.0.0.1 B. 239.3.1.25 C. 172.16.2.2 D. 192.168.1.
D
Which function allows an administrator to route multiple VLAN's on a router? A. IEEE 802.1X B. HSRP C. port channel D. router on a stick
A
Which is a dynamic routing protocol that uses hop counts as a metric? A. RIP B. BGP C. IS-IS D. EIGRP
A
Which of the following is Cisco best practice for switchport security? A. Vacant ports are shutdown B. Vacant ports have passwords C. Occupied ports are shutdown D. Occupied ports are placed in a native VLAN
A
Which of the following is true about routing protocols? A. OSPF is a link-state protocol B. RIP is a link state protocol C. BGP uses static routes D. EIGRP is unreliable
C
Which of the following is true of the default switch configuration for remote access of a Cisco switch? A. The password is password B. The telnet password is set to telnet C. There is no default gateway defined D. An IP address is preconfigured
A,C
Which of the following statements are TRUE regarding Cisco access lists? (Choose two.) A. In an inbound access list, packets are filtered as they enter an interface. B. In an inbound access list, packets are filtered before they exit an interface. C. Extended access lists are used to filter protocol-specific packets. D. You must specify a deny statement at the end of each access list to filter unwanted traffic. E. When a line is added to an existing access list, it is inserted at the beginning of the access list.
D
Which protocol verifies connectivity between switches that are configure with IP addresses in the same network? A. VTP B. HSRP C. STP D. ICMP
A
Which route source code represent the routing protocol with a default administration distance of 90 in the routing table? A. D B. R C. S D. O E. E
D
Which routing protocol has the lowest administrative distance? A. IBGP B. RIP C. OSPF D. EIGRP
D
Which routing protocol has the smallest default administrative distance? A. IRGP B. OSPF C. IS-IS D. EIGRP E. RIP
A
Which statement about native VLAN traffic is true? A. Cisco Discovery Protocol traffic travels on the native VLAN by default. B. Traffic on the native VLAN is tagged with 1 by default. C. Control plane traffic is blocked on the native VLAN. D. The native VLAN is typically disabled for security reasons.
A
Which statement about router on a stick is correct? A. It uses multiple sub interfaces of a nick card to encapsulate traffic for different VLANs. B. It requires the Native VLAN to be up C. It uses multiple sub interfaces of a single interface to encapsulate traffic for different VLANs on the same subnet. D. Its data plane routes traffic for a single VLAN over two or more switches.
D
2 routers have had their start up configuration cleared and have been restarted. At a minimum, which command would the administrator do to enable CDP to exchange information between R1 and R2? (Pick one) A. Configure IP addressing and no shutdown command on both the R1 and R2 fa0/1 interfaces. B. Configure IP addressing and no shutdown commands on either of the R1 or R2 fa0/1 interfaces. C. Configure the router with the CDP enable command D. Enter no shutdown commands on the R1 and R2 fa0/1 interfaces
C
A TFTP server has recently been installed in the Atlanta office. The network administrator is located in the NY office and has made a console connection to the NY router. After establishing the connection they are unable to backup the configuration file and IOS of the NY router to the TFTP server. What is the cause of this problem? A. The NY router has an incorrect subnet mask. B. The TFTP server has an incorrect IP address. C. The TFTP server has an incorrect subnet mask. D. The network administrator computer has an incorrect IP address.
A,C,F
A company has placed a networked PC in a lobby so guests can have access to the corporate directory. A security concern is that someone will disconnect the directory PC and re-connect their laptop computer and have access to the corporate network. For the port servicing the lobby, which three configuration steps should be performed on the switch to prevent this? (Choose three.) A. Enable port security. B. Create the port as a trunk port. C. Create the port as an access port. D. Create the port as a protected port. E. Set the port security aging time to 0. F. Statically assign the MAC address to the address table. G. Configure the switch to discover new MAC addresses after a set time of inactivity.
B,C
A company wants to use NAT in the network shown. Which commands will apply the NAT configuration to the proper interfaces? (Choose two.) A. R1(config)# interface serial0/1 R1(config-if)# ip nat inside B. R1(config)# interface serial0/1 R1(config-if)# ip nat outside C. R1(config)# interface fastethernet0/0 R1(config-if)# ip nat inside D. R1(config)# interface fastethernet0/0 R1(config-if)# ip nat outside E. R1(config)# interface serial0/1 R1(config-if)# ip nat outside source pool 200.2.2.18 255.255.255.252 F. R1(config)# interface fastethernet0/0 R1(config-if)# ip nat inside source 10.10.0.0 255.255.255.0
B
A network administrator cannot connect to a remote router by using SSH. Part of the show interfaces command is shown. router#show interfaces Serial0/1/0 is up, line protocol is down At which OSI layer should the administrator begin troubleshooting? A. physical B. data link C. network D. transport
C
A network administrator has configured a Catalyst 2950 switch for remote management by pasting into the console the configuration commands that are shown in the exhibit. However, a Telnet session cannot be successfully established from a remote host. What should be done to fix this problem? A. Change the first line to interface fastethernet 0/1. B. Change the first line to interface vlan 0/1. C. Change the fifth line to ip default-gateway 192.168.17.241. D. Change the fifth line to ip route 0.0.0.0 0.0.0.0 192.168.17.1. E. Change the sixth line to line con 0.
C
A network administrator is troubleshooting a connectivity problem on the serial interfaces. The output from the show interfaces command on both routers shows that the serial interface is up, line protocol is down. Given the partial output for the show running-config in the exhibit, what is the most likely cause of this problem? A. The serial cable is bad. B. The MTU is incorrectly configured. C. The Layer 2 framing is misconfigured. D. The IP addresses are not in the same subnet.
C
A network technician is asked to design a small network with redundancy. The exhibit represents this design, with all hosts configured in the same VLAN. What conclusions can be made about this design? A. This design will function as intended. B. Spanning-tree will need to be used. C. The router will not accept the addressing scheme. D. The connection between switches should be a trunk. E. The router interfaces must be encapsulated with the 802.1Q protocol.
D
A person is trying to send a file from a host on Network A of the JAX Company to a server on Network Z of the XYZ Company. The file transfer fails. The host on Network A can communicate with other hosts on Network A. Which command, issued from router RTA, would be the most useful for troubleshooting this problem? A. show flash: B. show history C. show version D. show interfaces E. show controllers serial
D
A problem with network connectivity has been observed. It is suspected that the cable connected to switch port Fa0/9 on Switch1 is disconnected. What would be an effect of this cable being disconnected? A. Host B would not be able to access the server in VLAN9 until the cable is reconnected. B. Communication between VLAN3 and the other VLANs would be disabled. C. The transfer of files from Host B to the server in VLAN9 would be significantly slower. D. For less than a minute, Host B would not be able to access the server in VLAN9. Then normal network function would resume.
A
A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session? A. decrease the window size B. use a different source port for the session C. decrease the sequence number D. obtain a new IP address from the DHCP server E. start a new session using UDP
C
A technician pastes the configurations in the exhibit into the two new routers shown. Otherwise, the routers are configured with their default configurations. A ping from Host1 to Host 2 fails, but the technician is able to ping the S0/0 interface of R2 from Host 1. The configurations of the hosts have been verified as correct. What could be the cause of the problem? A. The serial cable on R1 needs to be replaced. B. The interfaces on R2 are not configured properly C. R1 has no route to the 192.168.1.128 network. D. The IP addressing scheme has overlapping subnetworks. E. The ip subnet-zero command must be configured on both routers.
C
A user cannot reach any web sites on the Internet, but others in the department are not having a problem. What is the most likely cause of the problem? A. IP routing is not enabled. B. The default gateway is not in the same subnet. C. A DNS server address is not reachable by the PC. D. A DHCP server address is not reachable by the PC. E. NAT has not been configured on the router that connects to the Internet.
C
After the power-on-self test (POST), the system LED of a Cisco 2950 switch turns amber. What is the status of the switch? A. The POST was successful. B. The switch has a problem with the internal power supply and needs an external power supply to be attached. C. POST failed and there is a problem that prevents the operating system from being loaded. D. The switch has experienced an internal problem but data can still be forwarded at a slower rate. E. The switch passed POST, but all the switch ports are busy.
C
An administrator cannot connect from R1 to R2. To troubleshoot this problem, the administrator has entered the command shown in the exhibit. Based on the output shown, what could be the problem? A. The serial interface is configured for half duplex. B. The serial interface does not have a cable attached. C. The serial interface has the wrong type of cable attached. D. The serial interface is configured for the wrong frame size. E. The serial interface has a full buffer.
A
An administrator has connected devices to a switch and, for security reasons, wants the dynamically learned MAC addresses from the address table added to the running configuration. What must be done to accomplish this? A. Enable port security and use the keyword sticky. B. Set the switchport mode to trunk and save the running configuration. C. Use the switchport protected command to have the MAC addresses added to the configuration. D. Use the no switchport port-security command to allow MAC addresses to be added to the configuration.
A
An administrator replaced the 10/100 Mb NIC in a desktop PC with a 1 Gb NIC and now the PC will not connect to the network. The administrator began troubleshooting on the switch. Using the switch output shown, what is the cause of the problem? A. Speed is set to 100Mb/s. B. Input flow control is off. C. Encapsulation is set to ARPA. D. The port is administratively down. E. The counters have never been cleared.
B
Configuration of which option is required on a cisco switch for Cisco IP Phone to work? A. A Voice VLAN ID in interface and global configuration mode B. The interface as access and allow the voice VLAN ID C. Cisco Discovery protocol D. PortFast on the interface
A
Examine the DHCP configuration between R2 and R3, R2 is configured as the DHCP server and R3 as the client. What is the reason R3 is not receiving the IP address via DHCP? A. On R3, DHCP is not enabled on the interface that is connected to R2. B. On R3, the interface that is connected to R2 is in shutdown condition. C. On R2, the interface that is connected to R3 is in shutdown condition. D. On R2, the network statement in the DHCP pool configuration is incorrectly configured.
B
If a host experiences intermittent issues that relate to congestion within a network while remaining connected, what could cause congestion on this LAN? A. half-duplex operation B. broadcast storms C. network segmentation D. multicasting
C
In the configuration of NAT, what does the keyword overload signify? A. When bandwidth is insufficient, some hosts will not be allowed to access network translation. B. The pool of IP addresses has been exhausted. C. Multiple internal hosts will use one IP address to access external network resources. D. If the number of available IP addresses is exceeded, excess traffic will use the specified address pool.
3, 4, 5, 6, 2
Match the appropriate command on the left to the configuration task it accomplishes. (Not all options are used.)
5, 6, 4, 1, 2
Match the definition on the left to the protocol on the right.
NAT, DHCP, DNS, OSPF
Match the protocol or service on the left to a situation on the right where it would be used.(Not all options are used.)
A
On a Cisco switch, which protocol determines if an attached VoIP phone is from Cisco or from another vendor? A. CDP B. RTP C. UDP D. TCP
D
R1 router clock is synchronized with ISP router. R2 is supposed to receive NTP updates from R1. But you observe that R2 clock is not synchronized with R1. What is the reason R2 is not receiving NTP updates from R1? A. R1 router Ethernet interface that is connected to R2 is placed in shutdown condition. B. R2 router Ethernet interface that is connected to R1 is placed in shutdown condition. C. The NTP server command not configured on R2 router. D. The IP address that is used in the NTP configuration on R2 router is incorrect.
D
RTR1# show ru %Ambiguous command: "show ru" RTR1# Why did the device return this message? A. The command requires additional options or parameters B. There is no show command that starts with ru. C. The command is being executed from the wrong router mode. D. There is more than one show command that starts with the letters ru.
A
RTR1# telnet 10.3.1.2 Trying 10.3.1.2....Open Password required but none set [Connection to 10.3.1.2 closed by foreign host] RTR1# Why was this message received? A. No VTY password has been set. B. No enable password has been set. C. No console password has been set. D. No enable secret password has been set. E. The login command has not been set on CON 0 F. The login command has not been set on the VTY ports.
D
Refer to the following output: Router#configure terminal Router(config)#vlan 10 Router(config-vlan)# do show vlan Which statement is true about the effect of this configuration? A. VLAN 10 will participate in spanning tree B. VLAN 10 VTP configuration is displayed C. VLAN 10 config will be saved when the router exits VLAN config mode D. VLAN 10 will be added to the VLAN database
D
Results of testing from the host: Ping 127.0.0.1-successful Ping 10.0.0.35-successful Ping 10.0.0.35-unsuccessful Ping 10.5.75.250-unsuccessful A technician is troubleshooting a host connectivity problem. The host is unable to ping a server connected to Switch_A. Based on the results of the testing, what could be the problem? A. A remote physical layer problem exists. B. The host NIC is not functioning. C. TCP/IP has not been correctly installed on the host. D. A local physical layer problem exists.
A
Serial 0/0 does not respond to a ping request from a host on the FastEthernet 0/0 LAN. How can this problem be corrected? A. Enable the Serial 0/0 interface. B. Correct the IP address for Serial 0/0. C. Correct the IP address for FastEthernet 0/0 D. Change the encapsulation type on Serial 0/0 E. Enable autoconfiguration on the Serial 0/0 interface
E
The DHCP settings have recently been changed on the DHCP server and the client is no longer able to reach network resources. What should be done to correct this situation? A. Verify that the DNS server address is correct in the DHCP pool. B. Ping the default gateway to populate the ARP cache. C. Use the tracert command on the DHCP client to first determine where the problem is located. D. Clear all DHCP leases on the router to prevent address conflicts. E. Issue the ipconfig command with the /release and /renew options in a command window.
B
The following commands are entered on the router: What is the purpose of the last command entered? A. to require the user to enter an encrypted password during the login process B. to prevent the vty, console, and enable passwords from being displayed in plain text in the configuration files C. to encrypt the enable secret password D. to provide login encryption services between hosts attached to the router
C
The ip helper-address command does what? A. assigns an IP address to a host B. resolves an IP address from a DNS server C. relays a DHCP request across networks D. resolves an IP address overlapping issue
A,C,E
The junior network support staff provided the diagram as a recommended configuration for the first phase of a four-phase network expansion project. The entire network expansion will have over 1000 users on 14 network segments and has been allocated this IP address space. 192.168.1.1 through 192.168.5.255 192.168.100.1 through 192.168.100.255 What are three problems with this design? (Choose three.) A. The AREA 1 IP address space is inadequate for the number of users. B. The AREA 3 IP address space is inadequate for the number of users. C. AREA 2 could use a mask of /25 to conserve IP address space. D. The network address space that is provided requires a single network-wide mask. E. The router-to-router connection is wasting address space. F. The broadcast domain in AREA 1 is too large for IP to function.
B
The network administrator is testing connectivity from the branch router to the newly installed application server. What is the most likely reason for the first ping having a success rate of only 60 percent? A. The network is likely to be congested, with the result that packets are being intermittently dropped. B. The branch router had to resolve the application server MAC address. C. There is a short delay while NAT translates the server IP address. D. A routing table lookup delayed forwarding on the first two ping packets. E. The branch router LAN interface should be upgraded to FastEthernet.
C,E
The network administrator is using a Windows PC application that is called putty.exe for remote communication to a switch for network troubleshooting. Which two protocols could be used during this communication? (Choose two.) A. SNMP B. HTTP C. Telnet D. RMON E. SSH
B
The network administrator made the entries that are shown and then saved the configuration. From a console connection, what password or password sequence is required for the administrator to access privileged mode on Router1? A. cisco B. sanfran C. sanjose D. either cisco or sanfran E. either cisco or sanjose F. sanjose and sanfran
C
The remote networks 172.16.10.0, 172.16.20.0, and 172.16.30.0 are accessed through the Central router's serial 0/0 interface. No users are able to access 172.16.20.0. After reviewing the command output shown in the graphic, what is the most likely cause of the problem? A. no gateway of last resort on Central B. Central router's not receiving 172.16.20.0 update C. incorrect static route for 172.16.20.0 D. 172.16.20.0 not located in Central's routing table
B
Two routers are connected by their serial interfaces as shown in the exhibit, but there is no data connectivity between them. The RTRA is known to have a correct configuration. Given the partial configurations shown in the exhibit, what is the problem on the router B that is causing the lack of connectivity? A. A loopback is not set. B. The IP address is incorrect. C. The subnet mask is incorrect. D. The serial line encapsulations are incompatible. E. The maximum transmission unit (MTU) size is too large. F. The bandwidth setting is incompatible with the connected interface.
B,D,F
The two connected ports on the switch are not turning orange or green. What would be the most effective steps to troubleshoot this physical layer problem? (Choose three.) A. Ensure that the Ethernet encapsulations match on the interconnected router and switch ports. B. Ensure that cables A and B are straight-through cables. C. Ensure cable A is plugged into a trunk port. D. Ensure the switch has power. E. Reboot all of the devices. F. Reseat all cables.
A
Users complain that they are unable to reach internet sites. You are troubleshooting internet connectivity problem at main office. Which statement correctly identifies the problem on Router R1? A. NAT configurations on the interfaces are incorrectly configured B. NAT translation statement incorrectly configured. C. Interesting traffic for NAT ACL is incorrectly configured. D. Only static NAT translation configured from the server, missing Dynamic NAT or Dynamic NAT overloading for internal networks.
ARP, ICMP,DNS,DHCP
Various protocols are listed on the left. On the right are applications for the use of those protocols. Match the protocol on the left to an associated function for that protocol on the right. (Not all options are used.)
A
What NAT command can be applied to an interface? A. IP NAT inside B. NAT pool C. IP NAT outside source D. NAT Pool secure
A,B,C
What are three characteristics of CDP? A. It is Cisco proprietary B. It will discover directly connected Cisco neighbors C. It operates at the Data Link Layer D. It discovers non-connected Cisco nieghbors
B,D
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.) A. Allow unrestricted access to the console or VTY ports. B. Use a firewall to restrict access from the outside to the network devices. C. Always use Telnet to access the device command line because its data is automatically encrypted. D. Use SSH or another encrypted and authenticated transport to access device configurations. E. Prevent the loss of passwords by disabling password encryption.
A
What device would connect to a network using either single or double radios? A. WAP B. Switch C. Router D. Hub
A
What do you use to connect two switches and tag VLAN traffic? A. 802.1Q B. VTP C. ARP D. STP
D
What does the "Inside Global" address represent in the configuration of NAT? A. the summarized address for all of the internal subnetted addresses B. the MAC address of the router used by inside hosts to connect to the Internet C. a globally unique, private IP address assigned to a host on the inside network D. a registered address that represents an inside host to an outside network
A
What feature prevents routing protocols from sending LSA A. passive-interface B. hello timer C. dead times D. Poke-mon go
B
What feature will disable CEF? A. IP redirect B. ACL logging C. Multicast D. RIB
A
What happens when computers on a private network attempt to connect to the Internet through a Cisco router running PAT? A. The router uses the same IP address but a different TCP source port number for each connection. B. An IP address is assigned based on the priority of the computer requesting the connection. C. The router selects an address from a pool of one-to-one address mappings held in the lookup table. D. The router assigns a unique IP address from a pool of legally registered addresses for the duration of the connection.
E
What is the effect of using the service password-encryption command? A. Only the enable password will be encrypted. B. Only the enable secret password will be encrypted. C. Only passwords configured after the command has been entered will be encrypted. D. It will encrypt the secret password and remove the enable secret password from the configuration. E. It will encrypt all current and future passwords.
A
What is the purpose of the following switchport command? Switch(config-if)# switchport port-security maximum 1 Switch(config-if)# switchport port-security mac-address 0018.DE8B.4BF8 A. It ensures that only the device with the MAC address 0018.DE8B.4BF8 will be able to connect to the port that is being configured. B. It informs the switch that traffic destined for MAC address 0018.DE8B.4BF8 should only be sent to the port that is being configured. C. It will act like an access list and the port will filter packets that have a source or destination MAC of 0018.DE8B.4BF8. D. The switch will shut down the port of any traffic with source MAC address of 0018.DE8B.4BF8.
B
What is the value indicated by the next hop in a routing table? A. Exit interface for forwarding the packets B. IP address of the remote router for forwarding packets C. Prefrence of the route source D. How the route was learned
B
What should be part of a comprehensive network security plan? A. Allow users to develop their own approach to network security. B. Physically secure network equipment from potential access by unauthorized individuals. C. Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten. D. Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported. E. Minimize network overhead by deactivating automatic antivirus client updates.
A
When a router makes a routing decision for a packet that is received from one network and destined to another, which portion of the packet does it replace? A. Layer 2 frame header and trailer B. Layer 3 IP address C. Layer 5 session D. Layer 4 protocol
A
When are static routes useful? A. within stub networks B. across ISP's C. when dynamic routes are to complicated to configure D. when you don't want to have to do alot of routing table maintenance
D
When configuring NAT, the Internet interface is considered to be what? A. local B. inside C. global D. outside
D
When we configure DHCP on either a Cisco router or Cisco Switch A. You must manually configure DNS on each client B. Two host computers may be assigned the same IP C. The domain name must be configured locally on each host PC D. It supports a DNS server for use by each DHCP client
AB
Which "Show " Interface command will show that an interface is down (choose 2) A. show ip interface B. show ip interface brief C. show version D. show dhcp status
B
Which statement describes the effect of the overload keyword in the: ip nat inside source list 90interface Ethernet 0/0 overload. A. Addresses the match access list 90 are translated through PAT to the IP address of the Ethernet0/0 interface. B. Hosts that match access list inside are translated to the address in the Ethernet 0/0 network. C. Hosts on the Ethernet 0/0 LAN are translated to the address poll in access list 90. D. Addresses that match access list 90 are translated to the IP address of the Ethernet 0/0 interface.
A
Which table displays the known MAC addresses on a Cisco switch? A. CAM B. MAC C. ARP D. NAT
A
Which technology would you use to route IPv6 over IPv4? A. 6 to 4 tunneling B. dual stack C. PAT D. NAT
B
Which value is indicated by the next hop in a routing table? A. preference of the route source B. IP address of the remote router for forwarding the packets C. how the route was learned D. exit interface IP address for forwarding the packets
A
Which would you use to segregate broadcast traffic between 2 departments? A. VLAN B. VTP C. RIP D. STP
C
Why applications that are installed on PC's in R2 LAN network 10.100.20.0/24 are unable to communicate with Server1? A. A standard ACL statement that is configured on R1 is blocking the traffic sourced from R2 LAN network. B. A standard ACL statement that is configured on R1 is blocking the traffic sourced from Server1 network. C. A standard ACL statement that is configured on R2 is blocking the traffic sourced from Server1 network. D. A standard ACL statement that is configured on R2 is blocking the traffic sourced from R2 LAN network.
B
Why would a network administrator configure port security on a switch? A. to prevent unauthorized Telnet access to a switch port B. to prevent unauthorized hosts from accessing the LAN C. to limit the number of Layer 2 broadcasts on a particular switch port D. block unauthorized access to the switch management interfaces
B
You have a 48 port switch with 4 VLAN's configured on it. Which is true? A. There are 4 collision domains and 48 broadcast domains B. There are 48 collision domains and 4 broadcast domains C. There are 4 collision domains and 4 broadcast domains D. There are 48 collision domains and 48 broadcast domains
B
You have consoled in to the above devices. Which of the following is true regarding the configuration of Switch1? A. only 5 simultaneous remote connections are possible B. remote connections using ssh will require a username and password C. only connections from the local network will be possible D. console access to SwitchA requires a password
A,C
You have consoled in to the above devices. Which two of the following are true regarding the configuration of Router1? (Choose two.) A. at least 5 simultaneous remote connections are possible B. only telnet protocol connections to Router1 are supported C. remote connections to Router1 using telnet will succeed D. console line connections will never time out due to inactivity E. since DHCP is not used on FaO/1 there is not a need to use the NAT protocol
A,B,D
You have consoled into the above devices. Select three options which are security issues with the current configuration of Switch1. (Choose three.) A. privilege mode is protected with an unencrypted password B. inappropriate wording in banner message C. virtual terminal lines are protected only by a password requirement D. both the username and password are weak E. telnet connections can be used to remotely manage the switch F. cisco user will be granted privilege level 15 by default
B,D
You have consoled into the following devices. Select two options which are security Issues which need to be modified before Router1 is used? (Choose two.) A. unencrypted weak password is configured to protect privilege mode B. inappropriate wording in banner message C. the virtual terminal lines have a weak password configured D. virtual terminal lines have a password, but it will not be used E. configuration supports un-secure web server access