dslreports logo
site
 
    All Forums Hot Topics Gallery
spc

spacer




how-to block ads


Search Topic:
uniqs
6248
share rss forum feed


Dtag14

@comcast.net

[CCNA] Will someone help me by answering some questions

1
A company has help desk staff that is not highly trained in VPNs. What two features or technologies must the network designer identify as training needs in order for the help desk to support secure remote access for teleworkers? (Choose two.)
QoS operation
VLAN configuration
tunneling protocols
IPv6 and IPv4 dual stack
encryption algorithms
Frame Relay configuration

2

Refer to the exhibit. An extended ACL has been created to deny traffic from host 192.168.20.254 to the web server with IP address 209.165.201.30. However, host 192.168.20.254 is allowed access to all resources on network 192.168.30.0/24. According to Cisco best practices, where should the ACL be applied?
ISP Fa0/0 inbound
ISP Fa0/0 outbound
ISP S0/0/0 inbound
R2 Fa0/0 inbound
R2 Fa0/0 outbound
R2 S0/1/0 outbound

3
The network designer recommends using RSTP in the design of a new data center. There are multiple redundant Layer 2 switches and links contained in the new design. What is the benefit of using RSTP rather than STP in this situation?
Redundant links are not blocked.
Routing tables converge more quickly.
Spanning Tree convergence times are reduced.
Fewer redundant links are required to maintain connectivity.

4

Refer to the exhibit. A networking company designer is reviewing a diagram of a customer network. What two risks or issues can be identified in the topology that is shown? (Choose two.)
The firewall router represents a single point of failure.
A failure of either switch that connects the Cisco Call Manager to the network will cause the entire IP telephony system to fail.
Using Layer 3 switches to interconnect the data center servers to the IP phones introduces too much delay.
The IP phones need to be redundantly connected to the switches to prevent single points of failure at the access layer.
The DMZ may be vulnerable to attack from the Internet.

5

Refer to the exhibit. What can be concluded from the output that is shown?
MDF_2811 has a MAC address of 2294:300F:0000.
Device C3750-24_IDF2 is running Cisco IOS Software Release 12.3(23)SEE2.
A Cisco 3750 switch is connected to the FastEthernet1/0/1 port on MDF_2811.
MDF_2811 is installed in the main distribution facility on floor 28 of building 11.

6
A technician adds the command Router(config-router)# variance 5 to a router using EIGRP as the routing protocol. What is the result of entering this command?
enables unequal cost load balancing
adjusts the metric of all EIGRP routes to 5
restricts the number of EIGRP feasible successor routes to 5
activates the use of all K values in the composite metric calculation
enables EIGRP equal cost load balancing over a maximum of 5 routes

7
A network administrator has configured Frame Relay on a serial interface and issued the show interfaces serial command. The output shows that the interface is up and the line protocol is up. However, pings to the remote router across the link fail. What should the next step be to ensure that the IP address of the remote router appears in the Frame Relay map table of the local router?
Configure the router using the no inverse-arp command.
Ensure that the LMI type is correct for the circuit.
Configure the router using the frame-relay map ip command.
Verify that the remote router has Frame Relay encapsulation enabled.

8

Refer to the exhibit. A network administrator is configuring a new router to provide routing between VLANs. The administrator removes the router from the box and connects the Fa0/0 interface to a trunking port on the switch. After the configuration is applied to the router, as shown in the exhibit, the traffic between VLANs fails. What is causing this to occur?
The R1 router needs a routing protocol configured.
The subinterfaces of the R1 router should have IP addresses applied.
The R1 router needs three additional Fast Ethernet interfaces installed.
The subinterfaces of the R1 router should be configured in the same VLAN.

9
After a WIC is installed in a two-slot router, the network engineer issues the show running-config command, but the newly installed interfaces in the WIC cannot be seen in the router output. What is a possible reason why the newly installed interfaces are not shown?
The new interfaces are in a shutdown state.
The WIC was put into slot 0 instead of slot 1.
The WIC was not pushed completely into the slot.
The show running-config command cannot be used to validate the presence of installed interfaces.

10
Which WLAN operational feature can be configured as non-broadcast in order to increase the security of an enterprise WLAN for employees?
SSID
WEP keys
VLAN parameters
WPA encryption keys
VPN authentication information

11
When a proposal for a network implementation is being finalized, which two sections of the proposal would provide relevant information that is required to update the Executive Summary? (Choose two.)
cost proposal
logical design
physical design
implementation plan
terms and signatures
current network environment

12

Refer to the exhibit. What is the spanning-tree role of all the enabled interfaces of SW11?
alternate
backup
designated
root

13

Refer to the exhibit. The network administrator wishes to use the Cisco Feature Navigator to choose a Cisco IOS image to install on a router that will allow VoIP functionality. Based on the output of the show version command, which statement accurately describes the ability of the router to run the Cisco IOS image selected?
There is enough DRAM and flash.
There is enough DRAM but not enough flash.
There is not enough DRAM but there is enough flash.
There is not enough DRAM and flash.

14
What is a main function of the distribution layer in a hierarchically designed network?
enforce access control policies
provide access to the DMZ for external users
provide a high-speed, low-latency backbone
serve as a network connection point for end-user devices

15

Refer to the exhibit. What can the field engineer conclude about the EIGRP authentication between Router1 and Router2?
Authentication will fail because only one key is configured.
Authentication will succeed and EIGRP updates can be exchanged.
Authentication will fail because the key chain names do not match.
Authentication will fail because the key chain names must match the router names.
1

Refer to the exhibit. What does the JAX router do with traffic that is destined for a web server with an IP address of 192.168.10.24?
The traffic is sent out Serial0/0/0.
The router sends the traffic out all interfaces other than the one on which it arrived.
A request is sent to neighboring routers for paths to the 192.168.10.0 network.
The packet will be discarded because RIPv1 does not support VLSM.
The traffic is sent out FastEthernet0/0.

2

Refer to the exhibit. What can the field engineer conclude about the EIGRP authentication between Router1 and Router2?
Authentication will fail because only one key is configured.
Authentication will succeed and EIGRP updates can be exchanged.
Authentication will fail because the key chain names do not match.
Authentication will fail because the key chain names must match the router names.

3
The network infrastructure of the main campus in an organization consists of network devices from multiple vendors. The routing protocol currently being used is RIPv1, but the organization needs a protocol that will support VLSM and CIDR, with infrequent routing updates to reduce traffic. Which routing protocol should be selected for the network?
BGP
EIGRP
OSPF
RIPv2

4

Refer to the exhibit. During a test of an EIGRP prototype network, a network administrator issues a show ip protocols command. What two facts can be determined from the output? (Choose two.)
The administrative distance is 100.
This router has one adjacent neighbor.
There are 10 Cisco devices in this prototype network.
The auto-summary command was applied on this router.
EIGRP is using two values for the calculation of the composite metric.
EIGRP on this router will display up to four unequal cost routes to the same destination.

5
A small office with ten employees needs to provide external customer access to an office Web server. It also requires filtered access to the Internet for its employees. What device would best serve their needs?
standalone access points with separate VLANs for customers and employees
core layer router with software based firewall set
dedicated firewall appliance with DMZ capabilities
SOHO router with IOS firewall feature set to filter traffic in and out of the company

6

Refer to the exhibit. To demonstrate the importance of summarizing IP addressing in a hierarchical network, a network designer uses a simulator to configure a prototype network. Which EIGRP configuration commands should the designer enter on router RA to correctly advertise a single summary route of the campus LANs to router ISP?








7
A network engineer is prototyping a new IP addressing and summarization strategy for a new network that will be integrated into the existing infrastructure. Which method is appropriate for testing the addressing scheme?
using the production network of the customer
using actual network equipment in a lab
using the Cisco Network Assistant
using a network simulation tool

8
What are two suggested best practices to implement when securing network devices? (Choose two.)
Configure VLAN 1 as the native VLAN.
Disable unused ports on switches.
Enable SSH and disable Telnet.
Consolidate guest traffic and internal employee traffic.
Ensure that logs are stored locally on routers.

9
When configuring Frame Relay, what identifies a virtual circuit to the WAN switch?
LMI
CPE
PVC
DLCI

10
A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. The technician asks the caller to talk to nearby users to see if other machines are affected. The caller reports that several immediate neighbors in the same department have a similar problem and that they cannot ping each other. Those who are seated in other departments have connectivity. What should the technician check as the first step in troubleshooting the issue?
the power outlet to the PC that is used by the caller.
the trunks between switches in the wiring closet.
the status of the departmental workgroup switch in the wiring closet.
the cable that connects the PC of the caller to the network jack.
the cable connection between a PC and a network outlet that is used by a neighbor.

11
A network technician needs to install a four-port switch module in an operational Cisco 1841 router that has an available HWIC slot. What should the technician do first?
Turn off the power to the router before installing the new module.
Install the hot-swappable four-port switch module directly into slot 1 of the 1841.
Move the existing WIC-2T module to slot 1 and install the four-port module in slot 0.
Shut down all Fast Ethernet ports on the router until the switch module installation is complete.

12
A network administrator of a middle-sized company is asked to upgrade the routing protocol of the network to support VLSM and route summarization. The current company network contains both Cisco and non-Cisco routers. Which routing protocol should be used for the upgrade?
BGP
RIPv1
RIPv2
EIGRP

13
What functionality does NBAR provide to network technicians?
provides data which can be used to create a network diagram
allows for monitoring and managing network devices
allows for classification and monitoring of network traffic
displays the IOS versions and IP addresses on neighboring devices

14
Which WLAN operational feature can be configured as non-broadcast in order to increase the security of an enterprise WLAN for employees?
SSID
WEP keys
VLAN parameters
WPA encryption keys
VPN authentication information

15

Refer to the exhibit. What is the spanning-tree role of all the enabled interfaces of SW11?
alternate
backup
designated
root



sashwa
Premium,Mod
join:2001-01-29
Alcatraz
kudos:17

I think you need to do your own homework. How else are you going to learn?