You are on page 1of 11


 


1


Which
mechanism
is
used
to
create
a
floating
static
route?



 administrative
distance



 cost



 hop
count



 passive
interface


2
 


Which
is
true
regarding
Frame
Relay
LMI?



 The
LMI
type
must
be
manually
configured.



 LMI
is
a
signalling
standard
between
two
DCE
devices.



 There
are
three
LMI
types
standardized
by
ANSI,
ITU‐T,
and
Cisco.



 Routers
at
each
end
of
a
Frame
Relay
virtual
circuit
must
always
use
the

same
LMI
type.


3
 



Refer
to
the
exhibit.
The
complete
configuration
of
a
Frame
Relay
interface
on
the

Chicago
router
is
shown.
How
does
the
Chicago
router
know
which
DLCI
is
mapped

to
the
IP
address
of
the
remote
router?



 DE



 CIR



 FECN



 Inverse
ARP


4
 


Which
bit
is
set
by
a
Frame
Relay
switch
to
inform
the
source
station
that
there
is

congestion
on
the
network?



 BECN



 CIR



 DE



 FCS



 FECN


5
 


Which
two
statements
about
split
tunnels
are
true?
(Choose
two.)



 Local
LAN
printing
will
use
the
VPN
tunnel.



 The
traffic
load
on
the
VPN
server
is
increased.



 Traffic
to
the
corporate
network
will
be
encrypted.



 There
is
a
reduced
security
risk
to
the
corporate
network.



 All
traffic
travels
across
the
VPN
tunnel
from
client
to
server.



 Traffic
to
public
web
sites
and
general
Internet
navigation
is
not
encrypted.



6
 



Refer
to
the
exhibit.
Two
directly
connected
routers
are
unable
to
ping
each
other

through
the
only
active
serial
interfaces.
What
is
the
problem?



 The
IP
addressing
scheme
is
incorrect.



 Loopbacks
should
be
set
on
R1
and
R2.



 PPP
encapsulation
needs
to
be
configured
on
R1.



 The
bandwidth
settings
must
be
the
same
on
R1
and
R2.



 A
no
shutdown
command
needs
to
be
configured
on
both
serial
interfaces.



7
 


When
identifying
VPN
requirements
for
endpoint
users,
what
care
must
be
taken
to

protect
the
network
when
remote
users
log
in
from
unsecured
public
locations?



 Ensure
that
VPN
user
traffic
does
not
traverse
the
public
network.



 Ensure
that
the
VPN
user
traffic
does
not
slow
down
internally
sourced

traffic
on
the
network.



 Ensure
that
VPN
traffic
accessing
internal
network
devices
is
filtered
before

it
is
unencrypted.



 Ensure
that
the
incoming
data
from
a
VPN
client
is
unencrypted
before

reaching
the
VPN
endpoint.



 Ensure
that
remote
users
can
only
access
network
resources
that
are

appropriate
to
their
job
function.


8
 


What
are
two
components
a
network
designer
considers
when
planning
a
VPN?

(Choose
two.)



 encryption
algorithm
for
privacy
and
security



 encapsulation
protocol
to
use
when
creating
the
VPN
tunnel



 switching
technology
to
optimize
VPN
WAN
throughput



 tunneling
technology
for
guarding
against
data
corruption



 routing
protocol
on
the
gateway
for
optimum
performance


9
 


What
tool
can
help
ease
the
configuration
of
VPN
servers
on
routers?



 Cisco
SDM



 PIX
Firewall



 Cisco
VPN
Concentrator



 Cisco
Adaptive
Security
Appliances



10
 



Refer
to
the
exhibit.
What
is
placed
in
the
address
field
of
a
frame
that
will
travel

from
the
Orlando
office
to
the
DC
office?



 MAC
address
of
the
Orlando
router



 MAC
address
of
the
DC
router



 192.168.1.25



 192.168.1.26



 DLCI
100



 DLCI
200


11
 


A
network
administrator
issued
the
command
show
frame‐relay
pvc.
The
response

from
the
router
shows
the
status
of
a
PVC
as
deleted.
What
is
the
reason
for
this

status?



 The
DLCI
is
using
the
wrong
LMI
type.



 The
DLCI
is
usable
but
has
little
activity.



 The
DLCI
is
programmed
in
the
switch
but
the
circuit
is
not
usable.



 The
DLCI
configured
on
the
CPE
device
does
not
match
the
DLCI
on
the

interface.



12
 


IPSec
operates
at
which
layer
of
the
OSI
model?



 application



 network



 datalink



 transport


13
 


Which
three
algorithms
can
be
used
to
encrypt
user
data
in
an
IPSec
VPN

framework?
(Choose
three.)



 3DES



 AES



 Diffie‐Hellman



 DES



 ESP



 SHA


14
 


A
company
uses
serial
interfaces
on
its
border
router
to
connect
to
branch
offices

through
WAN
connections.
The
security
policy
dictates
that
the
encapsulation

should
use
PPP
with
authentication
protocol
CHAP.
Which
statement
is
true
about

the
configuration
requirement
of
CHAP?



 Both
the
username
and
password
are
case
sensitive.



 Neither
the
username
nor
the
password
is
case
sensitive.



 The
username
is
case
sensitive
but
the
password
is
not
case
sensitive.



 The
password
is
case
sensitive
but
the
username
is
not
case
sensitive.



15
 



Refer
to
the
exhibit.
What
statement
is
true
about
the
configuration
shown
for
R2?



 R2
is
configured
as
the
Frame
Relay
switch.



 R2
is
configured
as
the
main
site
in
a
multipoint
Frame
Relay
WAN

prototype.



 R2
is
configured
as
the
main
site
in
a
point‐to‐point
Frame
Relay
WAN

prototype.



 R2
is
configured
as
a
remote
site
in
a
multipoint
Frame
Relay
WAN

prototype.



 R2
is
configured
as
a
remote
site
in
a
point‐to‐point
Frame
Relay
WAN

prototype.


16
 


What
is
used
to
identify
the
path
to
the
next
Frame
Relay
switch
in
a
Frame
Relay

network?



 CIR



 DLCI



 FECN



 BECN



17
 


Which
two
statements
are
true
regarding
VPN
security?
(Choose
two.)



 Users
may
only
establish
a
VPN
connection
from
secure
locations
and
never

from
public
areas.



 Users
that
connect
to
a
network
through
a
VPN
do
not
have
to
log
in
to

resources
on
the
network.



 Users
that
connect
to
a
network
through
a
VPN
are
are
considered
trusted

users
on
the
network.



 Users
may
establish
a
VPN
connection
from
unsecure
locations
such
as

airports
and
hotel
lobbies.



 Users
that
connect
to
a
network
through
a
VPN
should
have
access
to
all
the

resources
on
the
network.


18
 


Which
PVC
status
suggests
that
the
router
recognizes
the
DLCI
configured
on
its

interface
as
being
present
on
the
Frame
Relay
switch,
but
the
PVC
associated
with

the
DLCI
is
not
capable
of
end‐to‐end
communication?



 active



 deleted



 inactive


 idle



19
 


Which
statement
identifies
the
IP
address
design
for
subinterfaces
that
are

configured
for
a
Frame
Relay
network?



 Multipoint
configurations
require
the
IP
address
of
each
subinterface
on
each

router
to
be
in
its
own
subnet.



 Multipoint
configurations
require
IP
addresses
for
each
subinterface
on
each

router
to
be
a
part
of
the
same
subnet.



 Point‐to‐point
configurations
require
IP
addresses
for
each
subinterface
on

each
router
to
be
a
part
of
the
same
subnet.



 Point‐to‐point
configurations
do
not
require
IP
addresses
on
each

subinterface
on
each
router.



 Multipoint
configurations
do
not
require
IP
addresses
on
each
subinterface

on
each
router.


20
 



Refer
to
the
exhibit.
Which
router
command
is
used
to
associate
a
Layer
2
address

with
the
corresponding
Layer
3
address?



 Miller(config‐if)#
frame‐relay
map
ip
172.16.150.1
110



 Miller(config‐if)#
frame‐relay
map
ip
172.16.150.1
112



 Miller(config‐if)#
frame‐relay
map
ip
172.16.150.2
110



 Miller(config‐if)#
frame‐relay
map
ip
172.16.150.2
112


21
 


An
IP
address
has
been
assigned
to
the
S0/0/0
interface
of
a
new
Cisco
router.
The

administrator
wishes
to
quickly
test
basic
connectivity
with
the
serial
interface
of
an

adjoining
Cisco
router
via
the
use
of
the
default
WAN
protocol.
Which
WAN
protocol

will
be
used
for
this
test?



 PPP



 Frame
Relay



 DSL



 HDLC



 ATM


22
 


What
is
one
benefit
of
using
a
network
simulation
software
package?



 The
network
design
can
be
tested
before
it
is
actually
implemented.



 Simulation
software
packages
are
quickly
updated
to
support
new
network

technologies
and
devices.



 Simulated
devices
have
the
same
features
as
actual
devices,
allowing
for

detection
of
all
potential
problems.



 Software
packages
can
simulate
all
possible
network
traffic
conditions,
giving

an
accurate
prediction
of
network
performance.

23
 


Two
directly
connected
routers
are
able
to
ping
each
other
through
the
Serial
0/0/0

interfaces.
A
network
administrator
changes
the
encapsulation
on
one
router
to

PPP,
and
the
other
is
left
at
the
default
value.
What
statement
would
appear
in
the

output
of
the
show
interfaces
command
issued
on
one
of
the
routers?



 Serial
0/0/0
is
up,
line
protocol
is
up



 Serial
0/0/0
is
down,
line
protocol
is
down



 Serial
0/0/0
is
up,
line
protocol
is
down



 Serial
0/0/0
is
down,
line
protocol
is
up



 Serial
0/0/0
is
administratively
down,
line
protocol
is
down

24
 


What
statement
correctly
defines
the
purpose
of
the
split
horizon
rule?



 marks
the
route
unreachable
in
a
routing
update
that
is
sent
to
other
routers



 limits
the
number
of
subinterfaces
that
can
be
associated
with
one
physical

interface



 prevents
routers
from
advertising
a
network
through
the
interface
from

which
the
update
came



 limits
the
number
of
hops
a
packet
can
traverse
through
the
network
before

it
should
be
discarded



 prevents
routers
from
accepting
higher
cost
routes
to
networks
previously

marked
as
inaccessible
before
the
timer
expires


You might also like