Professional Documents
Culture Documents
1
Which mechanism is used to create a floating static route?
administrative distance
cost
hop count
passive interface
2
Which is true regarding Frame Relay LMI?
The LMI type must be manually configured.
LMI is a signalling standard between two DCE devices.
There are three LMI types standardized by ANSI, ITU‐T, and Cisco.
Routers
at
each
end
of
a
Frame
Relay
virtual
circuit
must
always
use
the
same
LMI
type.
3
Refer
to
the
exhibit.
The
complete
configuration
of
a
Frame
Relay
interface
on
the
Chicago
router
is
shown.
How
does
the
Chicago
router
know
which
DLCI
is
mapped
to
the
IP
address
of
the
remote
router?
DE
CIR
FECN
Inverse
ARP
4
Which
bit
is
set
by
a
Frame
Relay
switch
to
inform
the
source
station
that
there
is
congestion
on
the
network?
BECN
CIR
DE
FCS
FECN
5
Which two statements about split tunnels are true? (Choose two.)
Local LAN printing will use the VPN tunnel.
The traffic load on the VPN server is increased.
Traffic to the corporate network will be encrypted.
There is a reduced security risk to the corporate network.
All traffic travels across the VPN tunnel from client to server.
Traffic to public web sites and general Internet navigation is not encrypted.
6
Refer
to
the
exhibit.
Two
directly
connected
routers
are
unable
to
ping
each
other
through
the
only
active
serial
interfaces.
What
is
the
problem?
The IP addressing scheme is incorrect.
Loopbacks should be set on R1 and R2.
PPP encapsulation needs to be configured on R1.
The bandwidth settings must be the same on R1 and R2.
A no shutdown command needs to be configured on both serial interfaces.
7
When
identifying
VPN
requirements
for
endpoint
users,
what
care
must
be
taken
to
protect
the
network
when
remote
users
log
in
from
unsecured
public
locations?
Ensure that VPN user traffic does not traverse the public network.
Ensure
that
the
VPN
user
traffic
does
not
slow
down
internally
sourced
traffic
on
the
network.
Ensure
that
VPN
traffic
accessing
internal
network
devices
is
filtered
before
it
is
unencrypted.
Ensure
that
the
incoming
data
from
a
VPN
client
is
unencrypted
before
reaching
the
VPN
endpoint.
Ensure
that
remote
users
can
only
access
network
resources
that
are
appropriate
to
their
job
function.
8
What
are
two
components
a
network
designer
considers
when
planning
a
VPN?
(Choose
two.)
encryption algorithm for privacy and security
encapsulation protocol to use when creating the VPN tunnel
switching technology to optimize VPN WAN throughput
tunneling technology for guarding against data corruption
routing
protocol
on
the
gateway
for
optimum
performance
9
What tool can help ease the configuration of VPN servers on routers?
Cisco SDM
PIX Firewall
Cisco VPN Concentrator
Cisco Adaptive Security Appliances
10
Refer
to
the
exhibit.
What
is
placed
in
the
address
field
of
a
frame
that
will
travel
from
the
Orlando
office
to
the
DC
office?
MAC address of the Orlando router
MAC address of the DC router
192.168.1.25
192.168.1.26
DLCI 100
DLCI 200
11
A
network
administrator
issued
the
command
show
frame‐relay
pvc.
The
response
from
the
router
shows
the
status
of
a
PVC
as
deleted.
What
is
the
reason
for
this
status?
The DLCI is using the wrong LMI type.
The DLCI is usable but has little activity.
The DLCI is programmed in the switch but the circuit is not usable.
The
DLCI
configured
on
the
CPE
device
does
not
match
the
DLCI
on
the
interface.
12
IPSec operates at which layer of the OSI model?
application
network
datalink
transport
13
Which
three
algorithms
can
be
used
to
encrypt
user
data
in
an
IPSec
VPN
framework?
(Choose
three.)
3DES
AES
Diffie‐Hellman
DES
ESP
SHA
14
A
company
uses
serial
interfaces
on
its
border
router
to
connect
to
branch
offices
through
WAN
connections.
The
security
policy
dictates
that
the
encapsulation
should
use
PPP
with
authentication
protocol
CHAP.
Which
statement
is
true
about
the
configuration
requirement
of
CHAP?
Both the username and password are case sensitive.
Neither the username nor the password is case sensitive.
The username is case sensitive but the password is not case sensitive.
The password is case sensitive but the username is not case sensitive.
15
Refer to the exhibit. What statement is true about the configuration shown for R2?
R2 is configured as the Frame Relay switch.
R2
is
configured
as
the
main
site
in
a
multipoint
Frame
Relay
WAN
prototype.
R2
is
configured
as
the
main
site
in
a
point‐to‐point
Frame
Relay
WAN
prototype.
R2
is
configured
as
a
remote
site
in
a
multipoint
Frame
Relay
WAN
prototype.
R2
is
configured
as
a
remote
site
in
a
point‐to‐point
Frame
Relay
WAN
prototype.
16
What
is
used
to
identify
the
path
to
the
next
Frame
Relay
switch
in
a
Frame
Relay
network?
CIR
DLCI
FECN
BECN
17
Which two statements are true regarding VPN security? (Choose two.)
Users
may
only
establish
a
VPN
connection
from
secure
locations
and
never
from
public
areas.
Users
that
connect
to
a
network
through
a
VPN
do
not
have
to
log
in
to
resources
on
the
network.
Users
that
connect
to
a
network
through
a
VPN
are
are
considered
trusted
users
on
the
network.
Users
may
establish
a
VPN
connection
from
unsecure
locations
such
as
airports
and
hotel
lobbies.
Users
that
connect
to
a
network
through
a
VPN
should
have
access
to
all
the
resources
on
the
network.
18
Which
PVC
status
suggests
that
the
router
recognizes
the
DLCI
configured
on
its
interface
as
being
present
on
the
Frame
Relay
switch,
but
the
PVC
associated
with
the
DLCI
is
not
capable
of
end‐to‐end
communication?
active
deleted
inactive
idle
19
Which
statement
identifies
the
IP
address
design
for
subinterfaces
that
are
configured
for
a
Frame
Relay
network?
Multipoint
configurations
require
the
IP
address
of
each
subinterface
on
each
router
to
be
in
its
own
subnet.
Multipoint
configurations
require
IP
addresses
for
each
subinterface
on
each
router
to
be
a
part
of
the
same
subnet.
Point‐to‐point
configurations
require
IP
addresses
for
each
subinterface
on
each
router
to
be
a
part
of
the
same
subnet.
Point‐to‐point
configurations
do
not
require
IP
addresses
on
each
subinterface
on
each
router.
Multipoint
configurations
do
not
require
IP
addresses
on
each
subinterface
on
each
router.
20
Refer
to
the
exhibit.
Which
router
command
is
used
to
associate
a
Layer
2
address
with
the
corresponding
Layer
3
address?
Miller(config‐if)# frame‐relay map ip 172.16.150.1 110
Miller(config‐if)# frame‐relay map ip 172.16.150.1 112
Miller(config‐if)# frame‐relay map ip 172.16.150.2 110
Miller(config‐if)#
frame‐relay
map
ip
172.16.150.2
112
21
An
IP
address
has
been
assigned
to
the
S0/0/0
interface
of
a
new
Cisco
router.
The
administrator
wishes
to
quickly
test
basic
connectivity
with
the
serial
interface
of
an
adjoining
Cisco
router
via
the
use
of
the
default
WAN
protocol.
Which
WAN
protocol
will
be
used
for
this
test?
PPP
Frame Relay
DSL
HDLC
ATM
22
What is one benefit of using a network simulation software package?
The network design can be tested before it is actually implemented.
Simulation
software
packages
are
quickly
updated
to
support
new
network
technologies
and
devices.
Simulated
devices
have
the
same
features
as
actual
devices,
allowing
for
detection
of
all
potential
problems.
Software
packages
can
simulate
all
possible
network
traffic
conditions,
giving
an
accurate
prediction
of
network
performance.
23
Two
directly
connected
routers
are
able
to
ping
each
other
through
the
Serial
0/0/0
interfaces.
A
network
administrator
changes
the
encapsulation
on
one
router
to
PPP,
and
the
other
is
left
at
the
default
value.
What
statement
would
appear
in
the
output
of
the
show
interfaces
command
issued
on
one
of
the
routers?
Serial 0/0/0 is up, line protocol is up
Serial 0/0/0 is down, line protocol is down
Serial 0/0/0 is up, line protocol is down
Serial 0/0/0 is down, line protocol is up
Serial
0/0/0
is
administratively
down,
line
protocol
is
down
24
What statement correctly defines the purpose of the split horizon rule?
marks the route unreachable in a routing update that is sent to other routers
limits
the
number
of
subinterfaces
that
can
be
associated
with
one
physical
interface
prevents
routers
from
advertising
a
network
through
the
interface
from
which
the
update
came
limits
the
number
of
hops
a
packet
can
traverse
through
the
network
before
it
should
be
discarded
prevents
routers
from
accepting
higher
cost
routes
to
networks
previously
marked
as
inaccessible
before
the
timer
expires