You are on page 1of 20

1. A system administrator must provide Internet connectivity for ten hosts in a small remote office.

The ISP has


assigned two public IP addresses to this remote office. How can the system administrator configure the
router to provide Internet access to all ten users at the same time?
a. Configure DHCP and static NAT
b. Configure dynamic NAT for ten users
c. Configure static NAT for all ten users
d. Configure dynamic NAT with overload

2.
Refer to the exhibit. Router1 is not able to communicate with its peer that is connected to this interface.
Based on the output as shown, what is the most likely cause?
a. interface reset
b. unplugged cable
c. improper LMI type
d. PPP negotiation failure
3. What are two major characteristics of a worm? (Choose two)
a. exploits known vulnerabilities
b. attaches itself to another program
c. executed by a predefined time or event
d. masquerades as an accepted program
e. copies itself to the host and selects new targets
4. Which Frame Relay flow control mechanism is used to signal routers that they should reduce the flow rate of
frames?
a. DE
b. BE
c. CIR
d. FECN
e. CBIR
5.
Refer to the exhibit. From the output of the show interfaces commands, at which OSI layer is a fault
indicated?
a. Application
b. Transport
c. Network
d. Data link
e. Physical

6.
Refer to the exhibit. A VPN tunnel that uses IPsec has been established over the Frame Relay cloud between
the headquarters and the branch offices. An e-mail was sent from the headquarters office to all users at the
branch office. What portion of the e-mail traffic will be encapsulated by IPsec protocol?
a. the SMTP data only
b. the TCP segment, including SMTP header and data
c. the IP packet, including TCP and SMTP headers and data
d. the Frame Relay frame, including IP, TCP, and SMTP headers and data
7. What course of action will ensure data confidentiality?
a. Protect data from eavesdropping
b. Guarantee that no alterations are made to the data
c. Ensure that only authorized users may save the data
d. Prevent unauthorized users from logging into the data network
8. Which statement about a VPN is true?
a. VPN link establishment and maintenance is provided by LCP
b. DLCI addresses are used to identify each end of the VPN tunnel
c. VPNs use virtual Layer 3 connections that are routed through the Internet
d. Only IP packets can be encapsulated by a VPN for tunneling through the Internet
9. Which statement is true about wildcard masks?
a. Inverting the subnet mask will always create the wildcard mask
b. The wildcard mask performs the same function as a subnet mask
c. A network or subnet bit is identified by a "1" in the wildcard mask
d. IP address bits that must be checked are identified by a "0" in the wildcard mask
10. What are two main VPN components that protect data from eavesdropping? (Choose two)
a. checksum
b. digital certificates
c. encapsulation
d. encryption
e. hashing
11. An administrator issues the command confreg 0x2142 at the rommon 1> prompt. What is the effect when
this router is rebooted?
a. Contents in RAM will be erased
b. Contents in RAM will be ignored
c. Contents in NVRAM will be erased
d. Contents in NVRAM will be ignored
12. A network administrator is working with an applications team to fix a problem that a server based application
is having with response time. The administrator has examined the network portions of the data path and
identified several possible problem areas. The applications team has simultaneously identified potential
issues with the current release of software. The network administrator begins addressing the network issues
while the applications team implements software patches.
Which statement applies to this situation?
a. Changes to the network will reveal problems that are caused by the new patches
b. Scheduling will be more difficult if the network and software teams work independently
c. It will be difficult to isolate the problem if two teams are implementing changes independently
d. Results from changes will be easier to reconcile and document if each team works in isolation

13.
Refer to the exhibit. Based on the output as shown, which two statements correctly define how the router
will treat Telnet traffic that comes into interface FastEthernet 0/1? (Choose two)
a. Telnet to 172.16.10.0/24 is denied
b. Telnet to 172.16.20.0/24 is denied
c. Telnet to 172.16.0.0/24 is permitted
d. Telnet to 172.16.10.0/24 is permitted
e. Telnet to 172.16.20.0/24 is permitted
14. When Frame Relay encapsulation is used, what feature provides flow control and exchanges information
about the status of virtual circuits?
a. LCP
b. LMI
c. DLCI
d. Inverse ARP

15.
Refer to the exhibit. What is placed in the address field in the header of a frame that will travel from the
Orlando router to the DC router?
a. DLCI 123
b. DLCI 321
c. 10.10.10.25
d. 10.10.10.26
e. MAC address of the DC router

16.
Refer to the exhibit. Which data transmission technology is being represented?
a. TDM
b. PPP
c. HDLC
d. SLIP
17.
Refer to the exhibit. Why are the routers unable to establish a PPP session?
a. Interface serial 0/0/0 on CTRL must connect to interface serial 0/0/1 on BR_1
b. The CHAP passwords must be different on the two routers
c. The clock rate is configured on the wrong end of the link
d. The IP addresses are on different subnets
e. The usernames are misconfigured
18. What will be the result of adding the command ip dhcp excluded-address 10.10.4.1 10.10.4.5 to the
configuration of a local router that has been configured as a DHCP server?
a. Traffic that is destined for 10.10.4.1 and 10.10.4.5 will be dropped by the router
b. Traffic will not be routed from clients with addresses between 10.10.4.1 and 10.10.4.5
c. The DHCP server will not issue the addresses ranging from 10.10.4.1 to 10.10.4.5
d. The router will ignore all traffic that comes from the DHCP servers with addresses 10.10.4.1 and
10.10.4.5
19. A network administrator is tasked with maintaining two remote locations in the same city. Both locations use
the same service provider and have the same service plan for DSL service. When comparing download rates,
it is noticed that the location on the East side of town has a faster download rate than the location on the
West side of town. How can this be explained?
a. The West side has a high volume of POTS traffic
b. The West side of town is downloading larger packets
c. The service provider is closer to the location on the East side
d. More clients share a connection to the DSLAM on the West side
20. At what physical location does the responsibilty for a WAN connection change from the user to the service
provider?
a. demilitarized zone (DMZ)
b. demarcation point
c. local loop
d. cloud
21. Which combination of authentication and Layer 2 protocol should be used to establish a link between a Cisco
and a non-Cisco router without sending authentication information in plain text?
a. CHAP and HDLC
b. CHAP and PPP
c. PAP and HDLC
d. PAP and PPP
22.
Refer to the exhibit. Results of the show vlan and show vtp status commands for switches S1 and S2 are
displayed in the exhibit. VLAN 11 was created on S1. Why is VLAN 11 missing from S2?
a. There is a Layer 2 loop
b. The VTP domain names do not match
c. Only one switch can be in server mode
d. S2 has a higher spanning-tree priority for VLAN 11 than S1 does

23.
Refer to the exhibit. Which configuration command would result in the output in the exhibit?
a. ip nat inside source static 10.1.200.254 172.16.76.3
b. ip nat inside source static 10.1.200.254 192.168.0.10
c. ip nat inside source static 172.16.76.3 10.1.200.254
d. ip nat inside source static 172.16.76.3 192.168.0.10
e. ip nat inside source static 192.168.0.10 172.16.76.3
f. ip nat inside source static 192.168.0.10 10.1.200.254
24.
Refer to the exhibit. A technician is teaching a trainee to interpret the results of various Frame Relay
troubleshooting commands. What conclusion can be drawn from the output that is shown?
a. Neighboring routers should use DLCI 177 to reach the Branch router
b. DLCI 177 will be used to identify all broadcasts that are sent out the Branch router
c. The Branch router has the address 192.168.3.1 configured for the S0/0/0 interface
d. To reach 192.168.3.1, the Branch router will use the virtual circuit that is identified by DLCI 177
25. What does an access control list determine when used with NAT on a Cisco router?
a. addresses that are to be translated
b. addresses that are assigned to a NAT pool
c. addresses that are allowed out of the router
d. addresses that are accessible from the inside network

26.
Refer to the exhibit. Communication between two peers has failed. Based on the output that is shown, what
is the most likely cause?
a. interface reset
b. unplugged cable
c. improper LMI type
d. PPP negotiation failure
27. What is the function of an intrusion detection system on a network?
a. to restrict access to only authorized users
b. to detect attacks against a network and send logs to a management console
c. to prevents attack against the network and provide active defense mechanisms
d. to detect and prevent most viruses and many Trojan horse applications from spreading in the
network

28.
Refer to the exhibit. A network administrator is considering updating the IOS on Router1. What version of
IOS is currently installed on Router1?
a. 1
b. 12.4
c. 15
d. 1841
29. A network administrator is instructing a technician on best practices for applying ACLs. Which two
suggestions should the administrator provide? (Choose two)
a. Named ACLs are less efficient than numbered ACLs
b. Standard ACLs should be applied inside the core layer
c. Place standard ACLs as close to the destination as possible
d. ACLs applied to outbound interfaces require fewer router resources
e. Extended ACLs should be applied closest to the source that is specified by the ACL
30. An administrator is unable to receive e-mail. While troubleshooting the problem, the administrator is able to
ping the local mail server IP address successfully from a remote network and can successfully resolve the
mail server name to an IP address via the use of the nslookup command. At what OSI layer is the problem
most likely to be found?
a. physical layer
b. data link layer
c. network layer
d. application layer
31. Which encapsulation protocol when deployed on a Cisco router over a serial interface is only compatible with
another Cisco router?
a. PPP
b. SLIP
c. HDLC
d. Frame Relay
32.
Refer to the exhibit. A network administrator is tasked with completing the Frame Relay topology that
interconnects two remote sites. How should the point-to-point subinterfaces be configured on HQ to
complete the topology?
a. frame-relay interface-dlci 103 on Serial 0/0/0.1
frame-relay interface-dlci 203 on Serial 0/0/0.2
b. frame-relay interface-dlci 301 on Serial 0/0/0.1
frame-relay interface-dlci 302 on Serial 0/0/0.2
c. frame-relay map ip 192.168.1.1 103 broadcast on Serial 0/0/0.1
frame-relay map ip 192.168.2.2 203 broadcast on Serial 0/0/0.2
d. frame-relay map ip 192.168.1.1 301 broadcast on Serial 0/0/0.1
frame-relay map ip 192.168.2.2 302 broadcast on Serial 0/0/0.2

33.
Refer to the exhibit. An ACL called Managers already exists on this router. What happens if the network
administrator issues the commands as shown in the exhibit?
a. The commands are added to the end of the existing ACL
b. The existing Managers ACL will be overwritten by the new ACL
c. The router will output an error message and no changes will be made
d. A duplicate Managers ACL will be created that will contain only the new commands
34. A technician has been asked to run the Cisco SDM one-step lockdown on a customer router. What will be the
result of this process?
a. It will guarantee that the network is secure
b. It will implement all security configurations that Cisco AutoSecure offers
c. It will automatically apply all recommended security-related configuration changes
d. It will guarantee that all traffic is quarantined and checked for viruses before being forwarded
35.
Refer to the exhibit. The network administrator creates a standard access control list to prohibit traffic from
the 192.168.1.0/24 network from reaching the 192.168.2.0/24 network while still permitting Internet access
for all networks. On which router interface and in which direction should it be applied?
a. interface Fa0/0, inbound
b. interface Fa0/0, outbound
c. interface Fa0/1, inbound
d. interface Fa0/1, outbound

36. Refer to the


exhibit. RIPv2 has been configured on all routers in the network. Routers R1 and R3 have not received any
RIP routing updates. What will fix the issue?
a. Enable RIP authentication on R2
b. Issue the ip directed-broadcast command on R2
c. Change the subnet masks to 10.11.12.0/8 and 172.16.40.0/16 on R2
d. Enable CDP on R2 so that the other routers will receive routing updates
37.
Refer to the exhibit. All devices are configured as shown in the exhibit. PC1 is unable to ping the default
gateway. What is the cause of the problem?
a. The default gateway is in the wrong subnet
b. STP has blocked the port that PC1 is connected to
c. Port Fa0/2 on S2 is assigned to the wrong VLAN
d. S2 has the wrong IP address assigned to the VLAN30 interface
38. While configuring a router using RIPng and dual-stack technology with IPv4 and IPv6, the administrator
receives an error message when inputting IPv4 routes. What could cause the error message?
a. IPv4 is not compatible with RIPng
b. RIPng is incompatible with dual-stack technology
c. The router interfaces have been configured with incorrect addresses
d. When IPv4 and IPv6 are configured on the same interface, all IPv4 addresses are shut down in favor
of the newer technology

39.
Refer to the exhibit. A technician issues the show interface s0/0/0 command on R1 while troubleshooting
a network problem. What two conclusions can be determined by from the output shown? (Choose two)
a. The bandwidth has been set to the value of a T1 line
b. This interface should be configured for PPP encapsulation
c. There is no failure indicated in an OSI Layer 1 or Layer 2
d. The physical connection between the two routers has failed
e. The IP address of S0/0/0 is invalid, given the subnet mask being used
40. A network administrator has changed the VLAN configurations on his network switches over the past
weekend. How can the administrator determine if the additions and changes improved performance and
availability on the company intranet?
a. Conduct a performance test and compare with the baseline that was established previously
b. Interview departmental secretaries and determine if they think load time for web pages has improved
c. Determine performance on the intranet by monitoring load times of company web pages from remote
sites
d. Compare the hit counts on the company web server for the current week to the values that were
recorded in previous weeks
41. Which three guidelines would help contribute to creating a strong password policy? (Choose three)
a. Once a good password is created, do not change it
b. Deliberately misspell words when creating passwords
c. Create passwords that are at least 8 characters in length
d. Use combinations of upper case, lower case, and special characters
e. Write passwords in locations that can be easily retrieved to avoid being locked out
f. Use long words found in the dictionary to make passwords that are easy to remember
42. A technician is editing and reapplying ACL 115 to a router, what is the result of adding the command
access-list 115 permit tcp any 172.16.0.0 0.0.255.255 established to the ACL when it is reapplied to
the router?
a. All traffic that comes from 172.16.0.0/16 will be allowed
b. All TCP traffic that is destined for 172.16.0.0/16 is permitted
c. Any SYN packets that are sent to 172.16.0.0/16 will be permitted
d. Responses to traffic that originates from the 172.16.0.0/16 network are allowed
43. Which variable is permitted or denied by a standard access control list?
a. protocol type
b. source IP address
c. source MAC address
d. destination IP address
e. destination MAC address
44. What are three attributes of a security policy? (Choose three)
a. It provides step-by-step procedures to harden routers and other network devices.
b. It defines acceptable and unacceptable use of network resources
c. It focuses primarily on attacks from outside of the organization
d. It defines a process for managing security violations
e. It should not need to be altered once implemented
f. It creates a basis for legal action if necessary
45.
Refer to the exhibit. Which statement correctly describes how Router1 processes an FTP request that enters
interface s0/0/0 and is destined for an FTP server at IP address 192.168.1.5?
a. The router matches the incoming packet to the statement that was created by the access-list 201
deny icmp 192.168.1.0 0.0.0.255 any command, continues comparing the packet to the
remaining statements in ACL 201 to ensure that no subsequent statements allow FTP, and then the
router drops the packet.
b. The router reaches the end of ACL 101 without matching a condition and drops the packet because
there is no statement that was created by the access-list 101 permit ip any any command.
c. The router matches the incoming packet to the statement that was created by the access-list 101
permit ip any 192.168.1.0 0.0.0.255 command and allows the packet into the router.
d. It matches the incoming packet to the statement that was created by the access-list 201 permit ip
any any command and allows the packet into the router.

46.
Refer to the exhibit. R1 is performing NAT overload for the 10.1.1.0/24 inside network. Host A has sent a
packet to Web Server. What is the destination IP address of the return packet from Web Server when
received at R1?
a. 10.1.1.2:80
b. 10.1.1.2:1234
c. 172.30.20.1:1234
d. 172.30.20.1:3333

47.
Refer to the exhibit. A network administrator is attempting to configure a Frame Relay network. The
administrator enters the commands as shown in the exhibit on R2, but the Frame Relay PVCs are inactive.
What is the problem?
a. The incorrect DLCI numbers are being configured on R2
b. The S0/0/0 interface on R2 needs to be point-to-point
c. The frame-relay map commands are missing the cisco keyword at the end
d. A single router interface cannot connect to more than one Frame Relay peer at a time

48.
Refer to the exhibit. Which option displays the correct ACL that would need to be applied inbound on the
S0/0/0 interface on R2 in order to permit any type of network traffic and block all FTP traffic coming from
hosts on the 172.16.10.0/24 network going to the Internet?

a.

b.
c.

d.
49. Which option correctly defines the capacity through the local loop guaranteed to a customer by the service
provider?
a. BE
b. DE
c. CIR
d. CBIR
50. Which additional functionality is available on an interface when the encapsulation is changed from HDLC to
PPP?
a. flow control
b. error control
c. authentication
d. synchronous communication

51. Refer to the


exhibit. A network administrator has issued the commands that are shown on Router1 and Router2. A later
review of the routing tables reveals that neither router is learning the LAN network of the neighbor router.
What is most likely the problem with the RIPng configuration?
a. The serial interfaces are in different subnets
b. The RIPng process is not enabled on interfaces
c. The RIPng processes do not match between Router1 and Router2
d. The RIPng network command is missing from the IPv6 RIP configuration
52. Why is serial communication preferred over parallel communication for long distance WAN links?
a. Serial cables contain a single wire, resulting in faster transmission speeds
b. Serial cables can take advantage of clock skew to increase the rate of transmission
c. Parallel cables are more susceptible to crosstalk, resulting in more retransmissions
d. Parallel cables send a single bit at a time making them slower than serial cables
53. Which three guidelines would help contribute to creating a strong password policy? (Choose three.)
a. Once a good password is created, do not change it
b. Deliberately misspell words when creating passwords
c. Create passwords that are at least 8 characters in length
d. Use combinations of upper case, lower case, and special characters
e. Write passwords in locations that can be easily retrieved to avoid being locked out
f. Use long words found in the dictionary to make passwords that are easy to remember
54. Which combination of Layer 2 protocol and authentication should be used to establish a link without sending
authentication information in plain text between a Cisco and a non-Cisco router?
a. PPP with PAP
b. PPP with CHAP
c. HDLC with PAP
d. HDLC with CHAP
55. When NAT is in use, what is used to determine the addresses that can be translated on a Cisco router?
a. access control list
b. routing protocol
c. inbound interface
d. ARP cache
56. Which method is most effective in protecting the routing information that is propagated between routers on
the network?
a. Disable IP source routing
b. Configure passive interfaces
c. Configure routing protocol authentication
d. Secure administrative lines with Secure Shell
57. A network administrator has moved the company intranet web server from a switch port to a dedicated
router interface. How can the administrator determine how this change has affected performance and
availability on the company intranet?
a. Conduct a performance test and compare with the baseline that was established previously
b. Determine performance on the intranet by monitoring load times of company web pages from remote
sites
c. Interview departmental administrative assistants and determine if they think load time for web pages
has improved
d. Compare the hit counts on the company web server for the current week to the values that were
recorded in previous weeks
58. An issue of response time has recently arisen on an application server. The new release of a software
package has also been installed on the server. The configuration of the network has changed recently. To
identify the problem, individuals from both teams responsible for the recent changes begin to investigate the
source of the problem. Which statement applies to this situation?
a. Scheduling will be easy if the network and software teams work independently
b. It will be difficult to isolate the problem if two teams are implementing changes independently
c. Results from changes will be easier to reconcile and document if each team works in isolation
d. Only results from the software package should be tested as the network is designed to accommodate
the proposed software platform
59. What is a characteristic feature of a worm?
a. exploits a known vulnerability
b. attaches to executable programs
c. masquerades as a legitmate program
d. lies dormant until triggered by an event, time, or date
60. What are two main components of data confidentiality? (Choose two.)
a. checksum
b. digital certificates
c. encapsulation
d. encryption
e. hashing
61. What are two LCP options that can be configured for PPP? (Choose two.)
a. EAP
b. CHAP
c. IPCP
d. CDPCP
e. Stacker
62. Which two statements are true about creating and applying access lists? (Choose two.)
a. There is an implicit deny at the end of all access lists
b. One access list per port, per protocol, per direction is permitted
c. Access list entries should filter in the order from general to specific
d. The term "inbound" refers to traffic that enters the network from the router interface where the ACL
is applied
e. Standard ACLs should be applied closest to the source while extended ACLs should be applied closest
to the destination
63. Which type of ACL will permit traffic inbound into a private network only if an outbound session has already
been established between the source and destination?
a. Extended
b. Reflexive
c. Standard
d. Time-based
64. A network administrator is instructing a technician on best practices for applying ACLs. Which suggestion
should the administrator provide?
a. Named ACLs are less efficient than numbered ACLs
b. Standard ACLs should be applied closest to the core laye
c. ACLs applied to outbound interfaces are the most efficient
d. Extended ACLs should be applied closest to the source that is specified by the ACL
65. What can a network administrator do to recover from a lost router password?
a. use the copy tftp: flash: command
b. boot the router to bootROM mode and enter the b command to load the IOS manually
c. telnet from another router and issue the show running-config command to view the password
d. boot the router to ROM monitor mode and configure the router to ignore the startup configuration
when it initializes
66. A technician is talking to a colleague at a rival company and comparing DSL transfer rates between the two
companies. Both companies are in the same city, use the same service provider, and have the same
rate/service plan. What is the explanation for why company 1 reports higher download speeds than company
2 reports?
a. Company 1 only uses microfilters at branch locations
b. Company 1 has a lower volume of POTS traffic than company 2 has
c. Company 2 is located farther from the service provider than company 1 is
d. Company 2 shares the connection to the DSLAM with more clients than company 1 shares with
67. Which two statements are true about IPv6? (Choose two.)
a. Security options are build into IPv6
b. IPv6 addresses require less router overhead to process
c. IPv6 can only be configured on an interface that does not have IPv4 on it
d. There is no way to translate between IPv4 addresses and IPv6 addresses
e. When enabled on a router, IPv6 can automatically configure link-local IPv6 addresses on all
interfaces
68. A technician has been asked to run Cisco SDM one-step lockdown on the router of a customer. What will be
the result of this process?
a. Traffic is only forwarded from SDM-trusted Cisco routers
b. Security testing is performed and the results are saved as a text file stored in NVRAM
c. The router is tested for potential security problems and any necessary changes are made
d. All traffic entering the router is quarantined and checked for viruses before being forwarded
69. When a Frame Relay connection is being configured, under which condition should the command frame-
relay map be used?
a. when the remote router is a non-Cisco router
b. when the local router is configured with subinterfaces
c. when globally significant rather than locally significant DLCIs are being used
d. when the local router and the remote router are using different LMI protocols
70. Which statement is true about PAP in the authentication of a PPP session?
a. PAP uses a two-way handshake
b. The password is unique and rando
c. PAP conducts periodic password challenges
d. PAP uses MD5 hashing to keep the password secure
71. Which IEEE 802.16 broadband wireless technology allows users to connect to the ISP at speeds comparable
to DSL and cable?
a. Wi-Fi
b. Satellite
c. WiMAX
d. Metro Ethernet
72. An administrator is configuring a dual stack router with IPv6 and IPv4 using RIPng. The administrator
receives an error message when trying to enter the IPv4 routes into RIPng. What is the cause of the
problem?
a. When IPv4 and IPv6 are configured on the same interface, all IPv4 addresses are over-written in
favor of the newer technology
b. Incorrect IPv4 addresses are entered on the router interfaces
c. RIPng is incompatible with dual-stack technology
d. IPv4 is incompatible with RIPng
73. What three statements describe the roles of devices in a WAN? (Choose three.)
a. A CSU/DSU terminates a digital local loop
b. A modem terminates a digital local loop
c. A CSU/DSU terminates an analog local loop
d. A modem terminates an analog local loop
e. A router is commonly considered a DTE device
f. A router is commonly considered a DCE device
74. What is the result when the command permit tcp 192.168.4.0 0.0.3.255 any eq telnet is entered in an
access control list and applied on the inbound interface of a router?
a. All traffic that originates from 192.168.4.0/24 is permitted
b. All TCP traffic is permitted, and all other traffic is denied
c. All Telnet traffic from the 192.168.0.0/16 network is permitted
d. All traffic from the 192.168.4.0/22 network is permitted on TCP port 23
75. Which characteristic of VPN technology prevents the contents of data communications from being read by
unauthorized parties?
a. QoS
b. Latency
c. Reliability
d. Confidentiality
76. Which statement accurately describes a characteristic of a security policy?
a. It creates a basis for legal action if necessary
b. It should not need altering once it is implemented
c. It provides step-by-step procedures to harden routers and other network devices
d. It is kept private from users to prevent the possibility of circumvention of security measures
77. Which security solution has the responsibility of monitoring suspicious processes that are running on a host
and that might indicate infection of Trojan horse applications?
a. antivirus application
b. operating system patches
c. intrusion prevention system
d. Cisco Adaptive Security Appliance
78. Where does a service provider assume responsibility from a customer for a WAN connection?
a. local loop
b. DTE cable on router
c. demarcation point
d. demilitarized zone
79. Which statement is true about NCP?
a. Link termination is the responsibility of NCP
b. Each network protocol has a corresponding NCP
c. NCP establishes the initial link between PPP devices
d. NCP tests the link to ensure that the link quality is sufficient
80. Which data link layer encapsulation protocol is used by default for serial connections between two Cisco
routers?
a. ATM
b. Frame Relay
c. HDLC
d. PPP
e. SDLC
81. A company is looking for a WAN solution to connect its headquarters site to four remote sites. What are two
advantages that dedicated leased lines provide compared to a shared Frame Relay solution? (Choose two.)
a. reduced jitter
b. reduced costs
c. reduced latency
d. the ability to burst above guaranteed bandwidth
e. the ability to borrow unused bandwidth from the leased lines of other customers
82. Which three statements are true about IPv6? (Choose three.)
a. It is not possible to translate between IPv4 and IPv6 addresses
b. IPv6 can only be configured on interfaces that have IPv4 enabled
c. An IPv6 address has a simplified header compared to an IPv4 address
d. DHCPv6 offers the capability of automatic allocation of reusable network addresses to IPv6 nodes
e. Link-local IPv6 addresses are required on all interfaces in order to route traffic between networks
f. The ipv6 address interface configuration command will automatically configure link-local IPv6
addresses on that interface
83. What is the result when the command permit tcp 10.25.132.0 0.0.0.255 any eq smtp is added to a
named access control list and applied on the inbound interface of a router?
a. TCP traffic with a destination to the 10.25.132.0/24 is permitted
b. Only Telnet traffic is permitted to the 10.24.132.0/24 network
c. Traffic from 10.25.132.0/24 is permitted to anywhere on using any port
d. Traffic using port 25 from the 10.25.132.0/24 is permitted to all destinations
84. When configuring a Frame Relay connection, what is the purpose of Inverse ARP?
a. to assign a DLCI to a remote peer
b. to disable peer requests from determining local Layer 3 addresses
c. to negotiate LMI encapsulations between local and remote Frame Relay peers
d. to create a mapping of DLCI to Layer 3 addresses that belong to remote peers
85. Which two protocols in combination should be used to establish a link with secure authentication between a
Cisco and a non-Cisco router? (Choose two.)
a. HDLC
b. PPP
c. SLIP
d. PAP
e. CHAP
86. A light manufacturing company wishes to replace its DSL service with a non-line-of-sight broadband wireless
solution that offers comparable speeds. Which solution should the customer choose?
a. Wi-Fi
b. Satellite
c. WiMAX
d. Metro Ethernet
87. What can a network administrator do to recover a lost router password?
a. Boot the router into ROM monitor mode and reinstall the IOS from a TFTP server
b. Access the router remotely through Telnet, and use the show running-config command
c. Reboot the router and use the Ctrl-Break key stroke to bypass the password during IOS bootup
d. From ROM monitor mode, configure the router to ignore the startup configuration when it initializes
88.

You might also like