You are on page 1of 9

Question 1 0 out of 0 points

What are two requirements for configuring inter-VLAN routing using the router-on-a-stick model? (Choose two.)
Selected Each subinterface should be configured with its own IP address, subnet mask, and unique
Answers: VLAN assignment.
The physical interface of the router must be connected to a trunk link on the adjacent
switch.

Question
0 out of 0 points
2
Refer to the image on the handout issued to you from the proctor Image
14
Refer to the exhibit. EIGRP has been configured on all routers in the network with default values. Which route will be
installed in the routing table of R1 to reach the 10.1.2.0/24 network?

Selected No route will be installed because of the "passive" state.


Answer:

Question
0 out of 0 points
3
What happens when the crypto key zeroize rsa command is entered on a switch configured with the transport
input ssh command on the vty lines?

Selected The switch allows remote connections only after a new RSA key pair is generated.
Answer:

Question
0 out of 0 points
4
Which two statements are true about the native VLAN on a switch? (Choose two.)
Selected The native VLAN defaults to VLAN 1 on Cisco Catalyst switches.
Answers: Untagged frames that are received on a trunk become members of this VLAN.

Question
0 out of 0 points
5
What are two WAN protocols that define parameters for data encapsulation? (Choose two.)
Selected Answers: PPP
HDLC

Question
0 out of 0 points
6
Refer to the image on the handout issued to you from the proctor Image
1
Refer to the exhibit. Which IP address can be used at the Fa0/0 interface of R1 to enable host A to access the
Internet?

Selected 192.168.1.61/27
Answer:

Question
0 out of 0 points
7
When implementing a router-on-a-stick, what must be configured on the router to ensure connectivity between
different VLANs?

Selected subinterfaces
Answer:

Question
0 out of 0 points
8
Which two statements are true about RSTP?
(Choose two.)
Selected RSTP can fall back to STP to provide support for legacy equipment.
Answers:

Question
0 out of 0 points
9
What are two ways VLAN memberships can be created in an enterprise network?
(Choose two.)
Selected manually configuring the switch ports to be part of a VLAN
Answers: associating MAC addresses to specific VLANs in a VLAN management policy server
database

Question
0 out of 0 points
10
Refer to the image on the handout issued to you from the proctor Image 78
Refer to the exhibit. What is the purpose of the command:
RouterA(config)# access-list 1 permit 192.168.16.0 0.0.0.255?

Selected Answer: It identifies traffic from the fa0/0 interface to be translated and given access to the ISP
router.

Question
0 out of 0 points
11
An administrator wants to configure a new Cisco Catalyst 2960 switch in order to manage the switch remotely. After
configuring the vty lines to allow login, which set of commands should the administrator enter?

Selected Switch(config)# interface vlan 1


Answer: Switch(config-if)# ip address 192.168.1.5
255.255.255.0
Switch(config-if)#exit

Question
0 out of 0 points
12
Which security protocol or measure would provide the greatest protection for a wireless LAN?

Selected WPA2
Answer:

Question
0 out of 0 points
13
Which two statements describe how the information contained in a BPDU is used by a switch? (Choose two.)
Selected Answers: to determine the root bridge
to determine which ports are placed in forwarding mode

Question
0 out of 0 points
14
What operational change will occur if an 802.11b client associates with an access point that is currently supporting
clients utilizing 802.11g?

Selected The 802.11g clients will operate at reduced speeds.


Answer:

Question
0 out of 0 points
15
What will allow a LAN switched network to maintain VLAN configuration consistency across the network?

Selected Configure VTP on all switches.


Answer:

Question
0 out of 0 points
16
Refer to the image on the handout issued to you from the proctor Image
10
Refer to the exhibit. Router1 and Router2 are both running RIPv2 with auto-summarization disabled. Which subnet
mask will Router1 associate with network 192.168.4.16/28?

Selected 255.255.255.240
Answer:

Question
0 out of 0 points
17
Refer to the image on the handout issued to you from the proctor Image
76
Refer to the exhibit. A network administrator wishes to deny Internet access to all R2 LAN hosts, while allowing
these hosts to reach all other devices on the company networks. Where should the ACL shown in the exhibit be
placed to meet these requirements?

Selected R1: S0/1/0 outbound


Answer:

Question
0 out of 0 points
18
What are three correct host addresses in the 172.16.0.0/17 network? (Choose three.)
Selected Answers: 172.16.0.255
172.16.16.16
172.16.127.127

Question
0 out of 0 points
19
Refer to the image on the handout issued to you from the proctor Image
18
Refer to the exhibit. All routers are configured to use the EIGRP routing protocol, and the network administrator has
configured the serial interface with the displayed commands. Which summary route will show in the routing table of
R1 as a result of these commands?

Selected a route pointing to the Serial0/0/0 interface


Answer:

Question
0 out of 0 points
20
A RIPv2 enabled router has been configured with the redistribute static command.
What function does this command serve?

Selected propagates a default route to neighboring routers


Answer:

Question
0 out of 0 points
21
Refer to the image on the handout issued to you from the proctor Image
20
Refer to the exhibit. What is the lowest cost OSPF path for traffic that is sourced from H2 and destined for H3?

Selected R3 to R4 to R5
Answer:

Question
0 out of 0 points
22
Refer to the image on the handout issued to you from the proctor Image
23
Refer to the exhibit.
Users on the 172.30.20.0/24 network are unable to access any of the servers located on the 192.168.0.0/23
network. Given the network topology and OSPF configuration, what two problems exist in this network? (Choose
two.)
Selected There is a network statement missing.
Answers: Network 172.30.20.0 has an incorrect wildcard mask.

Question
0 out of 0 points
23
Refer to the image on the handout issued to you from the proctor Image
16
Refer to the exhibit. EIGRP has been configured for all routers in the topology. Given the exhibited metric values,
which path will be selected by the DUAL algorithm as a successor and feasible successors or feasible successor for
traffic that travels from router A to router E?

Selected Path A-B-E will be selected as a successor.


Answer: Path A-C-E will be selected as a feasible successor.

Question
0 out of 0 points
24
Why is MAC address filtering considered a poor choice in securing a WLAN?

Selected MAC addresses are easily spoofed.


Answer:

Question
0 out of 0 points
25
Refer to the image in the handout issued to you from the proctor Image
55
Refer to the exhibit. An administrator issues the commands as shown on SwitchB. What is the result for port
Fa0/22?

Selected The port is disabled.


Answer:

Question 26 0 out of 0 points


Refer to the image on the handout issued to you from the proctor
Image61
Refer to the exhibit. R1 is configured for inter-VLAN communication as displayed. PC1 is able to ping PC2 but
unable to ping PC3. What is the cause of this problem?

Selected Answer: Fa0/4 must be configured as a trunk.


Question
0 out of 0 points
27
Refer to the image on the handout issued to you from the proctor Image
75
Refer to the exhibit. R1 is using the default OSPF operation. Which IP address will be used as the router ID of R1?

Selected 10.10.10.1
Answer:

Question
0 out of 0 points
28
Which sub-protocol does PPP use to establish, maintain, test, and terminate a point-to-point link?

Selected LCP
Answer:

Question
0 out of 0 points
29
What two statements are true regarding EIGRP tables? (Choose two.)
Selected Answers: A feasible successor route can be found in the topology table.

The neighbor table shows all adjacent Cisco devices.

Question
0 out of 0 points
30
Refer to the image on the handout issued to you from the proctor Image
12
Refer to the exhibit. The network administrator has configured R1, R2, and R3 to use RIPv2, and the network is fully
converged. The hosts on the internal network are able to access R2, but they are unable to access the Internet.
How can the administrator solve this problem?

Selected Answer: Configure a default route on R2 via Serial0/0/0 and propagate it to R1 and R3 using
RIPv2.

Question
0 out of 0 points
31
If an authentication protocol is configured for PPP operation, when is the client or user workstation authenticated?

Selected before the network layer protocol configuration begins


Answer:

Question
0 out of 0 points
32
What is the function of mutilink PPP?

Selected allows multiple physical links to be used as a single logical link.


Answer:

Question
0 out of 0 points
33
What information is displayed in the output of the show version command on a router?

Selected amount of flash memory


Answer:
Question
0 out of 0 points
34
Refer to the image on the handout issued to you from the proctor
Image 5
Refer to the exhibit. Host A originates and sends broadcast frames to the network. Which hosts will receive the
broadcast frames?

Selected hosts D and G


Answer:

Question
0 out of 0 points
35
How does a switch that is configured for 802.1Q trunking handle untagged frames that are received on a trunk port?

Selected The frames are assigned to the default VLAN.


Answer:

Question
0 out of 0 points
36
Refer to the image on the handout issued to you from the proctor Image
19
Refer to the exhibit. OSPF is enabled and the network is fully converged. Which two routers will be designated as
the
DR and BDR, if all the routers are booted at the same time? (Choose two.)
Selected Answers: R5 will be the DR.
R3 will be the BDR.

Question
0 out of 0 points
37
Which type of documentation describes the procedures for teleworkers to connect to the company network by using
a VPN connection?

Selected business security plan


Answer:

Question
0 out of 0 points
38
Refer to the image on the handout issued to you from the proctor Image
34
Refer to the exhibit. The hosts connected to switch SW1 are not able to communicate with the hosts in the same
VLANs connected to switch SW2. What should be done to fix the problem?

Selected Reconfigure the trunk port on switch SW2 with static trunk configuration.
Answer:

Question
0 out of 0 points
39
Refer to the image on the handout issued to you from the proctor Image
41
Refer to the exhibit. Hosts B and C attempt to transmit a frame at the same time, but a collision occurs.
Which hosts will receive the collision jamming signal?

Selected only hosts A, B, and C


Answer:

Question 40 0 out of 0 points


Refer to the image on the handout issued to you from the proctor Image
67
Refer to the exhibit. What is the significance of the value 120 in the line
R 192.168.4.0/24 [120/1] via 192.168.2.2, 00:00:26, Serial0/0/0?

Selected Answer: It is the value that is used to compare routes from different routing protocols.

Question
0 out of 0 points
41
Refer to the image on the handout issued to you from the proctor Image
29
Refer to the exhibit. Which two statements are true about the operation of the interfaces? (Choose two.)
Selected Answers: Incoming traffic that has a VLAN ID of 2 is processed by sub-interface fa0/0.2.

Traffic inbound on this router is processed by different sub-interfaces,


depending on the VLAN from which the traffic originated.

Question
0 out of 0 points
42
What are two characteristics of an extended ACL? (Choose two.)
Selected Answers: IP is used to specify all TCP/IP protocols including TCP, UDP, ICMP and routing
protocols.
Traffic can be filtered on source and destination address, protocol, and specific port
number.

Question
0 out of 0 points
43
Refer to the image on the handout issued to you from the proctor Image 77
Refer to the exhibit. Which Telnet session will be blocked as a result of the displayed commands?

Selected the session from host B to hosts E and F


Answer:

Question
0 out of 0 points
44
Refer to the image on the handout issued to you from the proctor Image
42
Refer to the exhibit. VTP pruning is enabled in the VTP domain that is shown. How will switch ST-1 handle Layer 2
broadcast traffic originating from host A on switch ST-C?

Selected It will be forwarded out ports Fa0/5 and Fa0/10.


Answer:

Question
0 out of 0 points
45
Why is UDP preferred for transmission of video traffic?

Selected It has low overhead.


Answer:
Question
0 out of 0 points
46
Refer to the image on the handout issued to you from the proctor Image
69A
Refer to the exhibit. RIPv2 is configured in the network shown. Hosts in the network have access to all internal
networks but do not have Internet access. On which router should the commands, shown in the exhibit, be added to
provide Internet access for all hosts in the network?

Selected R2
Answer:

Question
0 out of 0 points
47
Refer to the image on the handout issued to you from the proctor Image
8
Refer to the exhibit. The network administrator has implemented NAT on R1. Which two addresses are valid inside
global addresses? (Choose two.)
Selected Answers: 198.133.219.102

198.133.219.103

Question
0 out of 0 points
48
Which WAN connection method uses a PVC?

Selected DSL
Answer:

Question
0 out of 0 points
49
Refer to the image in the handout issued to you from the proctor Image
49
Refer to the exhibit. A network administrator needs to download a previously saved configuration file from the TFTP
server to Switch1. Which command will accomplish this task?

Selected Switch1# copy tftp://192.168.0.254/backup-confg nvram:startup-config


Answer:

Question 50 0 out of 0 points


Refer to the image on the handout issued to you from the proctor Image 56
Refer to the exhibit.
Which IP address can be assigned to the Fa0/0 interface of R1 to enable host A to access host B?

Selected Answer:
192.168.1.126/26

The port becomes a trunk port.


Security is enabled on the port.

The port is disabled.

The port is now a member of the default VLAN

You might also like