1
Refer to the exhibit. All hosts and router interfaces are configured
correctly. Pings to the server from both H1 and H2 and pings between H1
and H2 are not successful. What is causing this problem?
RIPv2 does not support VLSM.
**RIPv2 is misconfigured on router R1.
RIPv2 is misconfigured on router R2.
RIPv2 is misconfigured on router R3.
RIPv2 does not support private IP addressing.
2
Which statement correctly describes the difference between HTTP and HTTPS?
The maximum number of simultaneous connections that a server can support for HTTPS is more than for HTTP.
HTTPS and HTTP use different client request-server response processes.
**HTTPS authenticates and encrypts the data being transferred between the client and the web server.
HTTPS specifies the rules for passing data between the physical layer and the data link layer.
3
What is one purpose of the TCP three-way handshake?
sending echo requests from the source to the destination host to establish the presence of the destination
determining the IP address of the destination host in preparation for data transfer
requesting the destination to transfer a binary file to the source
**synchronizing sequence numbers between source and destination in preparation for data transfer
4
Which statement describes a route that has been learned dynamically?
**It is automatically updated and maintained by routing protocols.
It is unaffected by changes in the topology of the network.
It has an administrative distance of 1.
It is identified by the prefix C in the routing table.
5
When would TFTP in ROM monitor mode be used to restore a Cisco IOS image to a router?
when a console connection is the only available connection to the router
when the TFTP server software is incompatible with the router IOS version
**when the router is set to boot from flash, but the Cisco IOS image in flash is corrupt or has been erased
when the current Cisco IOS on the router requires a feature upgrade
6
Which statement correctly describes the operation of DNS?
It uses a local HOSTS file to resolve URLs to IP addresses for internal devices.
**It uses a distributed hierarchy of servers to resolve hostnames to IP addresses.
It references a central file that maps hostnames to IP addresses for all Internet hosts.
It uses a single layer of interconnected peer servers to manage hostname-to-IP-address mappings.
7
Refer to the exhibit. What fact can be determined from the exhibited output?
PPP is enabled on this router.
The bandwidth setting of the interfaces is consistent with a T1 connection.
The serial0/0/0 interface is administratively down.
**The default encapsulation is set for the serial0/0/0 interface.
Subnet mask 255.255.255.255 has been configured for the serial0/0/0 interface.
8
Which action would a network security administrator take under the principle of least privilege?
**Provide users with access to only necessary resources.
Encrypt all data for transmission across unsecured networks.
Restrict all users except administrators to the lowest privilege level.
Require authentication for access to all resources including files and folders.
9
Refer to the exhibit. A network administrator has just entered the
interface configuration commands shown in the exhibit on a brand new
router. To verify basic connectivity, a ping is issued from Host A to
R1. The ping is unsuccessful. Which two configuration steps should be
performed to solve this problem? (Choose two.)
Configure the appropriate line password to access the router.
Configure the speed of the interface.
Enable the interface administratively.
Configure a dynamic routing protocol on the router.
**Configure the subnet mask on the router interface to 255.255.255.248.
**Modify the subnet mask on HostA to be the same as the Fa0/0 interface.
10
Which storage media type is most commonly selected if cost
effectiveness, large capacity, and transportability are the key factors
being considered during implementation of a backup scheme?
**digital tape
solid-state storage
optical media discs
storage area networks
network-attached storage
11
What is used by a routing protocol to determine the best path to include in the routing table?
Convergence time
Default distance
**Metric
Type of router
12
Which two statements are correct about the UDP protocol? (Choose two.)
It utilizes a flow control mechanism.
It uses windowing.
**It does not provide acknowledgment of receipt of data.
**It is a connectionless protocol.
It guarantees the sequential arrival of data packets.
13
Which application can be delivered using UDP?
FTP
**DNS
HTTP
SMTP
14
What happens when a segment is encapsulated into a packet?
Data is converted to bits for transmission.
The destination port number is specified.
**A header with logical addresses is added.
A session with a destination is established.
15
Refer to the exhibit. Which combination of cables and symbols is correct?
A - crossover, B - straight-through, C - straight-through
A - crossover, B - rollover, C - straight-through
**A - straight-through, B -crossover, C - straight-through
A - straight-through, B -straight-through, C - straight-through
A - straight-through, B - straight-through, C - crossover
A - rollover, B - straight-through, C - straight-through
Refer to the exhibit. If the show cdp neighbors command is issued on
RTB, which devices will appear in the output if all devices use the
Cisco IOS and have CDP enabled?
RTA, RTC
**RTA, RTC, Sw2
RTA, RTC, Sw1, Sw2, Sw3
RTA, RTC, Sw1, Sw2, Sw3, PC1, PC2
17
Refer to the exhibit. There is no routing protocol configured on
either router. Which command will create a default route on R1 to
forward the traffic to R2?
R1(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.1
**R1(config)# ip route 0.0.0.0 0.0.0.0 192.168.0.2
R1(config)# ip route 0.0.0.0 0.0.0.0 192.168.0.1
R1(config)# ip route 0.0.0.0 0.0.0.0 S0/0/1
18
What is the function of the service password-encryption command in the Cisco IOS?
encrypts passwords sent over serial interfaces
validates encrypted passwords by the use of an authentication server
encrypts passwords for transmission across insecure networks
**prevents passwords in configuration files from being easily read
19
Refer to the exhibit. A network administrator has an extra router and
wishes to use it as shown to passively monitor network traffic. Which
IOS feature should be implemented on router EXTRA?
ACLs
CDP
**IDS
IPS
20
A switch with 10/100/1000 Gigabit Ethernet ports is configured for
autonegotiation. It is connected to a device with a 100 Mb/s port that
is set to full-duplex. What speed and duplex setting will the switch
use?
100 Mb/s and full-duplex
100 Mb/s and half-duplex
**1000 Mb/s and full-duplex
1000 Mb/s and half-duplex
21
A Catalyst switch is used as a temporary replacement for another
switch that needs to be repaired. About a minute after the switch has
started, the SYST LED on the front of the switch transitions from
blinking green to amber. What is the meaning of the amber SYST LED?
The switch has no configuration file in NVRAM.
**The switch has failed POST and must be sent for service.
The switch is functioning properly.
The switch is in half-duplex mode.
22
An experienced network technician has decided to use a
divide-and-conquer approach to troubleshooting a network problem. What
is an advantage to this approach?
works well for simple problems
quickly resolves user-related issues
easiest to use in a multi-vendor environment
**targets the problem layer more quickly than other methods do
23
Refer to the exhibit. The network administrator uses the exhibited
commands to configure R1 and R2. The administrator confirms Layer 1
connectivity between the two routers is functioning properly. However,
R1 is unable to ping the serial interface of R2.
What could be the reason for this problem?
The subnet mask is incorrectly configured on both routers.
A static route is not configured on both routers.
**Different encapsulations are configured on the two routers.
The clock rate is not set on any of the router serial interfaces.
24
A computer is configured to receive an IP address dynamically.
However, the computer cannot communicate with other hosts on the
network. A network technician then determines that the computer has an
IP address of 169.254.0.2/16. What is a possible cause for this problem?
**The DHCP server pool is exhausted.
The TCP/IP stack on the local computer is corrupted.
The operating system of the computer is unresponsive.
The DNS server is not responding to discovery messages.
25
Which question provides troubleshooting information about a problem at Layer 1 or Layer 2 of the OSI model?
Can the server be reached through Telnet?
Is there a firewall that is configured on the PC?
**Is there a link light on the network card?
What addresses are configured in the TCP/IP settings?
26
Refer to the exhibit. A ping 192.168.1.20 command is hssued on
workstation A to determine if workstation B can be reached. What two
events will occur if this command is successful? (Choose two.)
The router will reply to the echo request with a proxy ping response.
Workstation A will send a UDP ping request message to workstation B.
The router will send a TCP acknowledgment message to workstation A.
Workstation B will send a UDP ping reply message to the router.
**Workstation A will send an ICMP echo request message to workstation B.
**Workstation B will send an ICMP echo reply message to workstation A.
27
When does a router enter the setup mode?
when the Cisco IOS is missing in flash
**when the configuration is missing in NVRAM
when the setup command is run from the user mode
when the boot system command is missing in the configuration
28
Which transport layer protocol will allow segments to be exchanged
between two hosts with low overhead and no mechanism for retransmission?
IP
FTP
TCP
**UDP
SMTP
29
Refer to the exhibit. Router R1 has been configured with the commands
that are displayed. Which password will be used to access the EXEC
privileged mode of the router?
password1
**password2
password3
password4
30
Wireless radio waves are associated with which layer of the OSI model?
**Layer 1
Layer 2
Layer 3
Layer 4
Layer 5
Layer 6
Layer 7
31
Which two protocols allow network devices to report their status and
events to a centralized network management device? (Choose two.)
**Syslog
Telnet
HTTP
HTTPS
**SNMP
32
Refer to the exhibit. All cables are working and all devices have IP
addresses. However, H1 cannot ping the server. What is the cause of the
problem?
The default gateway is incorrect on R1.
The switch should be assigned an IP address.
**H1 and the server are on different subnetworks.
H1 does not know the physical address of the server.
33
Refer to the exhibit. A technician tries to telnet to a router with
the IP address of 172.16.1.2. What does the message indicate about the
Telnet session?
The console password has not been set on the remote router.
The VTY password has not been set on the remote router.
The enable password has not been set on the remote router.
**The enable secret password has not been set on the remote router.
The session has been opened and closed successfully by the remote router.
34
Refer to the exhibit. A user who is connected to RTA is trying to
telnet to RTB, but the connection is failing. Based on the output of the
show running-config command on router RTB, why is the Telnet session
failing?
Telnet has not been configured on the console line.
The login command has not been issued on the console line.
**No password has been configured on the VTY lines.
A session limit has not been configured for Telnet.
35
A network administrator is asked to design a system to allow
simultaneous access to the Internet for 250 users. The ISP can only
supply five public IP addresses for this network. What technology can
the administrator use to accomplish this task?
classful subnetting
variable length subnet masks
classless interdomain routing
**port-based Network Address Translation
36
A small tire retailer requires a low-cost WAN connection to its
headquarters in order to manage its inventory and process customer sales
in real time. Which WAN connection type is best suited to its needs?
SONET
T3
T1
**DSL
leased line
37
What is the function of the forward lookup DNS zone in the DNS name resolution process?
**It resolves fully qualified domain names into IP addresses.
It stores the information about the domain namespace structure.
It forwards zone information updates to the secondary server.
It maintains a database of ARP entries for all servers.
38
Which commands will configure a management interface on a LAN switch?
Switch(config)# ip default-gateway 192.168.1.1 255.255.255.0
Switch(config)# interface vlan 1
Switch(config-if)# ip address 192.168.1.2 255.255.255.0
**Switch(config)# interface fa0/1
Switch(config-if)# description Management Interface
Switch(config-if)# ip address 192.168.1.254 255.255.255.0
Switch(config)# interface fa0/1
Switch(config-if)# switchport access vlan 1
39
How many host addresses may be assigned on each subnetwork when using
the 130.68.0.0 network address with a subnet mask of 255.255.248.0?
30
256
**2046
2048
4094
4096
40
What is the purpose of the debug ip rip command?
shows the installed routing table
allows RIP to advertise triggered updates
**displays routing update activity in real time
shows the administrative distance of all routes
41
Refer to the exhibit. A network administrator is planning the wiring
for a new installation and wants to connect three separate buildings
that are 250 meters apart. Which type of cable should be used to connect
the buildings?
STP
UTP
serial
**coaxial
fiber optic
42
Which statement is true about FTP implementations?
//The protocol interpreter (PI) function engages once the data transfer process (DTP) function is complete.
The DTP function is responsible for the login sequence.
**FTP requires two connections, one for control and one for data.
Both the PI and the DTP close automatically when the transfer is complete.
43
Refer to the exhibit. A computer with the displayed IP settings is
unable to access a server on the 192.168.2.0 network using the server IP
address but can access hosts on the 192.168.1.0 network. What should
the network administrator do to troubleshoot this problem?
**Issue the ping 192.168.1.1 command on the host to determine if the host can communicate with the default gateway.
Issue the ipconfig /all command to determine if a DNS server IP address was configured.
Verify that the host has a link light.
Check the cabling of the host.
44
What is the maximum unrepeated distance set by industry standards for UTP cable?
10 meters
75 meters
**100 meters
325 meters
45
A host has been properly cabled and configured with a unique hostname
and valid IP address. Which two additional components should be
configured to enable the host to access remote resources? (Choose two.)
**the subnet mask
the MAC address
**the default gateway
the loopback IP address
the DHCP server IP address
46
While troubleshooting a connectivity issue between two directly
connected routers, the network administrator checks the encapsulation
settings on the serial interfaces of both routers. Which layer of the
OSI model is the administrator troubleshooting?
application layer
network layer
**data link layer
physical layer
47
Which two subnet masks could be used when subnetting a Class B IP address? (Choose two.)
255.255.255.240
**255.255.192.0
**255.255.0.0
255.192.0.0
240.0.0.0
255.0.0.0
48
What routing protocol would be appropriate to use for exchanging routes between ISPs?
RIPv2
**BGP
OSPF
EIGRP
49
Which routing algorithm does EIGRP use to calculate the best path to a destination within a network?
**link-state
DUAL
Dijkstra
shortest path first
50
At which layer of the OSI model is the Ethernet family of technologies defined?
Layer 1
**Layer 2
Layer 3
Layer 4
Layer 5
Layer 6
Layer 7
WebRepOverall rating
SEARCH
LATEST
3-latest-65px
Pengunjung
Categories
Refensi
(30)
Assistant of Laboratory
(18)
Linux
(13)
Keamanan Jaringan
(12)
bitcoin
(10)
Tip dan trik
(9)
Toko
(6)
Umsida
(6)
CCNA
(5)
C++
(4)
Driver
(3)
Materi
(3)
Rasberry Pi
(3)
Hardware
(2)
Uang
(2)
hadist
(2)
Kata-Kata
(1)
Keygen
(1)
Konfrimasi
(1)
adsense
(1)
mining
(1)
proxy
(1)
ranni
(1)