Cuestiones
ayuda
option
Mi Daypo

TEST BORRADO, QUIZÁS LE INTERESEParte 4

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del test:
Parte 4

Descripción:
50 preguntas

Autor:
AVATAR

Fecha de Creación:
21/10/2016

Categoría:
Otros

Número preguntas: 50
Comparte el test:
Facebook
Twitter
Whatsapp
Comparte el test:
Facebook
Twitter
Whatsapp
Últimos Comentarios
No hay ningún comentario sobre este test.
Temario:
Move the protocol or service on the left to a situation on the right where it would be used. (Not all options are used.) OSPF ARP NAT DNS SQL DHCP.
What is the best practice when assigning IP addresses in a small office of six hosts? Use a DHCP server that is located at the headquarters. Use a DHCP server that is located at the branch office. Assign the addresses by using the local CDP protocol. Assign the addresses statically on each node.
In the configuration of NAT, what does the keyword overload signify? When bandwidth is insufficient, some hosts will not be allowed to access network translation. The pool of IP addresses has been exhausted. Multiple internal hosts will use one IP address to access external network resources. If the number of available IP addresses is exceeded, excess traffic will use the specified address pool.
The network administrator is using a Windows PC application that is called putty.exe for remote communication to a switch for network troubleshooting. Which two protocols could be used during this communication? (Choose two.) SNMP HTTP Telnet RMON SSH.
How can you ensure that only the MAC address of a server is allowed by switch port Fa0/1? Configure port Fa0/1 to accept connections only from the static IP address of the server. Configure the server MAC address as a static entry of port security. Use a proprietary connector type on Fa0/1 that is incomputable with other host connectors. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
Refer to the exhibit. A TFTP server has recently been installed in the Atlanta office. The network administrator is located in the NY office and has made a console connection to the NY router. After establishing the connection they are unable to backup the configuration file and IOS of the NY router to the TFTP server. What is the cause of this problem? The NY router has an incorrect subnet mask. The TFTP server has an incorrect IP address. The TFTP server has an incorrect subnet mask. The network administrator computer has an incorrect IP address.
Refer to the exhibit. The junior network support staff provided the diagram as a recommended configuration for the first phase of a four-phase network expansion project. The entire network expansion will have over 1000 users on 14 network segments and has been allocated this IP address space. 192.168.1.1 through 192.168.5.255 192.168.100.1 through 192.168.100.255 What are three problems with this design? (Choose three.) The AREA 1 IP address space is inadequate for the number of users. The AREA 3 IP address space is inadequate for the number of users. AREA 2 could use a mask of /25 to conserve IP address space. The network address space that is provided requires a single network-wide mask. The router-to-router connection is wasting address space. The broadcast domain in AREA 1 is too large for IP to function.
Select three options which are security issues with the current configuration of SwitchA. (Choose three.) Privilege mode is protected with an unencrypted password Inappropriate wording in banner message Virtual terminal lines are protected only by a password requirement Both the username and password are weak Telnet connections can be used to remotely manage the switch Cisco user will be granted privilege level 15 by default.
Including the address on the Routed Ethernet interface, how many hosts can have IP addresses on the LAN to which Routed is connected? 6 30 62 126.
Refer to the exhibit. An administrator replaced the 10/100 Mb NIC in a desktop PC with a 1 Gb NIC and now the PC will not connect to the network. The administrator began troubleshooting on the switch. Using the switch output shown, what is the cause of the problem? Speed is set to 100Mb/s. Input flow control is off. Encapsulation is set to ARPA. The port is administratively down. The counters have never been cleared.
Refer to the exhibit. The two connected ports on the switch are not turning orange or green. What would be the most effective steps to troubleshoot this physical layer problem? (Choose three.) Ensure that the Ethernet encapsulations match on the interconnected router and switch ports. Ensure that cables A and B are straight-through cables. Ensure cable A is plugged into a trunk port. Ensure the switch has power. Reboot all of the devices. F. Reseat all cables.
Refer to the exhibit. The network administrator is testing connectivity from the branch router to the newly installed application server. What is the most likely reason for the first ping having a success rate of only 60 percent? The network is likely to be congested, with the result that packets are being intermittently dropped. The branch router had to resolve the application server MAC address. There is a short delay while NAT translates the server IP address. A routing table lookup delayed forwarding on the first two ping packets. . The branch router LAN interface should be upgraded to FastEthernet.
Refer to the exhibit. An administrator cannot connect from R1 to R2. To troubleshoot this problem, the administrator has entered the command shown in the exhibit. Based on the output shown, what could be the problem? The serial interface is configured for half duplex. The serial interface does not have a cable attached. The serial interface has the wrong type of cable attached. The serial interface is configured for the wrong frame size. The serial interface has a full buffer.
The following commands are entered on the router: Burbank(config)# enable secret fortress Burbank(config)# line con 0 Burbank(config-line)# login Burbank(config-line)# password n0way1n Burbank(config-line)# exit Burbank(config)# service password-encryption What is the purpose of the last command entered? to require the user to enter an encrypted password during the login process to prevent the vty, console, and enable passwords from being displayed in plain text in the configuration files to encrypt the enable secret password to provide login encryption services between hosts attached to the router.
Two routers named Atlanta and Brevard are connected by their serial interfaces as shown in the exhibit, but there is no data connectivity between them. The Atlanta router is known to have a correct configuration. Given the partial configurations shown in the exhibit, what is the problem on the Brevard router that is causing the lack of connectivity? A loopback is not set. The IP address is incorrect. The subnet mask is incorrect. The serial line encapsulations are incompatible. The maximum transmission unit (MTU) size is too large. The bandwidth setting is incompatible with the connected interface.
Refer to the exhibit. A technician pastes the configurations in the exhibit into the two new routers shown. Otherwise, the routers are configured with their default configurations. A ping from Host1 to Host 2 fails, but the technician is able to ping the S0/0 interface of R2 from Host 1. The configurations of the hosts have been verified as correct. What could be the cause of the problem? The serial cable on R1 needs to be replaced. The interfaces on R2 are not configured properly R1 has no route to the 192.168.1.128 network. The IP addressing scheme has overlapping subnetworks. The ip subnet-zero command must be configured on both routers.
Which two of the following are true regarding the configuration of RouterA? (Choose two.) At least 5 simultaneous remote connections are possible Only telnet protocol connections to RouterA are supported Remote connections to RouterA using telnet will succeed Console line connections will nevertime out due to inactivity Since DHCP is not used on Fa0/1 there is not a need to use the NAT protocol.
A company has placed a networked PC in a lobby so guests can have access to the corporate directory. A security concern is that someone will disconnect the directory PC and re-connect their laptop computer and have access to the corporate network. For the port servicing the lobby, which three configuration steps should be performed on the switch to prevent this? (Choose three.) Enable port security. Create the port as a trunk port. Create the port as an access port. Create the port as a protected port. Set the port security aging time to 0. Statically assign the MAC address to the address table. Configure the switch to discover new MAC addresses after a set time of inactivity.
What is the bandwidth on the WAN interface of Router 1? 16 Kbit/sec 32 Kbit/sec 64 Kbit/sec 128 Kbit/sec 512 Kbit/sec 1544 Kbit/sec.
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.) Allow unrestricted access to the console or VTY ports. Use a firewall to restrict access from the outside to the network devices. Always use Telnet to access the device command line because its data is automatically encrypted. Use SSH or another encrypted and authenticated transport to access device configurations. Prevent the loss of passwords by disabling password encryption.
What is the purpose of the switchport command? Switch(config-if)# switchport port-security maximum 1 Switch(config-if)# switchport port-security mac-address 0018.DE8B.4BF8 It ensures that only the device with the MAC address 0018.DE8B.4BF8 will be able to connect to the port that is being configured. It informs the switch that traffic destined for MAC address 0018.DE8B.4BF8 should only be sent to the port that is being configured. It will act like an access list and the port will filter packets that have a source or destination MAC of 0018.DE8B.4BF8. The switch will shut down the port of any traffic with source MAC address of 0018.DE8B.4BF8.
Refer to the exhibit. A network administrator is troubleshooting a connectivity problem on the serial interfaces. The output from the show interfaces command on both routers shows that the serial interface is up, line protocol is down. Given the partial output for the show running-config in the exhibit, what is the most likely cause of this problem? The serial cable is bad. The MTU is incorrectly configured. The Layer 2 framing is misconfigured. The IP addresses are not in the same subnet.
Refer to the exhibit. Host A can communicate with Host B but not with Hosts C or D. How can the network administrator solve this problem? Configure Hosts C and D with IP addresses in the 192.168.2.0 network. Install a router and configure a route to route between VLANs 2 and 3. Install a second switch and put Hosts C and D on that switch while Hosts A and B remain on the original switch. Enable the VLAN trunking protocol on the switch.
Refer to the exhibit. For security reasons, information about RTA, including platform and IP addresses, should not be accessible from the Internet. This information should, however, be accessible to devices on the internal networks of RTA. Which command or series of commands will accomplish these objectives? RTA(config)#no cdp run RTA(config)#no cdp enable RTA(config)#interface s0/0 RTA(config-if)#no cdp run RTA(config)#interface s0/0 RTA(config-if)#no cdp enable.
Refer to the exhibit. A person is trying to send a file from a host on Network A of the JAX Company to a server on Network Z of the XYZ Company. The file transfer fails. The host on Network A can communicate with other hosts on Network A. Which command, issued from router RTA, would be the most useful for troubleshooting this problem? show flash: show history show version show interfaces show controllers serial.
Refer to the exhibit. Why did the device return this message? The command requires additional options or parameters There is no show command that starts with ru. The command is being executed from the wrong router mode. There is more than one show command that starts with the letters ru.
Refer to the exhibit. Serial 0/0 does not respond to a ping request from a host on the FastEthernet 0/0 LAN. How can this problem be corrected? Enable the Serial 0/0 interface. Correct the IP address for Serial 0/0. Correct the IP address for FastEthernet 0/0 Change the encapsulation type on Serial 0/0 Enable autoconfiguration on the Serial 0/0 interface.
Refer to the exhibit. A network administrator has configured a Catalyst 2950 switch for remote management by pasting into the console the configuration commands that are shown in the exhibit. However, a Telnet session cannot be successfully established from a remote host. What should be done to fix this problem? Change the first line to interface fastethernet 0/1. Change the first line to interface vlan 0/1. Change the fifth line to ip default-gateway 192.168.17.241. Change the fifth line to ip route 0.0.0.0 0.0.0.0 192.168.17.1. Change the sixth line to line con 0.
Refer to the exhibit. A network technician is asked to design a small network with redundancy. The exhibit represents this design, with all hosts configured in the same VLAN. What conclusions can be made about this design? This design will function as intended. Spanning-tree will need to be used. The router will not accept the addressing scheme. The connection between switches should be a trunk. The router interfaces must be encapsulated with the 802.1Q protocol.
Refer to the exhibit. The network administrator made the entries that are shown and then saved the configuration. From a console connection, what password or password sequence is required for the administrator to access privileged mode on Router1? cisco sanfran sanjose either cisco or sanfran either cisco or sanjose sanjose and sanfran.
Refer to the exhibit. Why was this message received? No VTY password has been set. No enable password has been set. No console password has been set. No enable secret password has been set. The login command has not been set on CON 0 The login command has not been set on the VTY ports.
Which of the following is true regarding the configuration of SwitchA? only 5 simultaneous remote connections are possible remote connections using ssh will require a username and password only connections from the local network will be possible console access to SwitchA requires a password.
A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session? decrease the window size use a different source port for the session decrease the sequence number obtain a new IP address from the DHCP server start a new session using UDP.
Refer to the exhibit. After the power-on-self test (POST), the system LED of a Cisco 2950 switch turns amber. What is the status of the switch? The POST was successful. The switch has a problem with the internal power supply and needs an external power supply to be attached. POST failed and there is a problem that prevents the operating system from being loaded. The switch has experienced an internal problem but data can still be forwarded at a slower rate. The switch passed POST, but all the switch ports are busy.
What should be part of a comprehensive network security plan? Allow users to develop their own approach to network security. Physically secure network equipment from potential access by unauthorized individuals. Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten. Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported. Minimize network overhead by deactivating automatic antivirus client updates.
Refer to the exhibit. A user cannot reach any web sites on the Internet, but others in the department are not having a problem. What is the most likely cause of the problem? IP routing is not enabled. The default gateway is not in the same subnet. A DNS server address is not reachable by the PC. A DHCP server address is not reachable by the PC. NAT has not been configured on the router that connects to the Internet.
An administrator has connected devices to a switch and, for security reasons, wants the dynamically learned MAC addresses from the address table added to the running configuration. What must be done to accomplish this? Enable port security and use the keyword sticky. Set the switchport mode to trunk and save the running configuration. Use the switchport protected command to have the MAC addresses added to the configuration. Use the no switchport port-security command to allow MAC addresses to be added to the configuration.
Refer to the exhibit. The DHCP settings have recently been changed on the DHCP server and the client is no longer able to reach network resources. What should be done to correct this situation? Verify that the DNS server address is correct in the DHCP pool. Ping the default gateway to populate the ARP cache. Use the tracert command on the DHCP client to first determine where the problem is located. Clear all DHCP leases on the router to prevent address conflicts. Issue the ipconfig command with the /release and /renew options in a command window.
Why would a network administrator configure port security on a switch? to prevent unauthorized Telnet access to a switch port to prevent unauthorized hosts from accessing the LAN to limit the number of Layer 2 broadcasts on a particular switch port block unauthorized access to the switch management interfaces.
Drag the appropriate command on the left to the configuration task it accomplishes. (Not all options are used.) login password cantCome1n enable password uwi11NeverNo service password-encryption line console 0 password friend Sonly enable secret noWay1n4u line vty 0 4 password 2hard2Guess.
From which of the following attacks can Message Authentication Code (MAC) shield your network? DoS DDoS spoofing SYN floods.
The hosts in the LAN are not able to connect to the Internet. Which commands will correct this issue? Option A Option B Option C Option D Option E.
What is the subnet broadcast address of the LAN connected to Router1? 192.168.8.15 192.168.8.31 192.168.8.63 192.168.8.127.
What is the effect of using the service password-encryption command? Only the enable password will be encrypted. Only the enable secret password will be encrypted. Only passwords configured after the command has been entered will be encrypted. It will encrypt the secret password and remove the enable secret password from the configuration. It will encrypt all current and future passwords.
Refer to the exhibit. After configuring two interfaces on the HQ router, the network administrator notices an error message. What must be done to fix this error? The serial interface must be configured first. The serial interface must use the address 192.168.1.2 The subnet mask of the serial interface should be changed to 255.255.255.0 The subnet mask of the FastEthernet interface should be changed to 255.255.255.240 The address of the FastEthernet interface should be changed to 192.168.1.66.
Select two options which are security Issues which need to be modified before RouterA is used? (Choose two.) unencrypted weak password is configured to protect privilege mode B. inappropriate wording in banner message the virtual terminal lines have a weak password configured virtual terminal lines have a password, but it will not be used configuration supports un-secure web server access.
The network administrator has found the following problem. The remote networks 172.16.10.0, 172.16.20.0, and 172.16.30.0 are accessed through the Central router's serial 0/0 interface. No users are able to access 172.16.20.0. After reviewing the command output shown in the graphic, what is the most likely cause of the problem? no gateway of last resort on Central Central router's not receiving 172.16.20.0 update incorrect static route for 172.16.20.0 172.16.20.0 not located in Central's routing table.
Refer to the exhibit. A problem with network connectivity has been observed. It is suspected that the cable connected to switch port Fa0/9 on Switch1 is disconnected. What would be an effect of this cable being disconnected? Host B would not be able to access the server in VLAN9 until the cable is reconnected. Communication between VLAN3 and the other VLANs would be disabled. The transfer of files from Host B to the server in VLAN9 would be significantly slower. For less than a minute, Host B would not be able to access the server in VLAN9. Then normal network function would resume.
Refer to the exhibit. A technician is troubleshooting a host connectivity problem. The host is unable to ping a server connected to Switch_A. Based on the results of the testing, what could be the problem? remote physical layer problem exists. The host NIC is not functioning. TCP/IP has not been correctly installed on the host. A local physical layer problem exists.
If a host experiences intermittent issues that relate to congestion within a network while remaining connected, what could cause congestion on this LAN? half-duplex operation broadcast storms network segmentation multicasting.
Denunciar test Consentimiento Condiciones de uso