1.
Which broadband wireless technology is based on the 802.11 standard?
Correct Answer
A. Municipal Wi-Fi
Explanation
Municipal Wi-Fi is the correct answer because it is a broadband wireless technology that is based on the 802.11 standard. This technology allows cities or municipalities to provide wireless internet access to their residents and visitors in public areas. It uses Wi-Fi technology, which is based on the 802.11 standard, to create a wireless network that covers a specific geographical area. This allows people to connect to the internet using their Wi-Fi enabled devices without the need for wired connections.
2.
What is the approximate distance limitation for providing a satisfactory ADSL service from the central office to a customer?
Correct Answer
A. 3.39 miles or 5.46 kilometers
Explanation
ADSL (Asymmetric Digital Subscriber Line) is a type of broadband internet connection that uses existing telephone lines to provide high-speed internet access. The approximate distance limitation for providing a satisfactory ADSL service from the central office to a customer is 3.39 miles or 5.46 kilometers. Beyond this distance, the signal strength degrades, resulting in slower internet speeds and a less satisfactory user experience.
3.
What is a component of an ADSL connection that is located at the customer site?
Correct Answer
B. CPE
Explanation
CPE stands for Customer Premises Equipment and is a component of an ADSL connection that is located at the customer site. It refers to the equipment that is owned and installed by the customer, such as a modem or router, which allows them to connect to the ADSL network and access the internet. The CPE is responsible for converting the digital signals from the customer's devices into analog signals that can be transmitted over the ADSL line, and vice versa.
4.
What is the function of the DSLAM in a broadband DSL network?
Correct Answer
A. multiplexes individual customer DSL connections into a single upstream link
Explanation
The function of the DSLAM (Digital Subscriber Line Access Multiplexer) in a broadband DSL network is to multiplex individual customer DSL connections into a single upstream link. This means that the DSLAM combines multiple DSL connections from different customers and combines them into one larger connection that can be sent upstream to the service provider. This allows for efficient use of bandwidth and enables multiple customers to share the same upstream link for internet access.
5.
Which broadband technology would be best for a small office that requires fast upstream connections?
Correct Answer
B. Fiber-to-the-home
Explanation
Fiber-to-the-home technology would be the best option for a small office that requires fast upstream connections. Fiber-optic cables provide high-speed and reliable internet connections, making it ideal for businesses that need fast upload speeds. This technology can handle large amounts of data with minimal signal loss, ensuring efficient and smooth data transfer. Additionally, fiber-to-the-home offers symmetrical upload and download speeds, making it suitable for tasks that require fast upstream connections, such as video conferencing, cloud-based services, and file sharing.
6.
What are two WAN connection enhancements that are achieved by implementing PPPoE? (Choose two.)
Correct Answer(s)
C. PPP enables the ISP to assign an IP address to the customer WAN interface.
E. CHAP enables customer authentication and accounting.
Explanation
The correct answer is PPP enables the ISP to assign an IP address to the customer WAN interface and CHAP enables customer authentication and accounting. PPPoE allows for the assignment of IP addresses by the ISP to the customer's WAN interface, which is necessary for the customer to connect to the internet. CHAP, or Challenge Handshake Authentication Protocol, is a security feature that enables customer authentication and accounting, ensuring that only authorized users can access the network.
7.
When PPPoE is configured on a customer router, which two commands must have the same value for the configuration to work? (Choose two.)
Correct Answer(s)
A. Dialer pool 2
E. Pppoe-client dial-pool-number 2
Explanation
The two commands that must have the same value for the configuration to work are "dialer pool 2" and "pppoe-client dial-pool-number 2". These commands specify the same pool number (2) for the dialer interface and the PPPoE client, ensuring that they are using the same pool for establishing the PPPoE connection.
8.
Why is the MTU for a PPPoE DSL configuration reduced from 1500 bytes to 1492?
Correct Answer
C. to accommodate the PPPoE headers
Explanation
The MTU for a PPPoE DSL configuration is reduced from 1500 bytes to 1492 to accommodate the PPPoE headers. PPPoE (Point-to-Point Protocol over Ethernet) adds additional headers to the packets, which reduces the available space for the payload. By reducing the MTU to 1492, it ensures that the entire packet, including the headers, can be transmitted without fragmentation. This allows for efficient communication over the DSL link while still maintaining the necessary PPPoE headers for the protocol.
9.
What are two characteristics of a PPPoE configuration on a Cisco customer router? (Choose two.)
Correct Answer(s)
A. The PPP configuration is on the dialer interface.
C. The Ethernet interface does not have an IP address.
Explanation
In a PPPoE configuration on a Cisco customer router, the PPP configuration is on the dialer interface. This means that the dialer interface is responsible for establishing and maintaining the PPP connection with the ISP. Additionally, the Ethernet interface does not have an IP address in a PPPoE configuration. This is because the IP address is assigned to the dialer interface, which acts as the gateway for the Ethernet interface.
10.
Where is PPPoE configured on a Cisco router?
Correct Answer
B. On the dialer interface
Explanation
PPPoE (Point-to-Point Protocol over Ethernet) is a protocol used to establish a network connection over Ethernet. It is commonly used in DSL connections. In Cisco routers, PPPoE is configured on the dialer interface. The dialer interface is responsible for establishing and terminating the PPPoE connection. Therefore, the correct answer is "on the dialer interface".
11.
How can the use of VPNs in the workplace contribute to lower operating costs?
Correct Answer
B. VPNs can be used across broadband connections rather than dedicated WAN links.
Explanation
By using VPNs across broadband connections instead of dedicated WAN links, companies can save on the cost of leasing expensive dedicated lines. VPNs allow employees to securely access the company network over the internet, eliminating the need for costly dedicated connections. This helps lower operating costs for the company.
12.
How is “tunneling” accomplished in a VPN?
Correct Answer
A. New headers from one or more VPN protocols encapsulate the original packets.
Explanation
Tunneling in a VPN is accomplished by adding new headers from one or more VPN protocols to encapsulate the original packets. This process allows the packets to be securely transmitted over a public network, such as the internet, while maintaining their privacy and integrity. The new headers provide the necessary information for routing the packets through the VPN tunnel, ensuring that they reach their intended destination.
13.
Which two statements describe a remote access VPN? (Choose two.)
Correct Answer(s)
C. It is used to connect individual hosts securely to a company network over the Internet.
D. It may require VPN client software on hosts.
Explanation
A remote access VPN is used to connect individual hosts securely to a company network over the Internet. This allows remote users to access resources on the company network as if they were physically present in the office. It may require VPN client software on hosts, which establishes a secure connection to the VPN gateway. This software encrypts the traffic and ensures the confidentiality and integrity of the data transmitted between the host and the company network.
14.
Which is a requirement of a site-to-site VPN?
Correct Answer
D. It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic.
Explanation
A site-to-site VPN requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic. This is because a site-to-site VPN is used to connect two or more networks together over the internet securely. The VPN gateway acts as the entry and exit point for the VPN traffic, ensuring that data is encrypted before it leaves one network and decrypted when it arrives at the other network. This allows for secure communication between the networks, protecting the data from unauthorized access.
15.
What functionality does mGRE provide to the DMVPN technology?
Correct Answer
A. It allows the creation of dynamically allocated tunnels through a permanent tunnel source at the hub and dynamically allocated tunnel destinations at the spokes.
Explanation
mGRE (Multipoint GRE) provides the functionality of creating dynamically allocated tunnels in a DMVPN (Dynamic Multipoint VPN) network. In this network, there is a permanent tunnel source at the hub and dynamically allocated tunnel destinations at the spokes. This allows for efficient and flexible communication between the hub and spokes, as the tunnels can be created and torn down as needed. This dynamic allocation of tunnels helps in optimizing network resources and simplifies the management of the VPN network.
16.
Which two scenarios are examples of remote access VPNs? (Choose two.)
Correct Answer(s)
C. A mobile sales agent is connecting to the company network via the Internet connection at a hotel.
E. An employee who is working from home uses VPN client software on a laptop in order to connect to the company network.
Explanation
The two scenarios that are examples of remote access VPNs are:
1) A mobile sales agent connecting to the company network via the Internet connection at a hotel. This is considered a remote access VPN because the sales agent is accessing the company network remotely from outside the office using the hotel's Internet connection.
2) An employee working from home using VPN client software on a laptop to connect to the company network. This is also a remote access VPN as the employee is accessing the company network remotely from their home using VPN client software.
17.
Refer to the exhibit. What solution can provide a VPN between site A and site B to support encapsulation of any Layer 3 protocol between the internal networks at each site?
Correct Answer
A. A GRE tunnel
Explanation
A GRE tunnel (Generic Routing Encapsulation) can provide a VPN between site A and site B to support encapsulation of any Layer 3 protocol between the internal networks at each site. GRE tunnels allow the encapsulation of various protocols within IP packets, providing a secure and private connection between the two sites. This allows for the transmission of any Layer 3 protocol, making it a suitable solution for creating a VPN between site A and site B.
18.
Refer to the exhibit. Which IP address is configured on the physical interface of the CORP router?
Correct Answer
C. 209.165.202.133
Explanation
The IP address configured on the physical interface of the CORP router is 209.165.202.133.
19.
Which three statements are characteristics of generic routing encapsulation (GRE)? (Choose three.)
Correct Answer(s)
A. GRE encapsulation supports any OSI Layer 3 protocol.
B. GRE is stateless.
C. GRE does not have strong security mechanisms.
Explanation
1. GRE encapsulation supports any OSI Layer 3 protocol: This means that GRE can encapsulate and carry any Layer 3 protocol, making it flexible and versatile.
2. GRE is stateless: GRE does not keep track of the state or connection information, which means it does not maintain any session information.
3. GRE does not have strong security mechanisms: GRE does not provide robust security features by itself and may require additional security measures to ensure secure transmission.
20.
Refer to the exhibit. Which IP address would be configured on the tunnel interface of the destination router?
Correct Answer
B. 172.16.1.2
Explanation
Based on the given information, the IP address that would be configured on the tunnel interface of the destination router is 172.16.1.2.
21.
Refer to the exhibit. A tunnel was implemented between routers R1 and R2. Which two conclusions can be drawn from the R1 command output? (Choose two.)
Correct Answer(s)
C. The data that is sent across this tunnel is not secure.
E. A GRE tunnel is being used.
Explanation
The first conclusion that can be drawn from the R1 command output is that the data sent across this tunnel is not secure. This can be inferred from the fact that the tunnel mode being used is not specified as providing encryption.
The second conclusion that can be drawn is that a GRE (Generic Routing Encapsulation) tunnel is being used. This can be inferred from the fact that the tunnel mode being used is explicitly mentioned as "Tunnel mode gre ip".
Therefore, the correct answer is that the data sent across this tunnel is not secure and a GRE tunnel is being used.
22.
What is used by BGP to determine the best path to a destination?
Correct Answer
C. Attributes
Explanation
BGP (Border Gateway Protocol) uses attributes to determine the best path to a destination. These attributes include factors such as network policies, routing metrics, and path characteristics. By evaluating these attributes, BGP can make informed decisions about the most efficient and reliable path to reach a particular destination. The cost, hop count, and administrative distance are also important factors in routing protocols, but BGP specifically relies on attributes for path selection.
23.
What command specifies a BGP neighbor that has an IP address of 5.5.5.5/24 and that is in AS 500?
Correct Answer
A. (config-router)# neighbor 5.5.5.5 remote-as 500
Explanation
The correct answer is "(config-router)# neighbor 5.5.5.5 remote-as 500". This command is used to specify a BGP neighbor with the IP address of 5.5.5.5/24 and in AS 500. It configures the BGP neighbor relationship by specifying the remote AS number as 500 for the neighbor with the IP address of 5.5.5.5.
24.
True or False?Multiple BGP processes can run on a router.
Correct Answer
B. False
Explanation
Multiple BGP processes cannot run on a single router. BGP (Border Gateway Protocol) is a routing protocol that is used to exchange routing information between different autonomous systems (AS). Each BGP process on a router is responsible for handling the routing information of a specific AS. Therefore, a router can only run a single BGP process to handle the routing information for one AS.
25.
Refer to the exhibit. Which two configurations will allow router R1 to establish a neighbor relationship with router R2? (Choose two.)
Correct Answer(s)
B. R1(config)# router bgp 65001R1(config-router)# network 192.168.10.0R1(config-router)# neighbor 209.165.200.226 remote-as 65002
F. R2(config)# router bgp 65002R2(config-router)# network 192.168.20.0R2(config-router)# neighbor 209.165.200.225 remote-as 65001
Explanation
The first configuration allows router R1 to establish a neighbor relationship with router R2 because it configures BGP on R1 with the AS number 65001, advertises the network 192.168.10.0, and specifies the neighbor 209.165.200.226 with the remote AS number 65002. This matches the BGP configuration on R2, where it advertises the network 192.168.20.0 and specifies the neighbor 209.165.200.225 with the remote AS number 65001. These configurations ensure that both routers are using the same AS numbers and have the correct network advertisements and neighbor configurations to establish a neighbor relationship.
26.
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.What is the code displayed on the web page?
Correct Answer
B. BGP is running!
Explanation
The code displayed on the web page is "BGP is running!" because the message "BGP is running!" is included in the given text.