1.
Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of an access layer switch and connects three PCs. The engineer attempts to ping from each PC to the other connected PCs to test the configuration. Which statement describes the result of the last step?
Correct Answer
B. Host 1 can ping Host 3.
Explanation
Host 1 can ping Host 3 because they are directly connected to the same access layer switch. However, Host 1 cannot ping Host 2 because they are not directly connected to each other. Similarly, Host 2 cannot ping any other host because it is only connected to the switch and not directly to any other host.
2.
Refer to the exhibit. Based on the EIGRP configuration that is shown, what can the field engineer conclude about the EIGRP authentication between RouterA and RouterB?
Correct Answer
C. Authentication will succeed and EIGRP updates can be exchanged.
Explanation
The field engineer can conclude that the EIGRP authentication between RouterA and RouterB will succeed and EIGRP updates can be exchanged. This can be inferred from the fact that both routers have the same key chain name "EIGRP_AUTH" configured and the "key 1" command is used on both routers, indicating that a single key is configured for authentication.
3.
What is a characteristic of FTP traffic flows?
Correct Answer
C. Large packet sizes for transfers
Explanation
FTP (File Transfer Protocol) is a protocol used for transferring files over a network. One characteristic of FTP traffic flows is that they typically involve large packet sizes for transfers. This is because FTP is designed to handle the transfer of large files, so it uses larger packets to optimize the transfer process and reduce overhead. By using larger packets, FTP can transfer files more efficiently, resulting in faster transfer speeds.
4.
*** If a router is unable to find a suitable IOS to load into RAM, in what mode does the bootprocess end?
Correct Answer
C. Rommon mode
Explanation
When a router is unable to find a suitable IOS to load into RAM, the boot process ends in rommon mode. Rommon mode, also known as ROM Monitor mode, is a special diagnostic mode that allows the router to recover from various booting issues. In this mode, the router has limited functionality and can only perform basic tasks such as loading a new IOS image or configuring essential settings. It is used for troubleshooting and troubleshooting purposes when the router encounters problems during the boot process.
5.
In a converged network, which two types of traffic would be categorized as real-timetraffic? (Choose two.)
Correct Answer(s)
D. Videoconferencing
E. Voice over IP
Explanation
Videoconferencing and voice over IP would be categorized as real-time traffic in a converged network. Real-time traffic refers to data that requires immediate transmission and is time-sensitive, such as live video and voice communication. These types of traffic require low latency and high bandwidth to ensure smooth and uninterrupted communication.
6.
A company uses the Frame Relay network to establish a VPN connection between headquarters and the branch office. The company wants to add a backup link in case theFrame Relay connection fails. The backup link will use the business DSL connection throughanother ISP. How should the router be configured to include the backup link?
Correct Answer
B. Create a floating static route
Explanation
A floating static route should be created in order to include the backup link. A floating static route is a backup route that is only used if the primary route fails. It has a higher administrative distance than the primary route, so it will only be used if the primary route is unavailable. This ensures that traffic will be automatically rerouted to the backup link if the Frame Relay connection fails.
7.
Refer to the exhibit. What is the spanning-tree role of all the enabled interfaces of SW11
Correct Answer
C. Designated
Explanation
The correct answer is "designated." In a spanning tree protocol, each switch in the network is assigned a role for each of its interfaces. The designated role is given to the interface that provides the best path to reach the root bridge. In this case, all the enabled interfaces of SW11 have been assigned the designated role, indicating that they are the best paths to reach the root bridge.
8.
A WIC-1T module needs to be installed in a Cisco 1841 router that currently has a WIC-2T module in slot 0. What should the network technician do first?
Correct Answer
B. Turn off the power to the router before installing the new module.
Explanation
The network technician should turn off the power to the router before installing the new module. This is necessary to ensure that there is no electrical current flowing through the router while the module is being installed, which can help prevent any potential damage to the module or the router itself. Turning off the power also ensures that the installation process is safe for the technician.
9.
During prototype testing, a LAN switch fails. As the switch re-initializes using the default parameters, a port that has a PC attached transitions to the forwarding state within onesecond. What protocol would support this feature?
Correct Answer
E. RSTP
Explanation
RSTP (Rapid Spanning Tree Protocol) would support this feature. RSTP is an improvement over the original STP (Spanning Tree Protocol) and provides faster convergence times. It achieves this by reducing the amount of time it takes for a port to transition from blocking to forwarding state. In this scenario, when the LAN switch fails and re-initializes, the port with the PC attached transitions to the forwarding state within one second, indicating that RSTP is being used.
10.
What are two accurate descriptors of a DLCI? (Choose two.)
Correct Answer(s)
A. Frame Relay Layer 2 address
C. Locally significant circuit endpoint
Explanation
A DLCI (Data Link Connection Identifier) is a Frame Relay Layer 2 address that identifies a specific circuit or virtual connection within a Frame Relay network. It is used to establish communication between devices in the network. Additionally, a DLCI is locally significant, meaning it is only recognized within the local network and does not have any significance outside of it. Therefore, the two accurate descriptors of a DLCI are that it is a Frame Relay Layer 2 address and a locally significant circuit endpoint.
11.
A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. The technician asks the caller to talk to nearby users to see if other machines are affected. The caller reports that several immediate neighbors in the same department have a similar problem and that they cannot ping each other. Those who are seated in other departments have connectivity. What should the technician check as the first step in troubleshooting the issue?
Correct Answer
C. The status of the departmental workgroup switch in the wiring closet
Explanation
The technician should check the status of the departmental workgroup switch in the wiring closet as the first step in troubleshooting the issue. Since multiple machines in the same department are affected and unable to ping each other, it suggests that the problem is localized to that department. Checking the workgroup switch will help determine if there is an issue with the switch itself or if it is causing a network connectivity problem for the affected machines.
12.
A NetworkingCompany engineer is on a support call resolving technical problems for aclient network. After the issue is resolved, the engineer also provides a training session forthe network support staff. What role is the engineer filling on the networking companyteam?
Correct Answer
A. post-sales field engineer
Explanation
The engineer is filling the role of a post-sales field engineer. This is because they are resolving technical problems for a client network, which is a post-sales activity. Additionally, they are providing a training session for the network support staff, which is also a post-sales activity aimed at supporting the client after the sale has been made.
13.
Refer to the exhibit. The network administrator has used the Cisco Feature Navigator to choose a Cisco IOS image to install on a router. Given the exhibited output of the showversion command, which statement is true about the capacity of the router to use this CiscoIOS image?
Correct Answer
D. There is not enough DRAM but enough flash
Explanation
The output of the "show version" command shows that the router has 128 MB of DRAM and 256 MB of flash memory. However, the Cisco IOS image that the network administrator wants to install requires 256 MB of DRAM. Therefore, there is not enough DRAM on the router to use this Cisco IOS image. However, there is enough flash memory available.
14.
Refer to the exhibit. The named ACL “Managers” already exists on the router. What will happen when the network administrator issues the commands that are shown in the exhibit?
Correct Answer
B. The commands are added at the end of the existing Managers ACL.
Explanation
The given exhibit shows the commands that the network administrator issues. These commands do not indicate any action to delete or replace the existing "Managers" ACL. Therefore, the commands will be added at the end of the existing ACL, expanding its rules and allowing for more specific access control.
15.
Refer to the exhibit. A company with four servers in its server farm has not enabled PVRST on the switches that connect to the server farm segment. What will happen withinthe network if a primary link goes down? (nem talaltam kepet)
Correct Answer
B. Convergence time will be slow and possibly cause applications to time out.
Explanation
If PVRST (Per-VLAN Rapid Spanning Tree) is not enabled on the switches connecting to the server farm segment, the network will experience slow convergence time in the event of a primary link failure. This means that it will take a longer time for the network to reconfigure and find an alternate path, which can result in applications timing out. Enabling PVRST allows for faster convergence by providing rapid spanning tree protocol per VLAN, ensuring that the network can quickly adapt to link failures and maintain connectivity.
16.
What type of ACL permits outbound traffic, but permits inbound traffic only if it is aresponse to the traffic that is initiated from inside the network?
Correct Answer
B. Reflexive
Explanation
A reflexive ACL permits outbound traffic, allowing it to leave the network. However, it only permits inbound traffic if it is a response to the traffic that was initiated from inside the network. This means that the ACL keeps track of the state of the connection and allows the response traffic to pass through while blocking any unsolicited inbound traffic.
17.
A network administrator has configured Frame Relay on a serial interface and issued theshow interfaces serial command. The output shows that the interface is up and the lineprotocol is up. However, pings to the remote router across the link fail. What should the nextstep be to ensure that the IP address of the remote router appears in the Frame Relay maptable of the local router?
Correct Answer
C. Configure the router using the frame-relay map ip command
Explanation
The correct answer is to configure the router using the frame-relay map ip command. This command is used to manually map the IP address of the remote router to the corresponding DLCI (Data Link Connection Identifier) in the Frame Relay map table of the local router. By doing this, the local router will know how to forward packets to the remote router over the Frame Relay network.
18.
Refer to the exhibit. A pre-sales systems engineer receives a diagram of the exhibited WAN implementation from a customer. EIGRP is the routing protocol that is used on theWAN. None of the parameters for EIGRP metric calculation have been modified in anyrouter configurations. Which statement is true about the routing table on router RM?
Correct Answer
C. There is a single route to the 192.168.24.0/24 LAN using the Metro Ethernet connection
Explanation
Based on the given information, the routing protocol used on the WAN is EIGRP and none of the parameters for EIGRP metric calculation have been modified. Therefore, the routing table on router RM will only have a single route to the 192.168.24.0/24 LAN using the Metro Ethernet connection. This is because EIGRP will select the best route based on its metric calculation, and since no modifications have been made, it will choose the Metro Ethernet connection as the best route.
19.
Refer to the exhibit. A network administrator is configuring a new router to provide routing between VLANs. The administrator removes the router from the box and connectsthe Fa0/0 interface to a trunking port on the switch. After the configuration is applied to therouter, as shown in the exhibit, the traffic between VLANs fails. What is causing this tooccur?
Correct Answer
B. The subinterfaces of the R1 router should have IP addresses applied
Explanation
The subinterfaces of the R1 router should have IP addresses applied. Without IP addresses, the subinterfaces cannot communicate with each other or with devices on the VLANs. IP addresses are necessary for routing between VLANs to occur.
20.
A bank is planning to add a secure, authenticated WAN connection to a rural branchoffice. The connection must provide bandwidth of up to 10 Mb/s with QoS supporting VoIP.Which WAN connection type should the network designer recommend?
Correct Answer
C. Leased line
Explanation
A leased line would be the most suitable WAN connection type for the bank's requirements. Leased lines provide dedicated, secure, and reliable connections with guaranteed bandwidth, making them ideal for supporting VoIP and ensuring high-quality voice communication. DSL and ISDN connections may not provide sufficient bandwidth for the desired 10 Mb/s, and frame relay is an older technology that is less commonly used today.
21.
A company has branch offices at several locations across the country. Which securityimplementation would provide a cost-effective, secure, and authenticated connection tocentralized internal resources that are located at company headquarters, without requiringconfiguration for individual employees at the branch offices?
Correct Answer
B. Site-to-site VPN
Explanation
A site-to-site VPN would provide a cost-effective, secure, and authenticated connection to centralized internal resources located at the company headquarters without requiring configuration for individual employees at the branch offices. This type of VPN allows for secure communication between the branch offices and the headquarters by establishing a virtual network connection over the internet. It eliminates the need for individual employee configurations and ensures that all branch offices can access the centralized resources securely and efficiently.
22.
Refer to the exhibit. An extended ACL has been created to deny traffic from the192.168.35.0/24 network to the web server with IP address 209.165.201.15. According to Cisco best practices, where should the ACL be applied
Correct Answer
A. RTB Fa0/0 inbound
Explanation
The extended ACL should be applied on the RTB Fa0/0 inbound interface. This is because the ACL is intended to deny traffic from the 192.168.35.0/24 network to the web server, which means it needs to be applied on the interface that is connected to that network. Applying it on the inbound direction ensures that the ACL is evaluated before the traffic enters the router, allowing it to effectively block any traffic from the specified network to the web server with IP address 209.165.201.15.
23.
Which EIGRP configuration commands should a network administrator enter on router R1 to correctly advertise a single summary route to router MAIN for the campus LAN?
Correct Answer
A. Router eigrp 11 network 10.5.0.0 network 192.168.0.0 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252
Explanation
The correct answer is "router eigrp 11 network 10.5.0.0 network 192.168.0.0 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252". This command configures EIGRP on router R1 and specifies the networks that should be advertised. The "network 10.5.0.0" command advertises the network connected to interface s0/1/0, and the "network 192.168.0.0" command advertises the campus LAN network. The "no auto summary" command ensures that EIGRP does not automatically summarize the routes. Finally, the "interface s0/1/0 ip address 10.5.0.1 255.255.255.252" command assigns the IP address and subnet mask to the interface.
24.
Refer to the exhibit. What is an accurate description of the first neighbor that is displayedin the output?
Correct Answer
B. 24 port 2950 switch that is connected to Fa0/0 on Router1
Explanation
The first neighbor displayed in the output is a 24 port 2950 switch that is connected to Fa0/0 on Router1.
25.
During prototype testing, the network designer performs a test to determine the ability of the network to recover from a link or device failure. Which design goal is validated if the testis a success?
Correct Answer
C. Availability
Explanation
If the test to determine the network's ability to recover from a link or device failure is successful, it validates the design goal of availability. Availability refers to the network's ability to remain operational and accessible to users even in the event of failures or disruptions. A successful recovery from a failure demonstrates that the network is designed to minimize downtime and ensure continuous availability of services.
26.
A network designer has chosen to specify the use of a dedicated firewall appliance at theperimeter o a large network. Why would the designer use a dedicated firewall rather thanusing the Cisco IOS firewall feature set on the existing router?
Correct Answer
D. Heavy network traffic will be handled best by using a dedicated device
Explanation
Using a dedicated firewall device is more suitable for handling heavy network traffic because it is specifically designed and optimized for firewall functions. The Cisco IOS firewall feature set on the existing router may not have the same level of performance and capacity as a dedicated firewall appliance. Additionally, using a dedicated device allows for better scalability and flexibility in terms of adding new features and functionalities as the network grows.
27.
A company has help desk staff that is not highly trained in VPNs. What two features ortechnologies must the network designer identify as training needs in order for the help desk to support secure remote access for teleworkers? (Choose two.)
Correct Answer(s)
C. Tunneling protocols
E. Encryption algorithms
Explanation
The help desk staff needs to be trained in tunneling protocols in order to understand how secure remote access for teleworkers is established and maintained. Tunneling protocols are used to encapsulate and encrypt data, ensuring its secure transmission over an untrusted network. Additionally, the staff needs training in encryption algorithms to understand how data is encrypted and decrypted, ensuring confidentiality and integrity during transmission.
28.
What is a function that is associated with the access layer in a hierarchically designednetwork?
Correct Answer
D. Serves as a network connection point for IP telepHony devices
Explanation
The function associated with the access layer in a hierarchically designed network is to serve as a network connection point for IP telephony devices. This means that the access layer provides the necessary infrastructure and connectivity for IP telephony devices, allowing them to connect to the network and communicate with other devices. This function is important in ensuring that IP telephony services, such as voice calls and video conferencing, can be effectively implemented and utilized within the network.
29.
A network engineer is prototyping a new IP addressing and summarization strategy for anew network that will be integrated into the existing infrastructure. Which method isappropriate for testing the addressing scheme?
Correct Answer
D. Using a network simulation tool
Explanation
Using a network simulation tool is the appropriate method for testing the addressing scheme. This allows the network engineer to create a virtual network environment and simulate different scenarios without impacting the production network or requiring actual network equipment. It provides a safe and controlled environment for testing and validating the new IP addressing and summarization strategy before implementing it in the actual network.
30.
At the distribution layer of a hierarchical network, what are two advantages of usingLayer 3 devices instead of Layer 2 switches? (Choose two.
Correct Answer(s)
D. Enables traffic filtering based on subnet addresses
E. provides connectivity between different VLANs
Explanation
At the distribution layer of a hierarchical network, using Layer 3 devices instead of Layer 2 switches provides two advantages. Firstly, it enables traffic filtering based on subnet addresses, allowing for better control and management of network traffic. Secondly, it provides connectivity between different VLANs, facilitating communication and data transfer between different virtual networks. These advantages enhance network security, improve network performance, and simplify network configuration and management.
31.
refer to the exhibit. Access list 100 is applied inbound to interface serial 0/0/0 on the SOHO Router1. Which traffic will be denied by the configuration?
Correct Answer
C. ICMP traffic from the ISP to server 1
Explanation
The access list 100 is applied inbound on interface serial 0/0/0, which means it will filter traffic coming into the router from the ISP. The configuration does not specifically deny DNS traffic, FTP traffic, or traffic on port 23. However, it denies ICMP traffic from the ISP to server 1. Therefore, ICMP traffic from the ISP to server 1 will be denied by the configuration.
32.
What supports the ability of streaming video to be sent to a group of viewerssimultaneously without congesting the entire network?
Correct Answer
B. Multicast
Explanation
Multicast supports the ability of streaming video to be sent to a group of viewers simultaneously without congesting the entire network. Multicast allows the video data to be sent in a single transmission from the source to multiple recipients who have joined the multicast group. This reduces network congestion as the data is only transmitted once, and routers in the network can efficiently replicate and forward the data to the members of the multicast group.
33.
What functionality does NBAR provide to network technicians?
Correct Answer
C. Allows for classification and monitoring of network traffic
Explanation
NBAR (Network-Based Application Recognition) provides the functionality of classification and monitoring of network traffic. It allows network technicians to identify and categorize different types of network traffic, such as web browsing, video streaming, or file transfer. This information can be used for various purposes, including optimizing network performance, implementing quality of service (QoS) policies, and identifying potential security threats. By monitoring network traffic, technicians can gain insights into the usage patterns, bandwidth consumption, and overall health of the network.
34.
When implementing a security policy, which two actions should be included as part of thesecurity checklist? (Choose two.)
Correct Answer(s)
D. Set timeouts and ACLs on VTY lines.
E. Shut down any unused ports and interfaces.
Explanation
The two actions that should be included as part of the security checklist are setting timeouts and ACLs on VTY lines and shutting down any unused ports and interfaces. Setting timeouts and ACLs on VTY lines helps to control access to the device and prevent unauthorized access. Shutting down unused ports and interfaces reduces the attack surface and prevents potential security vulnerabilities. Disabling all logging, enabling Telnet on TCP port 23, and using HTTP for web administration would not enhance security and could potentially create security risks.
35.
Refer to the exhibit. The routers are configured with RIPv2 with default configurations.When attempting to communicate with other networks, hosts from 172.16.2.0/24 areexperiencing connectivity issues. What could be done to resolve this issue?
Correct Answer
B. Disable automatic route summarization.
36.
Refer to the exhibit. A customer has a problem with connectivity in the network. Based on the IP addressing scheme, what is causing the problem?
Correct Answer
B. The WAN link that connects R1 to R2 overlaps with the R3 LAN.
Explanation
The problem with connectivity in the network is caused by the WAN link that connects R1 to R2 overlapping with the R3 LAN. This overlap creates a conflict in IP addressing, resulting in connectivity issues.
37.
The network designer recommends using RSTP in the design of a new data center. Thereare multipl redundant Layer 2 switches and links contained in the new design. What is thebenefit of using RSTP rather than STP in this situation?
Correct Answer
C. Spanning Tree convergence times are reduced.
Explanation
Using RSTP (Rapid Spanning Tree Protocol) instead of STP (Spanning Tree Protocol) in a design with redundant Layer 2 switches and links reduces the convergence times of the Spanning Tree. Convergence time refers to the time it takes for the network to reconfigure itself after a change or failure. RSTP is an improvement over STP as it provides faster convergence by quickly detecting and adapting to changes in the network topology. This ensures that any disruptions or failures in the network are resolved more quickly, resulting in improved overall network performance and availability.
38.
What can be broadcast over the wireless network to help a user connect to the network and use wireless services?
Correct Answer
A. SSID
Explanation
SSID stands for Service Set Identifier, which is a unique name that identifies a wireless network. When broadcasting the SSID, it allows users to identify and connect to the correct network. Therefore, broadcasting the SSID helps a user connect to the network and use wireless services.
39.
Refer to the exhibit. A new host needs to be connected to the switch and be assigned to VLAN 2. Router RA is attached to the switch via a trunk and is configured as shown. What IP address should be assigned to this new host?
Correct Answer
D. 192.168.1.44 /28
Explanation
Based on the given information, the new host needs to be assigned to VLAN 2. Since the subnet mask is /28, it means that the first 28 bits are used for the network address and the remaining 4 bits are used for host addresses. Therefore, the network address would be 192.168.1.32. The host addresses within this network range from 192.168.1.33 to 192.168.1.46. The IP address 192.168.1.44 falls within this range, so it should be assigned to the new host.
40.
Refer to the exhibit. A technician at the ISP site asks the network administrator at theclient site to change the CHAP password as part of the routing security maintenance. Afterthe administrator makes the change and reboots the router, the technician issues a showinterfaces serial 0/0/0 command. According to the output, what can be concluded about theserial connection between the client site and ISP site?
Correct Answer
B. The administrator probably configured the wrong password.
Explanation
Based on the given information, the output of the "show interfaces serial 0/0/0" command suggests that the serial connection between the client site and ISP site is functional. However, the output also indicates that the authentication has failed, which implies that the administrator most likely configured the wrong password for CHAP authentication.
41.
A network administrator of a middle-sized company is asked to upgrade the routingprotocol of the network to support VLSM and route summarization. The current companynetwork contains both Cisc and non-Cisco routers. Which routing protocol should be usedfor the upgrade?
Correct Answer
C. RIP2
Explanation
RIP2 should be used for the upgrade because it supports Variable Length Subnet Masking (VLSM) and route summarization. RIP2 is an enhanced version of RIP (Routing Information Protocol) and is compatible with both Cisco and non-Cisco routers. BGP (Border Gateway Protocol) is typically used for large-scale networks and is not necessary for a middle-sized company. EIGRP (Enhanced Interior Gateway Routing Protocol) is a Cisco proprietary protocol and may not be compatible with non-Cisco routers. RIP1 does not support VLSM and route summarization.
42.
Which two technologies can provide data integrity in a VPN connection? (Choose two.)
Correct Answer(s)
C. MD5
E. SHA-1
Explanation
MD5 and SHA-1 are both cryptographic hash functions that can provide data integrity in a VPN connection. These algorithms generate a unique hash value for the data being transmitted, which can be used to verify that the data has not been tampered with during transmission. MD5 and SHA-1 are widely used in VPN protocols to ensure the integrity of the data being sent between the VPN endpoints.
43.
A company establishes a Frame Relay connection between corporate headquarters and abranch office. The CIR for the connection is set at 4 Mb/s. Which statement is true about thisWAN connection?
Correct Answer
B. If the company sends data faster than 4 Mb/s, some of the data frames will be flagged with a DE bit
Explanation
If the company sends data faster than the CIR (committed information rate) of 4 Mb/s, some of the data frames will be flagged with a DE (discard eligible) bit. This means that the excess data will be marked as eligible for discard by the network if congestion occurs. This allows the network to prioritize important data and discard less important data during periods of high traffic.
44.
Which two statements are true about the enhancements IPv6 has over IPv4? (Choose two.)
Correct Answer(s)
A. IPv6 does not support broadcasts
B. IPv6 uses a simplified header structure.
Explanation
IPv6 does not support broadcasts because it uses multicast instead. This allows for more efficient communication to multiple hosts.
IPv6 uses a simplified header structure compared to IPv4. The IPv6 header is fixed at 40 bytes, whereas the IPv4 header can vary in size. This simplification helps improve the efficiency and speed of packet processing.
45.
A company plans to establish Frame Relay connections between corporate headquartersand severa branch offices. The network designer recommends using one physical interface onthe edge router to support the new Frame Relay connections. The company currently usesRIPv2 for routing and plans no changes to the RIPv2 configuration. What should be done toensure that each branch office link is a separate subnet and that routing updates aresuccessful between corporate headquarters and the branch offices?
Correct Answer
B. Configure point-to-point subinterfaces on the pHysical interface.
Explanation
To ensure that each branch office link is a separate subnet and that routing updates are successful between corporate headquarters and the branch offices, configuring point-to-point subinterfaces on the physical interface is the recommended solution. This configuration allows for individual subnets to be created for each branch office, ensuring separation and proper routing. By using point-to-point subinterfaces, each connection is treated as a separate link, allowing for efficient routing updates between the headquarters and branch offices.
46.
The network infrastructure at the headquarters of an organization consists of Cisconetwork devices that are running RIPv1. As part of an upgrade project, a portion of thecompany backbone will be increased to 10 Gb/s and needs to support unequal cost loadbalancing between routers. The IP addressing scheme is also changing and needs to supportVLSM and CIDR. Which routing protocol should be selected for the network?
Correct Answer
B. EIGRP
Explanation
EIGRP (Enhanced Interior Gateway Routing Protocol) should be selected for the network. EIGRP supports unequal cost load balancing between routers, which is a requirement for the organization's upgrade project. Additionally, EIGRP also supports VLSM (Variable Length Subnet Masking) and CIDR (Classless Inter-Domain Routing), which are necessary for the changing IP addressing scheme.
47.
As part of network monitoring, a network administrator receives an alert that the CPUusage of the core router reaches 90% several times a day. Which protocol is in use to monitorthe network performance
Correct Answer
B. SNMP
Explanation
SNMP (Simple Network Management Protocol) is the correct answer for this question. SNMP is a protocol used for network management and monitoring. It allows network administrators to monitor the performance of network devices, such as routers, switches, and servers. In this scenario, the network administrator receives an alert about the high CPU usage of the core router. By using SNMP, the administrator can monitor and manage the router's performance, including CPU usage, and take necessary actions to optimize the network's performance.
48.
What Cisco VPN solution allows for simple configuration of VPNs on the laptops of remote and mobile employees?
Correct Answer
B. EasyVPN Remote
Explanation
EasyVPN Remote is the correct answer because it is a Cisco VPN solution that allows for simple configuration of VPNs on the laptops of remote and mobile employees. This solution provides an easy and convenient way for employees to connect securely to their company's network from remote locations. By using EasyVPN Remote, employees can access company resources and data while maintaining the necessary security measures.
49.
Which two processes allow a smooth transition from IPv4 to IPv6? (Choose two.)
Correct Answer(s)
B. Tunneling
C. Dual stack
Explanation
Tunneling and dual stack are the two processes that allow a smooth transition from IPv4 to IPv6. Tunneling involves encapsulating IPv6 packets within IPv4 packets, allowing them to be transmitted over an IPv4 network. This allows for the coexistence of IPv4 and IPv6 networks. Dual stack refers to the implementation of both IPv4 and IPv6 protocols on network devices, allowing them to communicate with both IPv4 and IPv6 networks. These processes enable a gradual transition from IPv4 to IPv6 without disrupting existing IPv4 infrastructure.
50.
How should a network engineer determine if a router module is hot-swappable?
Correct Answer
B. Check the router and interface module data sheets on CCO to determine hot-swappability.
Explanation
The correct answer is to check the router and interface module data sheets on CCO to determine hot-swappability. This is because the data sheets provide information about the specific router and module, including whether they support hot-swapping. The other options may not provide accurate information or may not be safe practices for determining if a module is hot-swappable.