1.
Which type of network allows a customer to connect to a secure company website to check on a delivery date?
Correct Answer
D. Extranet
Explanation
An extranet is a type of network that allows external users, such as customers or partners, to securely access specific resources or services of a company. In this case, the customer is connecting to a secure company website to check on a delivery date, which suggests the use of an extranet. An extranet provides controlled access to certain parts of a company's internal network, allowing authorized users to interact and collaborate with the company's systems and data.
2.
Which layer of the three-layer hierarchical design model is used to filter FTP traffic from a specific host?
Correct Answer
B. Distribution
Explanation
The Distribution layer of the three-layer hierarchical design model is used to filter FTP traffic from a specific host. This layer is responsible for routing and filtering traffic between different network segments. By implementing access control lists (ACLs) or other filtering mechanisms at the Distribution layer, specific hosts or types of traffic can be allowed or denied. Therefore, the Distribution layer is the appropriate layer for filtering FTP traffic from a specific host.
3.
In the ECNM, where should an IPS or IDS be configured.
Correct Answer
A. Enterprise Edge
Explanation
An IPS or IDS should be configured in the Enterprise Edge. This is because the Enterprise Edge is the boundary between the internal network and the external network, where the organization's network connects to the internet or other external networks. By placing the IPS or IDS in the Enterprise Edge, it can monitor and analyze the incoming and outgoing traffic, detecting and preventing any potential security threats or attacks before they reach the internal network. This helps to protect the organization's network and sensitive data from unauthorized access or malicious activities.
4.
In ECNM, where should QoS be implemented?
Correct Answer
B. Building Distribution Module
Explanation
QoS (Quality of Service) should be implemented in the Building Distribution Module in ECNM (Enterprise Campus Network Module). The Building Distribution Module is responsible for connecting multiple Building Access Modules and aggregating their traffic before sending it to the Campus Core module. By implementing QoS in the Building Distribution Module, it allows for the prioritization and management of network traffic, ensuring that critical applications and services receive the necessary bandwidth and quality required for optimal performance. This helps in maintaining a consistent and reliable network experience for users throughout the enterprise campus network.
5.
Which tool would enable a teleworker to communicate in real time with colleague?
Correct Answer
C. Chat
Explanation
The tool that would enable a teleworker to communicate in real time with a colleague is chat. Chat allows for instant messaging and real-time communication, allowing teleworkers to have quick and efficient conversations with their colleagues regardless of their physical location. FTP is a file transfer protocol, not a communication tool. Email allows for asynchronous communication and is not real-time. Telnet is a remote login protocol and does not provide real-time communication capabilities.
6.
What type of traffic, if found on an enterprise WAN link, indicates a problem with the network design?
Correct Answer
E. All the above
Explanation
If all of the listed types of traffic (departmental file sharing, printing, internal backup, and intracampus voice) are found on an enterprise WAN link, it indicates a problem with the network design. This is because these types of traffic should ideally be handled within the local network or through more efficient means such as dedicated servers or local backups. Having them traverse the WAN link can lead to increased network congestion, reduced performance, and unnecessary strain on the network infrastructure.
7.
What information can find by using the show mac-address-table command on a Cisco Catalyst switch?
Correct Answer
B. Mac address of the hosts connected to the switch ports
Explanation
The show mac-address-table command on a Cisco Catalyst switch can provide information about the MAC addresses of the hosts connected to the switch ports. This command allows network administrators to view the MAC addresses of devices that are connected to the switch, enabling them to identify and manage network traffic and troubleshoot connectivity issues. By knowing the MAC addresses of the hosts, administrators can also track and control network access for security purposes.
8.
What troubleshooting a network problem, the network administrator issues the show version command on a router. What information can be found using this command?
Correct Answer
A. The amount of NVRAM, DRAM, and flash memory installed on the router
Explanation
The show version command on a router provides information about the amount of NVRAM, DRAM, and flash memory installed on the router. It does not provide information about bandwidth encapsulation, I/O statistics on the interfaces, the difference between backup and current configuration, or the version of routing protocols running on the router.
9.
After gathering a through list of network applications, the traffic generated by these applications, and the priority of this traffic, a network engineer wants to integrate this information into a single document for analysis. How can this be accomplished?
Correct Answer
B. Create a logical topology map of the network and annotate it with the network application data
Explanation
The network engineer can accomplish this by creating a logical topology map of the network and annotating it with the network application data. This will provide a visual representation of the network and its applications, allowing for easy analysis and identification of traffic priorities.
10.
One evening a network administrator attempted to access a recently deployed website and received a “page not found” error. The next day the administrator checked the web server logs and noticed that during the same hour that the site failed to load, there was hundreds of requests for the website home page. All of the requests originated from the same IP address. Given this information, what might the network administrator conclude?
Correct Answer
B. It is likely that someone attempted a DoS attack.
Explanation
Based on the information provided, the network administrator can conclude that someone likely attempted a DoS (Denial of Service) attack on the website. The fact that there were hundreds of requests for the website home page originating from the same IP address during the hour when the site failed to load suggests a deliberate attempt to overload the server and disrupt its functionality. This pattern of activity is indicative of a DoS attack rather than normal web surfing activity or server capacity issues. The possibility of the web server being turned off is not supported by the given information.
11.
What type of media typically connects a MDF switch to an IDF switch in another building?
Correct Answer
A. Fiber-optic
Explanation
Fiber-optic cables are typically used to connect a Main Distribution Frame (MDF) switch to an Intermediate Distribution Frame (IDF) switch in another building. Fiber-optic cables use strands of glass or plastic fibers to transmit data using light signals, allowing for high-speed and long-distance communication. This type of media is preferred for long-distance connections between buildings due to its ability to provide high bandwidth, immunity to electromagnetic interference, and low signal loss.
12.
Which the following devices can receive power over the same twisted pair Ethernet cable that carries data?
Correct Answer
G.
Wireless access points, Web cameras, IP pHone
Explanation
Wireless access points, web cameras, and IP phones can receive power over the same twisted pair Ethernet cable that carries data. This is possible through a technology called Power over Ethernet (PoE), which allows devices to receive power through the same cable used for data transmission. This eliminates the need for separate power cables and simplifies the installation process.
13.
Which of the following protocols can be used to access a Cisco router for in-band management?
Correct Answer
F. SSH & Telnet
Explanation
SSH (Secure Shell) and Telnet are both protocols that can be used for in-band management of a Cisco router. In-band management refers to the ability to manage and configure a network device using the same network infrastructure that is used for regular data traffic. SSH is a secure protocol that provides encrypted communication between the management device and the router, ensuring confidentiality and integrity of the management session. Telnet, on the other hand, is an older protocol that does not provide encryption and is considered less secure. However, it can still be used for in-band management if security is not a major concern.
14.
A network analyst is documenting the existing network at ABC Corporation. The analyst decides to start at the core router to identify and document the Cisco network devices attached to the core. Which command executed on the core router provides the required information?
Correct Answer
E. Show CDP neighbors detail
Explanation
The command "show CDP neighbors detail" provides the required information because it displays detailed information about the neighboring Cisco devices connected to the core router using the Cisco Discovery Protocol (CDP). This command will show the device ID, local interface, capability, platform, and port ID of each neighboring device, allowing the network analyst to identify and document the Cisco network devices attached to the core.
15.
A network administrator suspects that there is a problem with the configuration of the RIP routing
protocol. She investigates the interfaces and finds that all interfaces are up/up. Which of the following commands could help to identify the problem?
Correct Answer
F. Show IP route & Show IP protocols
Explanation
The "show ip route" command displays the routing table of the device, which includes all the routes learned by the RIP routing protocol. By examining the routes, the network administrator can identify any inconsistencies or errors in the routing information being advertised by RIP.
The "show ip protocols" command provides information about the active routing protocols on the device, including RIP. It displays the configuration parameters and status of the RIP protocol, allowing the administrator to check if there are any issues with the RIP configuration.
Using both commands together can help the administrator identify any problems with the RIP routing protocol and its configuration.
16.
As a network technician, you are troubleshooting a router configuration. You want to get a concise display of the status of the router interfaces. You also want to verify the IP address of each
interface and the subnet mask in slash format (/XX). Which command would you use?
Correct Answer
A. Show protocols
Explanation
The correct answer is "show protocols". This command displays the status of the router interfaces, including the IP address and subnet mask in slash format. The other options do not provide the specific information required for this troubleshooting task.
17.
Which of the following is not a type of network protection device or technique to help security?
Correct Answer
A. DoS
Explanation
A DoS (Denial of Service) attack is not a type of network protection device or technique to help security. Instead, it is a malicious attack where an attacker overwhelms a network or website with excessive traffic or requests, causing it to become inaccessible to legitimate users. Network protection devices and techniques such as firewalls, ACLs (Access Control Lists), IDS (Intrusion Detection Systems), IPS (Intrusion Prevention Systems), DMZ (Demilitarized Zone), and VPN (Virtual Private Network) are implemented to enhance network security and protect against various threats and attacks.
18.
What attribute is associated with link-state routing protocols?
Correct Answer
D. Shortest path first calculation
Explanation
Link-state routing protocols, such as OSPF and IS-IS, use the concept of shortest path first calculation. This means that each router in the network calculates the shortest path to every other router based on the information it has about the network topology. This information is then shared with other routers in the network, allowing them to build a complete map of the network and determine the best path for forwarding packets. This approach ensures efficient and optimal routing decisions, as it takes into account factors like link costs and network congestion.
19.
Which two statements are true regarding the cost calculation for link in OSPF?
Correct Answer
E. A & D
Explanation
The cost calculation for a link in OSPF can be set with the "ip ospf cost" command and it may be calculated using the formula "Reference bandwidth / Bandwidth".
20.
For what two reason would network administrator choose to enable MD5 authentication and encryption for OSPF exchanges?
Correct Answer
F. A & C
Explanation
The network administrator would choose to enable MD5 authentication and encryption for OSPF exchanges for two reasons. Firstly, it is done to prevent routing information from being falsified, ensuring the integrity and reliability of the network. Secondly, it is done to keep routing information from being captured and deciphered by unauthorized individuals, thus maintaining the confidentiality of the network. By enabling MD5 authentication and encryption, the administrator can secure the OSPF exchanges and protect the network from potential threats.