1.
What does an access control list determine when used with NAT on a Cisco route
Correct Answer
A. Addresses that are to be translated
Explanation
An access control list (ACL) determines which addresses will be translated when used with Network Address Translation (NAT) on a Cisco router. This means that the ACL specifies which IP addresses will undergo the translation process, allowing them to be converted from private IP addresses to public IP addresses, or vice versa. The ACL helps control the flow of traffic and determines which addresses will be affected by the NAT process.
2.
A technician has been asked to run the Cisco SDM one-step lockdown on a customer router. What will be the result of this process?
Correct Answer
D. The router is tested for any potential security problems and all recommended security-related configuration changes will be automatically applied.
Explanation
Running the Cisco SDM one-step lockdown on a customer router will result in the router being tested for potential security problems. Additionally, any recommended security-related configuration changes will be automatically applied. This process helps to enhance the security of the router by identifying vulnerabilities and making necessary adjustments to prevent potential threats.
3.
Refer to the exhibit. Which data transmission technology is being represented
Correct Answer
A. TDM
Explanation
The correct answer is TDM. TDM stands for Time Division Multiplexing, which is a data transmission technology that allows multiple signals to be transmitted simultaneously over a single communication channel. In TDM, each signal is assigned a specific time slot during which it can transmit data. This allows for efficient and organized transmission of multiple signals, making TDM a commonly used technology in telecommunications and networking.
4.
A network administrator is instructing a technician on best practices for applying ACLs. Which two suggestions should the administrator provide? (Choose two.)
Correct Answer(s)
C. Place standard ACLs as close to the destination as possible.
E. Extended ACLs should be applied closest to the source that is specified by the ACL.
5.
Refer to the exhibit. Which configuration command would result in the output in the exhibit
Correct Answer
E. Ip nat inside source static 192.168.0.10 172.16.76.3
Explanation
The correct answer is "ip nat inside source static 192.168.0.10 172.16.76.3". This command would result in the output shown in the exhibit because it configures a static NAT translation where the source IP address 192.168.0.10 is translated to 172.16.76.3. This means that any traffic originating from the inside network with the source IP address of 192.168.0.10 will be translated to 172.16.76.3 when it goes through the NAT process.
6.
What are three important reasons to establish a network baseline? (Choose three.)
Correct Answer(s)
B. To determine which areas in the network are underutilized or overutilized
C. To determine the performance of the network during the normal hours of operation
D. To determine what thresholds should be set for the devices that need to be monitored
Explanation
Establishing a network baseline is important for several reasons. Firstly, it allows us to determine which areas in the network are underutilized or overutilized. This information is crucial for optimizing network resources and ensuring efficient performance. Secondly, it helps us evaluate the performance of the network during normal hours of operation, providing insights into potential bottlenecks or areas needing improvement. Lastly, establishing a baseline helps determine the appropriate thresholds that should be set for devices that need to be monitored, enabling effective monitoring and troubleshooting.
7.
Which two statements are true about creating and applying access lists? (Choose two.)
Correct Answer(s)
A. There is an implicit deny at the end of all access lists.
B. One access list per port, per protocol, per direction is permitted
Explanation
Access lists are used to filter network traffic based on specific criteria. The statement "There is an implicit deny at the end of all access lists" is true because if a packet does not match any of the permit statements in an access list, it is denied by default. The statement "One access list per port, per protocol, per direction is permitted" is also true because access lists are applied to interfaces and can be configured to filter traffic based on the source and destination ports, protocols, and directions.
8.
Which functions are provided by LCP and NCP as part of the PPP layered architecture
Correct Answer
B. LCP sets up the PPP connection and its parameters. NCP handles higher layer protocol configurations
Explanation
LCP (Link Control Protocol) is responsible for setting up the PPP (Point-to-Point Protocol) connection and its parameters. This includes establishing the link, negotiating options for multiple network layer protocols, and agreeing automatically on encapsulation formats. On the other hand, NCP (Network Control Protocol) handles higher layer protocol configurations, such as configuring and managing network layer protocols like IP (Internet Protocol) or IPX (Internetwork Packet Exchange). It is responsible for link-maintenance and link-termination phases, ensuring the proper functioning of the network protocols.
9.
Refer to the exhibit. EIGRP has been configured on routers R1 and R2. Connectivity across the Frame Relay switch between routers R1 and R2 is successfully verified using the ping command. However, no EIGRP routes are appearing in the routing table. What could be a cause for this failure
Correct Answer
D. The S0/0/0 interface of router R2 has an incorrect IP address.
Explanation
The reason for the failure could be that the S0/0/0 interface of router R2 has an incorrect IP address. This would prevent proper communication between the routers and result in EIGRP routes not appearing in the routing table.
10.
Refer to the exhibit. Results of the show vlan and show vtp status commands for switches S1 and S2 are displayed in the exhibit. VLAN 11 was created on S1. Why is VLAN 11 missing from S2?
Correct Answer
B. The VTP domain names do not match.
Explanation
The VTP domain names do not match between switches S1 and S2. VTP (VLAN Trunking Protocol) is used to manage VLAN configurations across multiple switches in a domain. In order for VLAN information to be synchronized between switches, they must be in the same VTP domain with matching domain names. Since VLAN 11 was created on S1, but is missing on S2, it suggests that S1 and S2 are not in the same VTP domain or their domain names do not match.
11.
Refer to the exhibit. A network administrator is considering updating the IOS on Router1. What version of IOS is currently installed on Router1
Correct Answer
B. 12.4
Explanation
Based on the given options, the answer 12.4 indicates that the current version of IOS installed on Router1 is 12.4.
12.
Refer to the exhibit. What is placed in the address field in the header of a frame that will travel from the San Jose router to the DC router?
Correct Answer
B. DLCI 301
Explanation
The address field in the header of a frame that will travel from the San Jose router to the DC router is DLCI 301. This is because DLCI (Data Link Connection Identifier) is used in Frame Relay networks to identify virtual circuits between routers. DLCI 301 specifically indicates the virtual circuit that connects the San Jose router to the DC router.
13.
Refer to the exhibit. Which statement about the configuration is true?
Correct Answer
D. All DHCP clients in the 10.10.10.0/24 network will use 10.10.10.2 as the default gateway.
Explanation
The correct answer is "All DHCP clients in the 10.10.10.0/24 network will use 10.10.10.2 as the default gateway." This is because the given configuration shows that the IP address 10.10.10.2 is assigned to the interface GigabitEthernet0/0, which is the default gateway for the DHCP clients in the 10.10.10.0/24 network. The IP address 10.10.10.1 is not mentioned in the configuration, so it is not likely to be assigned to the local LAN interface. The range 10.10.10.1 through 10.10.10.255 is not mentioned in the configuration either, so it cannot be assumed that it is available to be assigned to users.
14.
Which statement is true about an interface that is configured with the IPv6 address command?
Correct Answer
B. A link-local IPv6 address is automatically configured on the interface.
Explanation
When an interface is configured with the IPv6 address command, a link-local IPv6 address is automatically configured on the interface. This link-local address is automatically generated by the interface using the EUI-64 format and is used for communication within the local network segment. It is important to note that this command only configures a link-local address and does not assign a global unicast IPv6 address or enable IPv6 traffic-forwarding on the interface. Additionally, assigning an IPv6 address does not replace any existing IPv4 addresses on the interface.
15.
Which statement is true about PAP in the authentication of a PPP session?
Correct Answer
A. PAP uses a two-way handshake.
Explanation
PAP (Password Authentication Protocol) is a simple authentication protocol used in PPP (Point-to-Point Protocol) sessions. It involves a two-way handshake process where the client sends its username and password to the server, and the server responds with an acknowledgment or rejection. This process allows the client and server to verify each other's identity before establishing the connection. PAP does not use MD5 hashing or conduct periodic password challenges, and the uniqueness and randomness of the password are not specified in the question.
16.
Refer to the exhibit. Communication between two peers has failed. Based on the output that is shown, what is the most likely cause?
Correct Answer
D. PPP negotiation failure
Explanation
Based on the given output, the most likely cause of the communication failure is PPP negotiation failure. The output shows that the LCP (Link Control Protocol) state is down, which indicates that the PPP negotiation process failed to establish a link between the two peers. This could be due to mismatched configuration settings or authentication issues during the negotiation process.
17.
Refer to the exhibit. A network administrator is tasked with completing the Frame Relay topology that interconnects two remote sites. How should the point-to-point subinterfaces be configured on HQ to complete the topology?
Correct Answer
D. Frame-relay map ip 192.168.1.1 301 broadcast on Serial 0/0/0.1
frame-relay map ip 192.168.2.2 302 broadcast on Serial 0/0/0.2
Explanation
The correct answer is to configure the point-to-point subinterfaces on HQ by mapping the IP addresses 192.168.1.1 and 192.168.2.2 to the DLCIs 301 and 302 respectively. This ensures that the traffic from the HQ router will be correctly forwarded to the remote sites via the appropriate DLCIs on the Serial interfaces 0/0/0.1 and 0/0/0.2. The "broadcast" keyword indicates that the Frame Relay network should treat these IP addresses as broadcast addresses.
18.
Which data link layer encapsulation protocol is used by default for serial connections between two Cisco routers?
Correct Answer
C. HDLC
Explanation
HDLC (High-Level Data Link Control) is the default data link layer encapsulation protocol used for serial connections between Cisco routers. HDLC is a bit-oriented protocol that provides reliable and error-free communication between devices. It is a simple and efficient protocol that offers basic functionality for point-to-point connections. HDLC is widely supported by Cisco routers and is the default encapsulation used unless otherwise specified.
19.
Refer to the exhibit. Company ABC expanded its business and recently opened a new branch office in another country. IPv6 addresses have been used for the company network. The data servers Server1 and Server2 run applications which require end-to-end functionality, with unmodified packets that are forwarded from the source to the destination. The edge routers R1 and R2 support dual stack configuration. What solution should be deployed at the edge of the company network in order to successfully interconnect both offices?
Correct Answer
C. A manually configured IPv6 tunnel between the edge routers R1 and R2
Explanation
A manually configured IPv6 tunnel between the edge routers R1 and R2 should be deployed at the edge of the company network in order to successfully interconnect both offices. This solution allows for the transmission of unmodified packets from the source to the destination, ensuring end-to-end functionality for the applications running on Server1 and Server2. By manually configuring the IPv6 tunnel, the routers R1 and R2 can establish a secure and reliable connection between the two offices, enabling seamless communication over the IPv6 network.
20.
Which variable is permitted or denied by a standard access control list?
Correct Answer
B. Source IP address
Explanation
A standard access control list (ACL) permits or denies access based on the source IP address. This means that the ACL can be configured to allow or block traffic based on the specific IP address or range of IP addresses from which it originates. The ACL does not consider other variables such as the protocol type, source MAC address, destination IP address, or destination MAC address when making access control decisions.
21.
Refer to the exhibit. The link between the CTRL and BR_1 routers is configured as shown in the exhibit. Why are the routers unable to establish a PPP session?
Correct Answer
B. The usernames are misconfigured.
Explanation
The routers are unable to establish a PPP session because the usernames are misconfigured. This means that the usernames entered on both routers do not match, which prevents the authentication process from being successful.
22.
Which three statements accurately describe a security policy? (Choose three.)
Correct Answer(s)
A. It creates a basis for legal action if necessary.
B. It defines a process for managing security violations.
F. It provides step-by-step procedures to harden routers and other network devices
Explanation
A security policy is a set of rules and guidelines that outline how an organization will protect its information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The three statements that accurately describe a security policy are:
1. It creates a basis for legal action if necessary: A security policy clearly outlines the rules and regulations that employees must follow. If these policies are violated, legal action can be taken to hold individuals accountable.
2. It defines a process for managing security violations: A security policy provides guidelines on how to handle security incidents or violations. It outlines the steps to be taken in case of a breach or unauthorized access.
3. It provides step-by-step procedures to harden routers and other network devices: A security policy includes procedures and best practices to secure network devices, such as routers. This ensures that the devices are configured correctly and have the necessary security measures in place to protect against potential threats.
23.
A network administrator has changed the VLAN configurations on his network switches over the past weekend. How can the administrator determine if the additions and changes improved performance and availability on the company intranet?
Correct Answer
A. Conduct a performance test and compare with the baseline that was established previously.
Explanation
To determine if the VLAN configurations have improved performance and availability on the company intranet, the network administrator should conduct a performance test and compare it with the previously established baseline. This will provide quantitative data on the network's performance and help identify any improvements or issues. By comparing the test results with the baseline, the administrator can assess whether the changes made to the VLAN configurations have positively impacted performance and availability.
24.
Refer to the exhibit. Headquarters is connected through the Internet to branch office A and branch office B. Which WAN technology would be best suited to provide secure connectivity between headquarters and both branch offices?
Correct Answer
B. VPN
Explanation
A VPN (Virtual Private Network) would be the best WAN technology to provide secure connectivity between headquarters and both branch offices. VPNs use encryption and tunneling protocols to create a secure and private network over a public network, such as the Internet. This ensures that data transmitted between the headquarters and branch offices is protected from unauthorized access and interception. Additionally, VPNs are cost-effective and scalable, making them a suitable choice for connecting multiple locations securely.
25.
Which statement about a VPN is true?
Correct Answer
C. VPNs use virtual Layer 3 connections that are routed through the Internet.
26.
A company is deciding which WAN connection type it should implement between its main office and branch offices. The company wants to use a cost-effective service that provides virtual circuits between each office. The company also wants to be able to transmit variable-length packets on these circuits. Which solution best meets these requirements?
Correct Answer
D. Frame Relay
Explanation
Frame Relay is the best solution that meets the company's requirements. Frame Relay is a cost-effective WAN connection type that provides virtual circuits between each office. It is capable of transmitting variable-length packets, making it suitable for the company's needs. ATM and ISDN are not mentioned to be cost-effective or capable of transmitting variable-length packets, so they are not the best solutions.
27.
A technician is talking to a colleague at a rival company and comparing DSL transfer rates between the two companies. Both companies are in the same city, use the same service provider, and have the same rate/service plan. What is the explanation for why company 1 reports higher download speeds than company 2 reports?
Correct Answer
C. Company 2 is located farther from the service provider than company 1 is.
Explanation
The explanation for why company 1 reports higher download speeds than company 2 reports is that company 2 is located farther from the service provider than company 1. The distance between a company and the service provider can affect the quality and speed of the DSL connection. The farther the distance, the more likely there will be signal degradation and slower transfer rates. Therefore, company 2 experiences slower download speeds compared to company 1.
28.
Refer to the exhibit. Which configuration command would result in the output in the exhibit?
Correct Answer
E. Ip nat inside source static 192.168.0.10 172.16.76.3
Explanation
The correct answer is "ip nat inside source static 192.168.0.10 172.16.76.3" because this command configures a static NAT translation where the internal IP address 192.168.0.10 is translated to the external IP address 172.16.76.3. This means that any traffic originating from the internal IP address will appear to come from the external IP address when it goes out to the internet.
29.
What can a network administrator do to recover from a lost router password?
Correct Answer
A. Boot the router to ROM monitor mode and configure the router to ignore the startup configuration when it initializes
Explanation
To recover from a lost router password, a network administrator can boot the router to ROM monitor mode and configure the router to ignore the startup configuration when it initializes. This allows the administrator to bypass the password and gain access to the router.
30.
Refer to the exhibit. ACL 120 is configured to allow traffic coming from 192.168.10.0/24 network to go to any destination limited to ports 80 and 443. ACL 130 should allow only requested HTTP traffic to flow back into the network. What additional configuration is needed in order for the access lists to fulfill the requirements
Correct Answer
B. Option 2
31.
A system administrator must provide Internet connectivity for ten hosts in a small remote office. The ISP has assigned two public IP addresses to this remote office. How can the system administrator configure the router to provide Internet access to all ten users at the same time?
Correct Answer
D. Configure dynamic NAT with overload.
Explanation
The system administrator should configure dynamic NAT with overload in order to provide Internet access to all ten users at the same time. Dynamic NAT allows multiple private IP addresses to be translated to a single public IP address from the pool of assigned IP addresses. Overload, also known as Port Address Translation (PAT), allows multiple private IP addresses to share a single public IP address by using different port numbers. This allows for efficient use of the limited number of public IP addresses assigned to the remote office.
32.
Which statement is true about the PPP authentication phase?
Correct Answer
C. CHAP sends an encrypted username and password during the authentication process.
Explanation
CHAP, or Challenge Handshake Authentication Protocol, is a PPP authentication method that uses a 3-way handshake to exchange credentials. During the authentication process, the client sends a username to the server, which responds with a random challenge value. The client then encrypts the challenge value along with its password using a one-way hash function and sends it back to the server. The server performs the same encryption process and compares the results. If they match, the authentication is successful. Therefore, the statement "CHAP sends an encrypted username and password during the authentication process" is true.
33.
Refer to the exhibit. A network administrator is configuring Frame Relay on router HQ. It is desired that each Frame Relay PVC between the routers be in a separate subnet. Which two commands on HQ will accomplish this task for the connection to R1? (Choose two.)
Correct Answer(s)
C. HQ(config)# interface S0/0/0.1 point-to-point
F. HQ(config-if)# frame-relay map ip 172.16.1.1 255.255.255.0 301 broadcast
Explanation
The command "HQ(config)# interface S0/0/0.1 point-to-point" configures the subinterface S0/0/0.1 as a point-to-point connection, which means each PVC will have its own subnet. This ensures that each Frame Relay PVC between the routers is in a separate subnet.
The command "HQ(config-if)# frame-relay map ip 172.16.1.1 255.255.255.0 301 broadcast" maps the IP address 172.16.1.1 with a subnet mask of 255.255.255.0 to the DLCI 301. This command establishes the mapping between the IP address and the DLCI, allowing communication between the routers. The "broadcast" keyword indicates that broadcast packets should be sent to the mapped DLCI.
34.
Which wildcard mask would specify all IP addresses from 192.168.8.0 through 192.168.15.255?
Correct Answer
B. 0.0.7.255
Explanation
The correct wildcard mask that would specify all IP addresses from 192.168.8.0 through 192.168.15.255 is 0.0.7.255. This is because the subnet range is determined by the number of bits in the wildcard mask that are set to 0. In this case, the first 21 bits are set to 0 (0.0.7.255 in binary representation), which allows for a range of IP addresses from 192.168.8.0 to 192.168.15.255.
35.
Refer to the exhibit. WestSW is supposed to send VLAN information to EastSW, but that did not occur. What will force WestSW to send a VLAN update to EastSW?
Correct Answer
D. Reset the configuration revision number on EastSW to zero.
Explanation
Resetting the configuration revision number on EastSW to zero will force WestSW to send a VLAN update to EastSW. In VTP (VLAN Trunking Protocol), switches exchange VLAN information using VTP advertisements. Each switch keeps track of the configuration revision number, and if a switch receives an advertisement with a higher revision number, it will update its VLAN database. By resetting the revision number on EastSW to zero, it will be lower than the revision number on WestSW, causing WestSW to send a VLAN update to EastSW.
36.
Which three physical network problems should be checked when a bottom-up troubleshooting approach has been chosen to troubleshoot network performance? (Choose three.)
Correct Answer(s)
A. Cable connectivity
B. High collision counts
E. High CPU utilization rates
Explanation
In a bottom-up troubleshooting approach, the focus is on identifying and resolving physical network problems that could be causing network performance issues. Checking cable connectivity is important as loose or damaged cables can result in intermittent or no connectivity. High collision counts indicate network congestion or faulty network interfaces, which can impact performance. High CPU utilization rates can be a sign of a network device being overwhelmed, leading to performance degradation. Therefore, these three physical network problems should be checked when using a bottom-up troubleshooting approach.
37.
What is the result when the command permit tcp 192.168.4.0 0.0.3.255 any eq telnet is entered in an access control list and applied on the inbound interface of a router?
Correct Answer
D. All traffic from the 192.168.4.0/22 network is permitted on TCP port 23.
Explanation
The command "permit tcp 192.168.4.0 0.0.3.255 any eq telnet" in an access control list allows all traffic from the 192.168.4.0/22 network to pass through on TCP port 23 (Telnet). The wildcard mask 0.0.3.255 indicates that the first 22 bits of the IP address must match exactly, while the last 10 bits can be any value. Therefore, any traffic originating from the IP addresses within the range of 192.168.4.0 to 192.168.7.255 will be permitted on TCP port 23.
38.
What translation method will allow a server to always keep the same public address?
Correct Answer
A. Static NAT
Explanation
Static NAT is a translation method that allows a server to always keep the same public address. With static NAT, a specific private IP address is mapped to a specific public IP address, ensuring that the server's public address remains constant. This is useful for servers that need to provide consistent services, such as web servers or mail servers, as clients can always access them using the same public address.
39.
Refer to the exhibit. Which statement correctly describes how Router1 processes an FTP request packet that enters interface S0/0/0, and is destined for an FTP server at IP address 172.16.1.5?
Correct Answer
C. The router matches the incoming packet to the statement that was created by the access-list 101 permit ip any 172.16.1.0 0.0.0.255 command, ignores the remaining statements in ACL 101, and allows the packet into the router.
Explanation
The correct answer is that the router matches the incoming packet to the statement that was created by the access-list 101 permit ip any 172.16.1.0 0.0.0.255 command, ignores the remaining statements in ACL 101, and allows the packet into the router. This means that the router has a specific rule in the access list 101 that permits any IP address to connect to the FTP server at IP address 172.16.1.5. The router does not need to check any other statements in ACL 101 because it has found a match and allows the packet to pass through.
40.
Refer to the exhibit. A system administrator must provide connectivity to a foreign network for ten hosts in a small remote office. The commands that are listed in the exhibit were entered into the router that connects the foreign network. The users in the remote office report occasional failure to connect to resources in the foreign network. What is the likely problem?
Correct Answer
B. The translated address pool is not correctly sized.
Explanation
The likely problem is that the translated address pool is not correctly sized. This means that there are not enough available IP addresses in the pool to provide connectivity for all ten hosts in the remote office. As a result, some hosts may experience occasional failures to connect to resources in the foreign network.
41.
Which method is most effective in protecting the routing information that is propagated between routers on the network?
Correct Answer
C. Configure routing protocol authentication.
Explanation
Configuring routing protocol authentication is the most effective method in protecting the routing information that is propagated between routers on the network. This method ensures that only authorized routers can exchange routing information by using authentication mechanisms such as passwords or digital certificates. By implementing routing protocol authentication, unauthorized routers or malicious entities are prevented from injecting false or malicious routing information into the network, thereby enhancing the overall security and integrity of the routing infrastructure.
42.
Refer to the exhibit. What happens if the network administrator issues the commands shown when an ACL called Managers already exists on the router?
Correct Answer
B. The commands are added at the end of the existing Managers ACL.
Explanation
The given answer states that if the network administrator issues the commands shown when an ACL called Managers already exists on the router, the commands will be added at the end of the existing Managers ACL. This means that the new commands will be appended to the existing ACL, without overwriting or creating a duplicate ACL.
43.
A network administrator can ping the Perth router, but gets a ‘Password Required but None Set’ message when trying to connect remotely via Telnet. Which command sequence must be applied to the Perth router to allow remote access?
Correct Answer
B. Router(config)# line vty 0 4 Router(config-line)# login Router(config-line)# password cisco
Explanation
The correct answer is Router(config)# line vty 0 4 Router(config-line)# login Router(config-line)# password cisco. This command sequence configures the virtual terminal lines (vty) on the router to allow remote access. The "line vty 0 4" command specifies that the configuration applies to the virtual terminal lines 0 through 4. The "login" command enables the login prompt for remote access, and the "password cisco" command sets the password for authentication. This allows the network administrator to connect remotely via Telnet by entering the correct password.
44.
A router does not load its configuration after a power failure. After running the show startup-configuration command, the administrator finds that the original configuration is intact. What is the cause of this problem?
Correct Answer
D. The configuration register is set for 0×2142.
Explanation
The configuration register is set for 0×2142. The configuration register is a 16-bit value that determines how the router boots up and whether it loads its configuration from NVRAM or not. When the configuration register is set to 0×2142, it tells the router to ignore the startup configuration in NVRAM and load the router with the factory default configuration. This is why after a power failure, the router does not load its configuration and the original configuration remains intact.