A Wan Interconnects Lans Over Long Distances.
A Wan Interconnects Lans Over Long Distances.
application
transport
network
data link*
physical
13. What advantage does DSL have compared to cable technology?
DSL upload and download speeds are always the same.
DSL is faster.
DSL has no distance limitations.
DSL is not a shared medium.*
14. Which broadband technology would be best for a user that needs remote
access when traveling in mountains and at sea?
Wi-Fi Mesh
mobile broadband
WiMax
satellite*
15. Which technology requires the use of PPPoE to provide PPP connections to
customers?
dialup analog modem
dialup ISDN modem
DSL*
T1
16. Refer to the exhibit. What is the network administrator verifying when
issuing the show ip interface brief command on R1 in respect to the PPPoE
connection to R2?
static routing
IGP routing protocols*
EGP routing protocols
default routing
20. Which IPv4 address range covers all IP addresses that match the ACL filter
specified by 172.16.2.0 with wildcard mask 0.0.1.255?
172.16.2.0 to 172.16.2.255
172.16.2.1 to 172.16.3.254
172.16.2.0 to 172.16.3.255*
172.16.2.1 to 172.16.255.255
21. Refer to the exhibit. A named access list called chemistry_block has been
written to prevent users on the Chemistry Network and public Internet from
access to Records Server. All other users within the school should have access to
this server. The list contains the following statements:
deny 172.16.102.0 0.0.0.255 172.16.104.252 0.0.0.0
permit 172.16.0.0 0.0.255.255 172.16.104.252 0.0.0.0
Which command sequence will place this list to meet these requirements?
Hera(config)# interface fa0/0
Hera(config-if)# ip access-group chemistry_block in
Hera(config)# interface s0/0/0
Hera(config-if)# ip access-group chemistry_block out
Apollo(config)# interface s0/0/0
Apollo(config-if)# ip access-group chemistry_block out
Apollo(config)# interface s0/0/1
Apollo(config-if)# ip access-group chemistry_block in
Athena(config)# interface fa0/0
Athena(config-if)# ip access-group chemistry_block out*
22. What guideline is generally followed about the placement of extended access
control lists?
They should be placed as close as possible to the source of the traffic to be
denied.*
They should be placed as close as possible to the destination of the traffic to
be denied.
They should be placed on the fastest interface available.
They should be placed on the destination WAN link.
23. In the creation of an IPv6 ACL, what is the purpose of the implicit final
command entries, permit icmp any any nd-na and permit icmp any any nd-ns?
to allow IPv6 to MAC address resolution*
to allow forwarding of IPv6 multicast packets
to allow automatic address configuration
to allow forwarding of ICMPv6 packets
24. A network administrator is testing IPv6 connectivity to a web server. The
network administrator does not want any other host to connect to the web server
except for the one test computer. Which type of IPv6 ACL could be used for this
situation?
only a standard ACL
a standard or extended ACL
only an extended ACL
an extended, named, or numbered ACL
only a named ACL*
25. Refer to the exhibit. The IPv6 access list LIMITED_ACCESS is applied on
the S0/0/0 interface of R1 in the inbound direction. Which IPv6 packets from the
ISP will be dropped by the ACL on R1?
traffic shaping*
weighted random early detection
classification and marking
traffic policing
36. Which type of QoS marking is applied to Ethernet frames?
CoS*
ToS
DSCP
IP precedence
37. What is the function of a QoS trust boundary?
A trust boundary identifies the location where traffic cannot be remarked.
A trust boundary identifies which devices trust the marking on packets that
enter a network.*
A trust boundary only allows traffic to enter if it has previously been marked.
A trust boundary only allows traffic from trusted endpoints to enter the
network.
38. A vibration sensor on an automated production line detects an unusual
condition. The sensor communicates with a controller that automatically shuts
down the line and activates an alarm. What type of communication does this
scenario represent?
machine-to-people
machine-to-machine*
people-to-people
people-to-machine
39. Which pillar of the Cisco IoT System allows data to be analyzed and managed
at the location where it is generated?
data analytics
fog computing*
network connectivity
application enhancement platform
40. Which Cloud computing service would be best for a new organization that
cannot afford physical servers and networking equipment and must purchase
network services on-demand?
PaaS
SaaS
ITaaS
IaaS*
41. A data center has recently updated a physical server to host multiple
operating systems on a single CPU. The data center can now provide each
customer with a separate web server without having to allocate an actual discrete
server for each customer. What is the networking trend that is being
implemented by the data center in this situation?
BYOD
virtualization*
maintaining communication integrity
online collaboration
42. What is used to pre-populate the adjacency table on Cisco devices that use
CEF to process packets?
the ARP table*
the routing table
the FIB
the DSP
43. What is the wildcard mask that is associated with the network
128.165.216.0/23?
0.0.0.255
0.0.1.254
0.0.1.255*
0.0.1.0
0.0.0.254
44. What two features are added in SNMPv3 to address the weaknesses of
previous versions of SNMP? (Choose two.)
encryption*
authentication*
authorization with community string priority
ACL management filtering
bulk MIB objects retrieval
45. Which component of the ACI architecture translates application policies into
network programming?
the Nexus 9000 switch
the Application Network Profile endpoints
the Application Policy Infrastructure Controller*
the hypervisor
46. Which two pieces of information should be included in a logical topology
diagram of a network? (Choose two.)
device type
OS/IOS version
connection type*
interface identifier*
cable specification
cable type and identifier
47. Which network performance statistics should be measured in order to verify
SLA compliance?
NAT translation statistics
device CPU and memory utilization
latency, jitter, and packet loss*
the number of error messages that are logged on the syslog server
48. Which feature sends simulated data across the network and measures
performance between multiple network locations?
LLDP
IP SLA*
syslog
SPAN
49. Which troubleshooting tool would a network administrator use to check the
Layer 2 header of frames that are leaving a particular host?
protocol analyzer*
baselining tool
knowledge base
CiscoView
50. Refer to the exhibit. A network administrator is troubleshooting the OSPF
network. The 10.10.0.0/16 network is not showing up in the routing table of
Router1. What is the probable cause of this problem?
Ethernet
Frame Relay
HDLC*
PPP
63. Which two functions are provided by the NCP during a PPP connection?
(Choose two.)
identifying fault conditions for the PPP link
providing multilink capabilities over the PPP link
bringing the network layer protocol or protocols up and down*
enhancing security by providing callback over PPP
negotiating options for the IP protocol*
managing authentication of the peer routers of the PPP link
64. What PPP information will be displayed if a network engineer issues the show
ppp multilink command on Cisco router?
the link LCP and NCP status
the queuing type on the link
the IP addresses of the link interfaces
the serial interfaces participating in the multilink*
65. Refer to the exhibit. Which statement describes the status of the PPP
connection?
2
3
4*
5
75. Which statement describes a characteristic of standard IPv4 ACLs?
They are configured in the interface configuration mode.
They filter traffic based on source IP addresses only.*
They can be created with a number but not with a name.
They can be configured to filter traffic based on both source IP addresses
and source ports.
76. Which three values or sets of values are included when creating an extended
access control list entry? (Choose three.)
access list number between 1 and 99
access list number between 100 and 199*
default gateway address and wildcard mask
destination address and wildcard mask*
source address and wildcard mask*
source subnet mask and wildcard mask
destination subnet mask and wildcard mask
77. Refer to the exhibit. A router has an existing ACL that permits all traffic
from the 172.16.0.0 network. The administrator attempts to add a new ACE to
the ACL that denies packets from host 172.16.0.1 and receives the error message
that is shown in the exhibit. What action can the administrator take to block
packets from host 172.16.0.1 while still permitting all other traffic from the
172.16.0.0 network?
Manually add the new deny ACE with a sequence number of 5.*
Manually add the new deny ACE with a sequence number of 15.
Create a second access list denying the host and apply it to the same
interface.
Add a deny any any ACE to access-list 1.
78. Which three implicit access control entries are automatically added to the end
of an IPv6 ACL? (Choose three.)
deny ip any any
deny ipv6 any any*
permit ipv6 any any
deny icmp any any
permit icmp any any nd-ns*
permit icmp any any nd-na*
79. The computers used by the network administrators for a school are on the
10.7.0.0/27 network. Which two commands are needed at a minimum to apply an
ACL that will ensure that only devices that are used by the network
administrators will be allowed Telnet access to the routers? (Choose two.)
access-class 5 in*
access-list 5 deny any
access-list standard VTY
permit 10.7.0.0 0.0.0.127
access-list 5 permit 10.7.0.0 0.0.0.31*
ip access-group 5 out
ip access-group 5 in
80. A network administrator is adding ACLs to a new IPv6 multirouter
environment. Which IPv6 ACE is automatically added implicitly at the end of an
ACL so that two adjacent routers can discover each other?
permit ip any any
permit ip any host ip_address
permit icmp any any nd-na*
deny ip any any
81. What would be the primary reason an attacker would launch a MAC address
overflow attack?
so that the switch stops forwarding traffic
so that legitimate hosts cannot obtain a MAC address
so that the attacker can see frames that are destined for other hosts*
so that the attacker can execute arbitrary code on the switch
82. What are three of the six core components in the Cisco IoT system? (Choose
three.)
fog computing*
wearable technologies
data analytics*
robot guides
cyber and physical security*
smart bandages
83. What security countermeasure is effective for preventing CAM table overflow
attacks?
port security*
DHCP snooping
IP source guard
Dynamic ARP Inspection
84. Which SNMP feature provides a solution to the main disadvantage of SNMP
polling?
SNMP set messages
SNMP trap messages*
SNMP get messages
SNMP community strings
85. When SNMPv1 or SNMPv2 is being used, which feature provides secure
access to MIB objects?
packet encryption
message integrity
community strings*
source validationfeatures
86. What two are added in SNMPv3 to address the weaknesses of previous
versions of SNMP? (Choose two.)
bulk MIB objects retrieval
encryption*
authorization with community string priority
authentication*
ACL management filtering
87. Which queuing mechanism supports user-defined traffic classes?
FIFO
CBWFQ*
WFQ
FCFS
88. Which field is used to mark Layer 2 Ethernet frames for QoS treatment?
Type of Service field
Traffic Class field
Priority field*
Version field
89. What is an example of cloud computing?
a continuous interaction between people, processes, data, and things
a service that offers on-demand access to shared resources*
a network infrastructure that spans a large geographic area
an architectural style of the World Wide Web
90. Which type of resources are required for a Type 1 hypervisor?
a host operating system
a server running VMware Fusion
a management console*
a dedicated VLAN
91. A network technician made a configuration change on the core router in
order to solve a problem. However, the problem is not solved. Which step should
the technician take next?
Gather symptoms.
Isolate the problem.
Restore the previous configuration.*
Implement the next possible corrective action.
92. A user reports that when the corporate web page URL is entered on a web
browser, an error message indicates that the page cannot be displayed. The help-
desk technician asks the user to enter the IP address of the web server to see if the
page can be displayed. Which troubleshooting method is being used by the
technician?
top-down
bottom-up
substitution
divide-and-conquer*
93. What is a primary function of the Cisco IOS IP Service Level Agreements
feature?
to detect potential network attacks
to provide network connectivity for customers
to adjust network device configurations to avoid congestion
to measure network performance and discover a network failure as early as
possible*
94. Which IOS log message level indicates the highest severity level?
level 0*
level 1
level 4
level 7
95. Which symptom is an example of network issues at the network layer?
A misconfigured firewall blocks traffic to a file server.
There are too many invalid frames transmitted in the network.
Neighbor adjacency is formed with some routers, but not all routers.*
A web server cannot be reached by its domain name, but can be reached
via its IP address.
96. Refer to the exhibit. H1 can only ping H2, H3, and the Fa0/0 interface of
router R1. H2 and H3 can ping H4 and H5. Why might H1 not be able to
successfully ping H4 and H5?
interface reset
unplugged cable
improper cable type
PPP issue*
109. Refer to the exhibit. Which type of Layer 2 encapsulation used for
connection D requires Cisco routers?
Ethernet
PPPoE
HDLC*
PP
110. Which three statements are true about PPP? (Choose three.)
PPP can use synchronous and asynchronous circuits.*
PPP can only be used between two Cisco devices.
PPP carries packets from several network layer protocols in LCPs.
PPP uses LCPs to establish, configure, and test the data-link connection.*
PPP uses LCPs to agree on format options such as authentication, compression,
and error detection.*
111. A network administrator is evaluating authentication protocols for a PPP
link. Which three factors might lead to the selection of CHAP over PAP as the
authentication protocol? (Choose three.)
establishes identities with a two-way handshake
uses a three-way authentication periodically during the session to reconfirm
identities*
control by the remote host of the frequency and timing of login events
transmits login information in encrypted format*
uses an unpredictable variable challenge value to prevent playback attacks*
makes authorized network administrator intervention a requirement to
establish each session
112. Which cellular or mobile wireless standard is considered a fourth generation
technology?
LTE*
GSM
CDMA
UMTS
113. A company is looking for the least expensive broadband solution that
provides at least 10 Mb/s download speed. The company is located 5 miles from
the nearest provider. Which broadband solution would be appropriate?
satellite
DSL
WiMax
cable*
114. Which technology can ISPs use to periodically challenge broadband
customers over DSL networks with PPPoE?
PAP
CHAP*
HDLC
Frame
Relay
115. What are the three core components of the Cisco ACI architecture? (Choose
three.)
Application Network Profile*
Application Policy Infrastructure Controller*
Cisco Nexus Switches*
Microsoft hypervisor
Cisco Information Server
Virtual Security Gateway
116. Which statement describes a feature of site-to-site VPNs?
The VPN connection is not statically defined.
VPN client software is installed on each host.
Internal hosts send normal, unencapsulated packets.*
Individual hosts can enable and disable the VPN connection.
117. What are three features of a GRE tunnel? (Choose three.)
creates nonsecure tunnels between remote sites*
transports multiple Layer 3 protocols*
creates additional packet overhead*
uses RSA signatures to authenticate peeers
provides encryption to keep VPN traffic confidential
supports hosts as GRE tunnel endpoints by installing Cisco VPN client
software
118. Refer to the exhibit. What two commands are needed to complete the GRE
tunnel configuration on router R1? (Choose two.)
C-B-A-D
A-B-C-D
C-B-D-A*
B-A-D-C
D-A-C-B
125. Which two hypervisors are suitable to support virtual machines in a data
center? (Choose two.)
Virtual PC
VMware Fusion
VMware ESX/ESXi*
Oracle VM VirtualBox
Microsoft Hyper-V 2012*
126. How can DHCP spoofing attacks be mitigated?
by disabling DTP negotiations on nontrunking ports
by implementing DHCP snooping on trusted ports*
by implementing port security
by the application of the ip verify source command to untrusted ports
127. What action can a network administrator take to help mitigate the threat of
VLAN attacks?
Disable VTP.
Configure all switch ports to be members of VLAN 1.
Disable automatic trunking negotiation.*
Enable PortFast on all switch ports.
128. Which SNMP message type informs the network management system (NMS)
immediately of certain specified events?
GET request
SET request
GET response
Trap*
129. Refer to the exhibit. A SNMP manager is using the community string of
snmpenable and is configured with the IP address 172.16.10.1. The SNMP
manager is unable to read configuration variables on the R1 SNMP agent. What
could be the problem?
cisco54321
cisco98765
cisco123456*
cisco654321
131. A network administrator has noticed an unusual amount of traffic being
received on a switch port that is connected to a college classroom computer.
Which tool would the administrator use to make the suspicious traffic available
for analysis at the college data center?
RSPAN*
TACACS+
802.1X
DHCP snooping
SNMP
132. What network monitoring tool copies traffic moving through one switch
port, and sends the copied traffic to another switch port for analysis?
802.1
XSNMP
SPAN*
syslog
133. Voice packets are being received in a continuous stream by an IP phone, but
because of network congestion the delay between each packet varies and is
causing broken conversations. What term describes the cause of this condition?
buffering
latency
queuing
jitter*
134. What mechanism compensates for jitter in an audio stream by buffering
packets and then replaying them outbound in a steady stream?
digital
signal
processor
playout delay buffer*
voice codecWFQ
135. Which type of network traffic cannot be managed using congestion
avoidance tools?
TCP
UDP*
IP
ICMP
136. A network administrator has moved the company intranet web server from
a switch port to a dedicated router interface. How can the administrator
determine how this change has affected performance and availability on the
company intranet?
Conduct a performance test and compare with the baseline that was
established previously.*
Determine performance on the intranet by monitoring load times of company
web pages from remote sites.
Interview departmental administrative assistants to determine if web pages
are loading more quickly.
Compare the hit counts on the company web server for the current week to
the values that were recorded in previous weeks.
137. In which stage of the troubleshooting process would ownership be
researched and documented?
Gather symptoms.*
Implement corrective action.
Isolate the problem.
Update the user and document the problem.
138. Which troubleshooting approach is more appropriate for a seasoned
network administrator rather than a less-experienced network administrator?
a less-structured approach based on an educated guess*
an approach comparing working and nonworking components to spot
significant differences
a structured approach starting with the physical layer and moving up through
the layers of the OSI model until the cause of the problem is identified
an approach that starts with the end-user applications and moves down
through the layers of the OSI model until the cause of the problem has been
identified
139. A router has been configured to use simulated network traffic in order to
monitor the network performance between the router and a distant network
device. Which command would display the results of this analysis?
show ip route
showip protocols
show ip sla statistics*
show monitor
140. Which type of tool would an administrator use to capture packets that are
going to and from a particular device?
NMS tool
knowledge base
baselining tool
protocol analyzer*
141. Refer to the exhibit. Which two statements describe the results of entering
these commands? (Choose two.)
traffic policing –> Excess traffic is dropped when the traffic rate reaches a
preconfigured maximum.
marking –> A value is added to a packet header.
traffic shaping –> Excess traffic is retained in a queue and scheduled for
later transmission over increments of time.
classification –> This determines the class of traffic to which frames belong.
empty –> TCP traffic is throttled to prevent tail drop.
Version 5:
146. Which two factors allow businesses to safely communicate and perform
transactions using the Internet? (Choose two.)
security *
addressing
privacy *
WAN technology
bandwidth
147. Which two statements about DSL are true? (Choose two.)
users are on a shared medium
uses RF signal transmission
local loop can be up to 3.5 miles (5.5km)*
physical and data link layers are defined by DOCSIS
user connections are aggregated at a DSLAM located at the CO*
148. Which two statements are true regarding a PPP connection between two
Cisco routers? (Choose two.)
LCP tests the quality of the link.*
LCP manages compression on the link.*
Only a single NCP is allowed between the two routers.
NCP terminates the link when data exchange is complete.
With CHAP authentication, the routers exchange plain text passwords.
149. A network administrator is asked to design a system to allow simultaneous
access to the Internet for 250 users. The ISP can only supply five public IP
addresses for this network. What technology can the administrator use to
accomplish this task?
classful subnetting
variable length subnet masks
classless interdomain routing
port-based Network Address Translation*
150. Refer to the exhibit. An administrator is configuring NAT to provide
Internet access to the inside network. After the configuration is completed, users
are unable to access the Internet. What is the cause of the problem?
10.0.0.1
172.16.0.1
192.168.0.1
192.168.0.200
209.165.200.225*
155. Refer to the exhibit. What kind of NAT is being configured on R1?
PAT
dynamic NAT
NAT overload
port forwarding*
156. What benefit does NAT64 provide?
It allows sites to use private IPv6 addresses and translates them to global
IPv6 addresses.
It allows sites to connect multiple IPv4 hosts to the Internet via the use of a
single public IPv4 address.
It allows sites to connect IPv6 hosts to an IPv4 network by translating the IPv6
addresses to IPv4 addresses.*
It allows sites to use private IPv4 addresses, and thus hides the internal
addressing structure from hosts on public IPv4 networks.
157. What are three benefits of using Frame Relay for WAN connectivity?
(Choose three.)
QoS support using the IP precedence field
one physical interface that can be used for several circuits*
integrated encryption
mature technology*
reasonable cost*
seamless direct connectivity to an Ethernet LAN
158. The DLCI number assigned to a Frame Relay circuit is to be manually
added on a point-to-point link. Which three subinterface commands could be
used to complete the configuration? (Choose three.)
bandwidth kilobits*
encapsulation frame-relay
frame-relay interface-dlci dlci*
frame-relay map ip ip-address dlci
frame-relay map ip ip-address dlci broadcast
ip address ip-address mask*
no shutdown
159. Which command can be used to check the information about congestion on a
Frame Relay link?
show frame-relay pvc*
show frame-relay lmi
show interfaces
show frame-relay map
160. Refer to the exhibit. A network administrator has implemented the
configuration in the displayed output. What is missing from the configuration
that would be preventing OSPF routing updates from passing to the Frame Relay
service provider?
10.1.1.1
10.1.1.2
209.165.202.133*
209.165.202.134
179. What are three characteristics of the generic routing encapsulation (GRE)
protocol? (Choose three.)
GRE tunnels support multicast traffic.*
By default, GRE does not include any flow control mechanisms.*
Developed by the IETF, GRE is a secure tunneling protocol that was designed
for Cisco routers.*
GRE uses AES for encryption unless otherwise specified.
GRE creates additional overhead for packets that are traveling through the
VPN.*
GRE provides encapsulation for a single protocol type that is traveling
through the VPN.
180. Which two statements describe remote access VPNs? (Choose two.)
Remote access VPNs are used to connect entire networks, such as a
branch office to headquarters.
End users are not aware that VPNs exists.
A leased line is required to implement remote access VPNs.
Client software is usually required to be able to access the network.*
Remote access VPNs support the needs of telecommuters and mobile users.*
181. Under which two categories of WAN connections does Frame Relay fit?
(Choose two.)
public infrastructure
private infrastructure*
dedicated
Internet
packet-switched*
182. What term is used to identify the point where the customer network ends
and the service provider network begins?
CSU/DSU
the central office
the local loop
the demarcation point*
183. Which two characteristics describe time-division multiplexing? (Choose
two.)
Traffic is allocated bandwidth across a single wire based on preassigned time
slots.*
Bandwidth is allocated to channels based on whether a station has data to
transmit.
Encoding technology provides high data throughput in a minimum RF
spectrum by supporting parallel data transmission.
Depending on the configured Layer 2 protocol, data is transmitted across
two or more channels via the use of time slots.
Data capacity across a single link increases as bits from multiple sources are
transmitted using interleaved slices of time.*
184. A branch office uses a leased line to connect to the corporate network. The
lead network engineer confirms connectivity between users in the branch office,
but none of the users can access corporate headquarters. System logs indicate
that nothing has changed in the branch office network. What should the engineer
consider next to resolve this network outage?
The network technician for the branch office should troubleshoot the
switched infrastructure.
The system administrator in the branch office should reconfigure the default
gateway on the user PCs.
The server administrator in the branch office should reconfigure the DHCP
server.
The service provider for the branch office should troubleshoot the issue
starting from the point of demarcation.*
185. Refer to the exhibit. Which three steps are required to configure Multilink
PPP on the HQ router? (Choose three.)
Only traffic that originates from the GigabitEthernet 0/1 interface will be
monitored.
Messages that are sent to the syslog server will be limited to levels 3 or lower.*
Messages that are sent to the syslog server will use 192.168.1.5 as the
destination IP address.*
The syslog messages will contain the IP address the GigabitEthernet 0/1
interface.*
Messages that are sent to the syslog server will be limited to levels 3 and
higher.
For multiple occurrences of the same error, only the first three messages will
be sent to the server.
197. Which two technologies are implemented by organizations to support
teleworker remote connections? (Choose two.)
CMTS
VPN*
CDMA*
IPsec*
DOCSIS
198. How many 64 kb/s voice channels are combined to produce a T1 line?
8
32
24*
16
199. What is the purpose of a message hash in a VPN connection?
It ensures that the data is coming from the correct source.
It ensures that the data cannot be duplicated and replayed to the destination.
It ensures that the data has not changed while in transit.*
It ensures that the data cannot be read in plain text.*
200. Users are reporting longer delays in authentication and in accessing network
resources during certain time periods of the week. What kind of information
should network engineers check to find out if this situation is part of a normal
network behavior?
network configuration files
syslog records and messages
debug output and packet captures
the network performance baseline*
201. Which structured engineering desing principle ensures that the network
reamins available even under abnormal conditions?
resiliency*
hierarchy
flexibility
modularity
202. A team of engineers has identified a solution to a significant network
problem. The proposed solution is likely to affect critical network infrastruture
components. What should the team follow while implementing the solution to
avoid interfering with other processes and infrastructure?
suslog messages and reports
one of the layered troubleshooting approaches
change-control procedures*
knowledge base guidelines
203. What is a Frame Relay feauture that supports the IP address-to-DLCI
dynamic mapping?
FECN
Inverse ARP*
ARP
BECN
204. A small remote office needs to connect to headquarters through a secure
IPsec VPN connection. The company is implementing the Cisco Easy VPN
solution. Which Cisco Easy VPN component needs to be added on the Cisco
router at the remote office?
Cisco AnyConnect
Cisco Easy VPN Server*
Cisco Easy VPN Remote
Cisco VPN Client
205. Which scenario would require the use of static NAT?
when an internal corporate web server needs to be accessed from a home
network*
when there are more internal private IP addresses than available public IP
addresses
when all public IP addresses have been exhausted
when an IPv4 site connects to an IPv6 site
206. An organization has purchased a Frame Relay service from a provider. The
service agreement specifies that the access rate is 512 kbps, the CIR is 384 kbps,
and the Bc is 32 kbps. What will happen when the customer sends a short burst of
frames above 450 kbps?
The frames are marked with the DE bit set to 1 and are most likely
forwarded.
The frames are marked with the DE bit set to 0 and are most likely
forwarded.
The frames are marked with the DE bit set to 0 and are allowed to pass.
The frames are marked with the DE bit set to 1 and are most likely dropped.*
207. What is a Frame Relay feature that supports the IP address-to-DLCI
dynamic mapping?
Inverse ARP*
ARP
BECN
FECN
208. An administrator wants to configure a router so that users on the outside
network can only establish HTTP connections to the internal web site by
navigating to http://www.netacad.com:8888. Which feature would the
administrator configure to accomplish this?
port forwarding*
dynamic NAT
NAT overload
static NAT
PAT
209. Which two components are needed to provide a DSL connection to a SOHO?
(Choose two.)
PPPoE enabled switch
CMTS
transceiver*
CM
DSLAM*
210. A network engineer is troubleshooting an unsuccessful PPP multilink
connection between two routers. That multilink interface has been created and
assigned a number, the interface has been enabled for multilink PPP, and the
interface has been assigned a multilink group number that matches the group
assigned to the member physical serial interfaces. The physical serial interfaces
have also been enabled for PPP multilink. Which additional command should to
be issued on the multilink interface?
clock rate 4000000 *
encapsulation ppp
ip address 192.168.10.1 255.255.255.252
no ip address
211. What is the international standard defining cable-related technologies?
WiMax
DOCSIS*
ADSL
PPPoE
212. Which three statements describe characteristics of converging corporate
network architecture?
Server applications are housed within the phisical corporate
network.*
Users connect their own devices to the corporate network.*
Data types include data, and video.*
Users have to use company-owned computers.
Networks are borderless.
213. Which inefficient feature of time-division multiplexing does statistical TDM
overcome?
the unused high speed time slots*
the buffering of data during peak periods
the use of channel identifiers
the use of a multiplexer at the transmitter and receiver
214. What are three characteristics of SSL VPNs?
authentication can be one way*
authentication uses shared secret or digital cerificates*
an ssl vpn supports web enable applications, e-mail and file sharing*
connecting may challeenge nontechnical users
encryption requires key lengths from 40 bits to 256 bits
an ssl vpn requires specific configuration of PCs to connect
215. A network engineer is designing an IPsec VPN between Cisco routers for a
national bank. Which algorithm assures the highest level of confidentiality for
data crossing the VPN?
256bit AES*
512 bit RSA
SHA-1
3DES
216. By the use of sequence numbers, which function of the IPsec security services
prevents spoofing by verifying that each packet is non-duplicated and unique?
anti-replay protection*
confidentiality
data integrity
authentication
217. A small law firm wants to connect to the Internet at relatively high speed but
with low cost. In addition, the firm prefers that the connection be through a
dedicated link to the service provider. Which connection type should be selected?
leased line*
ISDN
cable
DSL
218. How can an administrator configure a Cisco Easy VPN Server to enable the
company to manage many remote VPN connections efficiently?
by updating the client software in regular intervals
by preconfiguring IPsec parameters when deploying the client solution
by provisioning dedicated bandwidth for VPN connections
by pushing the IPsec security policies to the clients when establishing the
tunnel*
219. How does QoS improve the effectiveness of teleworking?
It provides wireless data transmission over large urban areas.
It provides high speed connections over copper wires.
It provides better service for VoIP and video conferencing applications.*
It provides authentication, accounting, and link management features for
ISPs.
220. Which two networking technologies enable businesses to use the Internet,
instead of an enterprise WAN, to securely interconnect their distributed
networks? (Choose two.)
DSL
remote LANs
remote access VPNs*
site-to-site VPNs*
Frame Relay
221. What are two benefits of using SNMP traps? (Choose two.)
They eliminate the need for some periodic polling requests.*
They reduce the load on network and agent resources.*
They can provide statistics on TCP/IP packets that flow through Cisco
devices.
They can passively listen for exported NetFlow datagrams.
They limit access for management systems only.