Título: Post Examen CCNA 2: Time-Division Multiplexing
Título: Post Examen CCNA 2: Time-Division Multiplexing
processed in this inbound access list? Before they are routed to an outbound interface Correcto
2) Information from each data channel is allocated bandwidth based on short, preassigned time slots, regardless of whether there is data to transmit. Time-division multiplexing Correcto 3) An extended access list needs to be applied to a RDP router. What three
pieces of information can be used in an extended access list to filter traffic? (Choose three) Source IP Address and destination IP address Correcto Protocol Correcto TCP or UDP port numbers Correcto
4) The RDP administrator is implementing access control lists in the RDP
network. What are two reasons that the RDP network administrator would use access lists? (Choose two.) To filter traffic as it passes through a router Correcto To control VTY access into a router Correcto
5) Many RDP routers are configured using access lists. Which of the
following are benefits provided with access control lists (ACLs)? (Select all that apply) ACLs identify interesting traffic for DDR Correcto ACLs provide IP route filtering. Correcto
6) Router CK1 is configured using a named ACL. Which of the following
answer choices are correct characteristics of named access list? (Select all that apply) You can delete individual statements in a named access list Correcto Named access lists must be specified as standard or extended Correcto You can use the ip access-list command to create named access lists Correcto
7) A standard IP access list is applied to an Ethernet interface of router
CK1 . What does this standard access list filter on? The source address Correcto
8) You are securing a network for RDP and want to apply an ACL (access
control list) to an interface of a router. Which one of the following commands would you use?
access to the Internet for only hosts that are assigned an address in the range 192.168.8.0 through 192.168.15.255? 0.0.7.255 Correcto
10) The RDP network is subnetted using 29 bits for the subnet mask. Which
wild card mask should be used to configure an extended access list to permit or deny access to an entire subnetwork? 0.0.0.7 Correcto
11) Which IP address and wildcard mask would you use in your ACL to block
pings into the corporate networks from hosts outside the internetwork. Using access control lists, which protocol should be blocked? ICMP Correcto
14) What are the general recommendations regarding the placement of
access control lists? (Choose two) Extended ACLs should be placed as close as possible to the source of traffic to be denied. Correcto Standard ACLs should be placed as close as possible to the destination of traffic to be denied. Correcto
15) Which of the following are characteristics of named access lists?
(Choose three) When created, they must be specified as standard or extended. Correcto They are created with the ip access-list command. Correcto
16) What are two reasons that the RDP network administrator would use
access lists on a router? (Choose two.) To filter traffic as it passes through a router Correcto To control vty access into a router Correcto
17) Creates and combines multiple channels on a single line. Bandwidth is allocated for information from each data channel based on the signal frequency of the traffic. Frequency-division multiplexing 18) Which two statements accurately describe data-link protocols in a WAN? (Choose two.) Many data link layer protocols use a framing mechanism similar to HDLC. Correcto Data link layer protocols define how data is encapsulated for transmission to remote sites, and also the mechanisms for transferring the resulting frames to establish the connection across the communication line from the sending to the receiving device. Correcto 19) Which three statements accurately describe WANs? (Choose three.) WANs connect devices that are separated by wide geographic areas. Correcto WANs use the services of carriers such as telephone companies, cable companies, satellite systems, and network providers. Correcto WANs use serial connections of various types to provide access to bandwidth. Correcto 20) Which three communications needs do WANs address? (Choose three.) Organizations often want to share information with other organizations across large distances. Correcto A department needs to share data files with a remote department Correcto Students need to do research for classes by accessing library indexes and publications located in other parts of their country and in other parts of the world. Correcto 21) Which two statements accurately describe the difference between LANs and WANs? (Choose two.) A LAN transmits data faster than a WAN. While a LAN connects computers, peripherals, and other devices in a single building or other small geographic area, a WAN transmits data across broad geographic distances. Correcto 22) At which OSI level do WAN protocols describe how to provide electrical, mechanical, operational, and functional connections to the services of a communications service provider? Layer 1 Correcto 23) At which OSI level do WAN protocols define encapsulation of data for transmission toward a remote location and the mechanisms for transferring the resulting frames? Layer 2 Correcto
24) In analog lines, they convert the digital signal of the sending device into analog format for transmission over an analog line and then convert the signal back to digital form so that the receiving device can receive and process the network signal. Modems (DSU/CSU) Correcto
While troubleshooting a network connectivity problem, a RPD technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message "Request timed out." is displayed. At which layer of the 7-layer OSI model does the problem most likely exist?
25)
26) They provide internetworking and WAN access interface ports. Routers Correcto 27) Provide a text-based connection for the configuration and troubleshooting of the router Management ports 28) Are made through a WAN interface on a router to a service provider to a distant site or to the Internet WAN interfaces 29) Allow the router to connect to the LAN media through Ethernet or some other LAN technology such as Token Ring or ATM LAN interfaces 30) WANs use these to provide access. Other networking devices 31) How many bits are contained in each field of an IPv6 address?
16 Correcto
32) Which option is a valid IPv6 address?
2004:1:25A4:886F::1 Correcto
33) What is known as "one-to-nearest" addressing in IPv6?
anycast Correcto
34) Select the valid IPv6 addresses. (Choose all apply)
addressing? (Choose two.) Link-local addresses start with FE00:/12. There is only one loopback address and it is ::1. Correcto
36) What is the function of the Cisco IOS command ip nat inside source
static 10.1.1.5 172.35.16.5? It creates a one-to-one mapping between an inside local address and an inside global address.
37) Which of the following commands would be applied to a WAN interface,
but not on LAN Interface? (Choose all that apply) encapsulation PPP Correcto no shutdown Correcto
38) Of the following choices below, only three could be used as WAN
encapsulation methods, as opposed to LAN encapsulation. Which three are they? (Choose three) HDLC Correcto Frame Relay Correcto PPP Correcto
39) What can the RDP network administrator utilize by using PPP (Point to
Point Protocol) as the Layer 2 encapsulation? (Choose three) Compression Correcto Authentication Correcto Multilink support Correcto
40) You are configuring the serial interface of your Cisco router; which of
the following are valid encapsulation types you can use? (Select all that apply) HDLC Correcto PPP Correcto Frame Relay Correcto