1 / 78

You plug one end of a network cable in a PC and then into a switchport and the link light

You plug one end of a network cable in a PC and then into a switchport and the link light on the switch turns solid green. Which of the following does the link light indicate (choose two)? Layer 2 communication is working between the switch and the PC The PC received a address via DHCP

lesa
Download Presentation

You plug one end of a network cable in a PC and then into a switchport and the link light

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. You plug one end of a network cable in a PC and then into a switchport and the link light • on the switch turns solid green. Which of the following does the link light indicate (choose two)? • Layer 2 communication is working between the switch and the PC • The PC received a address via DHCP • The PC and the switch have traffic flowing between them • A flashing link light means a port speed of 10meg • Layer 1 connectivity has been established • Half-Duplex mode is in effect on the link Answer:A,E

  2. What does the following statement indicate? • “UDP port 53 is the only port allowed on this router interface.” • DNS traffic is allowed • SIP traffic is allowed • NNTP traffic is allowed • HTTP traffic is allowed Answer: A

  3. S0/0 Ip 209.30.129.5/30 Fa0/0 Ip 172.16.1.5/28 PC A Answer: E • PC A cannot communicate to the internet. A ping to 127.0.0.1 fails. What could be the problem? • Traffic to 127.0.0.1 is not being forwarded by the router • The host with the ip address of 127.0.0.1 is un reachable • The default gateway on the PC is notconfigured • The IP on PC A is incorrect • TCP/IP is incorrectly installed on the PC

  4. Switch A Table PC C PC D Switch A PC A PC B • PC B is sending a frame to PC C. What will happen to the frame when it is received by the switch? • The switch will drop the frame • The switch will send the frame out all ports except 0/2 • The switch will send an ARP request to PC C • The switch will send an ICMP destination host unreachable message to PC B • The switch will record the destination mac addrss of PC C into its Switching table Answer: B

  5. After the POST on a 2950 Catalyst switch the System LED remains amber. • What does this mean? • The POST was not successful • There is a problem with the internal power supply • The switch is having internal issues but can still forward data • The switch passed POST • The switch failed its POST and the operating system is prevented from loading Answer: E

  6. You have 300 devices and they must all be connected together in a single • broadcast domain, all edge devices must have their own collision domain • and must be cost effective. Which three of the following would allow • For this design (Select Three)? • One subnet with a mask of 255.255.254.0 • Two subnets with a mask of 255.255.255.0 • Seven 48-port hubs • Seven 48-port Switches • One router interface • Seven router interfaces Answer: A,D,E

  7. A wireless network must support a mobile wireless work force. Which of the following should • be done? • Use adapters and AP’s manufactured by the same vendor • Overlap the cell coverage 15 to 20% • Configure all the AP’s on the same channel • Use MAC addressing filtering to allow Clients to authenticate with surrounding AP’s Answer: B

  8. A B Switch A PC 1 Refer to the exhibit. The two connected ports on the TTC-S are not turning orange or green. What would be the most effective steps to troubleshoot this physical layer problem? (Choose three): Answer; B,C,D A. Ensure that the Ethernet encapsulations match on the interconnected TTC and TTC-S ports. B. Ensure that cables A and B are straight-through cables. C. Reseat all cables. D. Ensure the TTC-S has power.

  9. You are a network administrator for TTC.You have configured and installed a single 802.11g access point in the center of a square office. It is then reported that a few wireless users are experiencing slow performance and drops while most users are operating at peak efficiency. What are the causes of this problem? (Choose three.) A. cordless phones B. metal file cabinets C. antenna type or direction D. mismatched TKIP encryption Answer: A,B,C

  10. In order to route incoming packets, a router take will take two actions. What are the two actions? (Choose two.) Answer: C,D A. Validate sources of routing information. B. Identify the source network address of each packet. C. Identify the destination network address of each packet. D. Inspect the routing table to select the best path to the destination network address.

  11. What objective does an IDS accomplish? A. hide the private IP addressing structure from outside attackers B. perform statefull firewall functions C. detect malicious traffic and send alerts to a management station D. block suspicious network activity from entering the network Answer: C

  12. Part of the configuration of router TTC1 is shown below: Line vty 0 4 password 7 030752180500 login transport input ssh What is the effect of the configuration shown above on router TTC1? A. It configures the virtual terminal lines with the password 030752180500. B. It configures SSH globally for all logins. C. It tells the router or switch to try to establish an SSh connection first and if that fails to use Telnet. D. It configures a Cisco network device to use the SSH protocol on incoming communications via the virtual terminal ports. Answer: D

  13. The TTC administrator is concerned with enhancing network security. To do this, what are two recommended ways of protecting network device configuration files from outside security threats on the network? (Choose two.) A. Always use Telnet to access the device command line because its data is automatically encrypted. B. Use a firewall to restrict access from the outside to the network devices. C. Allow unrestricted access to the console or VTY ports. D. Use SSH or another encrypted and authenticated transport to access device configurations. Answer: B,D

  14. Which description is correct about the HDLC protocol? A. It is the preferred protocol for LAN communication. B. HDLC is compatible between all network vendors. C. On Cisco routers it is the default encapsulation for serial interfaces. D. The Cisco implementation of HDLC does not include proprietary extensions. Answer: C

  15. Which item is correct about the relationship between the protocol and its associated function? ICMP PC sends packets to the default gateway IP address the first since the PC turned on DHCP The network administrator is checking basic IP connectivity from a workstation on a server RARP The TCP/IP protocol stack must find an IP address for packets destined for a URL UDP A network device will automatically assign IP addresses to workstations DNS ARP

  16. What source and destination information can you find in the data link layer? A. port number B. URL C. IP address D. MAC address Answer: D

  17. What layer of the OSI does CDP operate? A. network B. physical C. transport D. data link Answer: D

  18. You are a network administrator for TTC. The following shows part of the TTC WAN: The network shown in the exhibit is running the RIP version 2. This network has converged, and the routers in this network are functioning properly. Then, the FastEthernet0/0 interface on router TTC1 goes down. The routers in this network will respond to this change in two ways. What are them? (Choose two) Answer: A,D S0/1 10.1.1.2 S0/1 10.1.1.6 192.168.1.0 192.168.2.0 Fa0/0 192.168.1.1 S0/0 10.1.1.1 S0/0 10.1.1.5 Fa0/0 192.168.2.1 TTC1 TTC2 TTC3 • Because of the split-horizon rule, router TTC2 will be prevented from sending erroneous information to TTC1 about connectivity to the 192.168.1.0 network. • B. Routers TTC2 and TTC3 mark the route as inaccessible and will not accept any further routing • updates from TTC1 until their hold-down timers expire. • C. All routers will reference their topology database to determine if any backup routes to the 192.168.1.0 • network are known. • D. When router TTC2 learns from TTC1 that the link to the 192.168.1.0 network has been lost, • TTC2 will respond by sending a route back to TTC1 with an infinite metric to the 192.168.1.0 • network.

  19. According to the following exhibit. A customer is not able to reach any web sites on the Internet, but others in the department have no problem. What most likely causes this problem? C:\ ipconfig/all Windows IP Configuration Host Name:……………………………..:TTC-PC1 Primary Dns Suffix……………………..: Node Type………………………………:Hybrid IP Routing Enabled…………………….:No WINS Proxy Enabled…………………..:No Ethernet-Adapter Local Area Connection 3: Connection-specific DNS Suffix:……...: Description……………………………...:Wired Network Connection Physical Address……………………….:00-13-CE-9B-33-93 Dhcp Enabled…………………………..:No IP Address………………………………:10.10.10.2 Subnet Mask……………………………:255.255.255.0 Default Gateway……………………….: 10.10.10.1 Answer: C A. A DHCP server address is not reachable by the PC. B. IP routing is not enabled. C. A DNS server address is not reachable by the PC. D. NAT has not been configured on the router that connects to the Internet.

  20. Before a workstation is able to exchange HTTP packets with a web server, what must occur? A. An ICMP connection must be established between the workstation and its default gateway. B. An ICMP connection must be established between the workstation and the web server. C. A UDP connection must be established between the workstation and the web server. D. A TCP connection must be established between the workstation and the web server. Answer: D

  21. For purposes of testing, the TTC1 and TTC2 routers are directly connected with their serial interfaces. As a administrator, you are required to make the serial line operational. By the output shown in the following exhibit, what must be done? TTC1# Show controllers s0/0 Interface Serial0/0 Hardware is PowerQUICC MPC860 DTE V.35 clocks stopped. Idb at 0x81 DE2098, driver data structure at 0x81DE4DF4 SCC Registers: TTC1# Show ip interface s0/0 Serial 0/0 is up, line protocol is down Internet address is 192.168.1.2/24 Broadcast is 255.255.255.255 . . . <some output omitted> S0/0 S0/0 TTC1 TTC2 Answer: D A. Start the clock on the TTC1. B. Replace the broken cable between the two devices. C. Change the IP address on the TTC2. D. Configure the serial 0/0 interface on the TTC2 with a clockrate.

  22. Match the corresponding commands and functions. (Not all options are used.) Ping 10.0.0.1 displays PC network configuration Ping 127.0.0.1 displays the list of routers on a path to a network destination tracert tests VTY configuration Ipconfig/all tests TCP/IP protocol stack Arp-a displays IP to MAC address mappings on a Windows PC telnet

  23. Data is divided into smaller pieces for transmission when files are transferred between a host and an FTP server. After these pieces reach the destination host, they should be reassembled to reconstruct the original file. What is used to for the reassembly of these pieces into the correct order? A. the TTL in the IP header B. the sequence number in the TCP header C. the Start Frame Delimiter in the 802.3 Preamble D. the frame check sequence in the Ethernet frame trailer Answer: B

  24. Match the corresponding commands and functions. (Not all options are used.) bits Network Layer packets UDP IP address segments Transport Layer Mac address windowing routing switching

  25. For the following Layer 4 protocols, which one is used for a Telnet connection? A. UDP B. TCP C. ICMP D. DNS Answer: B

  26. What do you think is the purpose of a default route? A. It is a route to be used when the routing protocol fails. B. It is a route configured by an ISP that sends traffic into a corporate network. C. It is a route used when a packet is destined for a remote network that is not listed in the routing table. D. It is a route manually configured for a specific remote network for which a routing protocol is not configured. Answer: C

  27. Which two statements best describe Cisco PAT implementation? (Choose two.) A. requires at least two public addresses to operate B. implemented to conserve public IP addresses C. can only be used between a private network and the Internet D. provides address connectivity between public and private addresses Answer: B,D

  28. Look at the following exhibit. Some value should be displayed in Box 1 of the ipconfig output of host A. What is it? 21.5.8.4/30 Internet RouterA 192.168.8.254/24 PC1 C:\ipconfig Windows IP Configuration Ethernet adapter Local Area Connection Connection-specific DNS Suffix . IP Address………………192.168.8.9 Subnet Mask………….255.255.255.0 Default Gateway…….. 192.168.8.20/24 Switch PC1 PC2 Box 1 192.168.8.254 192.168.8.9/24 192.168.8.8/24 A. 21.5.8.5 B. 192.168.8.20 C. 192.168.8.254 D. 192.168.8.8

  29. Match the corresponding commands and functions. (Not all options are used.) a protocol that converts human-readable names into machine-readable addresses SNMP used to assign IP addresses automatically and set parameters such as subnet mask and default gateway FTP a protocol for using HTTP or HTTPS to exchange XML-based messages over computer networks TFTP a connectionless service that uses UDP to transfer files between systems DNS a protocol used to monitor and manage network devices DHCP a reliable. Connection-oriented service that uses TCP to transfer files between systems

  30. Which two functions will be performed by routers on packets? (Choose two.) A. examine the Layer 3 headers of inbound packets and use that information to determine the complete paths along which the packets will be routed to their ultimate destinations B. update the Layer 2 headers of outbound packets with the MAC addresses of the next hops C. examine the Layer 3 headers of inbound packets and use that information to determine the next hops for the packets D. update the Layer 3 headers of outbound packets so that the packets are properly directed to their ultimate destinations Answer B,C

  31. DHCPACK Step1 DHCPOFFER Step 2 DHCPDISCOVER Step 3 DHCREQUEST Step 4

  32. Router Router 192.168.100.0/26 Switches Switches 200 users 192.168.3.0/24 Area 3 500 users 192.168.1.0/24 60 users 192.168.2.0/24 Area 1 Area 2 Answers: A,C,E Network staff is using the following diagram to expand on a current network. There will be a lot of users and a lot of networks. They will use the following IP address spaces to accommodate the needs. 192.168.1.1 thru 192.168.5.255 and 192.168.100.1 thru 192.168.100.255 • Area 1 IP address space is inadequate for the number of users • Area 3 IP address space is inadequate for the number of users • Area 2 could use a mask of /25 to conserve IP address space • The network address space that is provided requires a single network-wide mask • The router to router connection is wasting address space • The broadcast domain is Area 1 is to large for IP to function

  33. A file transfer fails from a host on Network A to to a server on Network Z. Hosts on Network A can communicate with other hosts on Network A. What command could you issue on RTA that would be most useful. • Show Flash • Show history • Show version • Show interfaces • Show controllers serial Answer: D

  34. For security reasons, information of RTA , including platform and IP addresses, should not be accessible from the internet. This information should however be accessible to devices on the internal networks of RTA. Which commands or series of commands would accomplish this? • RTA(config)#no cdp run • RTA(config)#no cdp enable • RTA(config)#interface s0/0 • RTA(config-if)#no cdp run • RTA(config)#interface s0/0 • RTA(config-if)#no cdp enable Answer: D

  35. According to the command output also shown in the exhibit, how will SwitchA handle this frame? A. It will drop the frame. B. It will forward the frame out port Fa0/3 only. C. It will flood the frame out all ports. D. It will flood the frame out all ports except Fa0/3. Answer: D

  36. Which one of the following characteristics is true regarding the use of hubs and switches? A. Hubs can have their ports be configured with VLANs B. Using hubs is costly with regard to bandwidth availability. C. Switches can not forward broadcasts. D. Switches are more efficient than hubs in processing frames. E. Switches increase the number of collision domains in the network. Answer: E

  37. The LAN needs are expanding at the TTC corporate office, which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the TTC network. Which of the following are layer 1 devices that you can use? (Choose two.) A. A switch B. A router C. A network adapter card D. A hub E. A repeater Answer: D,E

  38. CDP is being used throughout the TTC network. What are two reasons why the TTC network administrator would use CDP? (Choose two) A. To determine the status of network services on a remote device B. To obtain the IP Address of a connected device in order to telnet to the device C. To verify the type of cable interconnecting two devices D. To verify Layer 2 connectivity between two devices when Layer 3 fails E. To obtain VLAN information from directly connected switches F. To determine the status of the routing protocols between directly connected routers G. To support automatic network failover during outages Answer: D,B

  39. CDP is running between two TTC devices. What information is supplied by CDP? (Select three) A. Device Identifiers B. Capabilities list C. Platform D. Route identifier E. Neighbor traffic data Answer: A,B,C

  40. Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two) A. The presentation layer translates bits into voltages for transmission across the physical link. B. The transport layer divides a data stream into segments and adds reliability and flow control information. C. Packets are created when the network layer adds Layer 3 addresses and control information to a segment. D. The data link layer adds physical source and destination addresses and an FCS to the segment. E. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information. Answer: B,C

  41. Which protocol below uses TCP port 443 at layer 4? A. HTML B. HTTPS C. TFTP D. Telnet E. SMTP F. None of the above Answer: B

  42. Blocking UDP port Crossover Cable Router Switch2 Switch1 SMTP Mail Server 10.1.10.220/24 10.1.1.7/24 Pierre Pierre has just installed the mail server and Switch2. For Security reasons UDP packets are not permitted outbound on the Fa0/1 router interface. Pierre is now at his workstation testing the new installation and is not able to establish SMTP communication to the mail server. Answer: A • The crossover cable should be a straight-through cable. • UDP is blocked coming out of the Fa 0/1 interface of the router. • The server should be directly connected to the router. • The IP addresses are all on the same network. No router is requried.

  43. Digital Line CSU/DSU Synchronous Analog Modem Asynchronous WAN Service Provider Network Router Switch DTE DCE

  44. Which of the following are characteristics of a point-to-point frame relay subinterface? (Choose Two) • Requires the use of Inverse ARP • Resolves NBMA split horizon issues • Requires the frame-relay map command • Maps one IP subnet per DLCI • Maps one IP subnet across multiple DLCIs Answers: B,D

  45. Which two statements are true concerning wireless standards? (Choose Two) • Three standards exist: 802.11b, 802.11g and 802.11w • 802.11 divides the 2.4 Ghz into 14 channels • 802.11b is superior to 802.11a due to support for data rates up to 54mbs • 802.11b is intended to compensate for the half-duplex nature of wireless communications • 802.11g is not widely accepted due to production costs. Answers: B,E

  46. When troubleshooting a LAN interface operating in Full-Duplex mode, which error Condition could you immediately rule out? • Giants • No buffers • Collisions • Ignored • Dribble condition Answer: C

  47. Which of the following describes the role of devices in a WAN? (Choose three) • CSU/DSU terminates a digital local loop • A modem terminates a digital local loop • A CSU/DSU terminates an analog local loop • A modem terminates an analog local loop • A router is commonly considered a DTE device • A router is commonly considered a DCE device Answers: A,D,E

  48. ? Which two can be used to complete the physical loop between the local loop and the Central office provider? (Choose two) • WAN switch • PVC • ATM switch • Multiplexer • CSU/DSU • modem Answer; E,F

  49. Fa0/24 Fa0/24 Answer: E Vlan 4 Vlan 3 Vlan 2 Vlan 3 SwitchA#show cdp neighbors Capabilities Codes: R – Router, T – Trans Bridge, B – Source route Bridge S – Switch, H –Host, I – IGMP, r – Repeater Device ID Local Int Hold Time Capability Platform Port ID SwitchA# -------------------------------------------------------------------------------------------------------------------- SwitchB#show cdp neighbors Capabilities Codes: R – Router, T – Trans Bridge, B – Source route Bridge S – Switch, H –Host, I – IGMP, r – Repeater Device ID Local Int Hold Time Capability Platform Port ID Two 2950 switches connect through their ports fa 0/24 using a straight through cable. Based on the output that is shown and the information that is given , what can be concluded? • STP can not be configured on a FastEthernet port • An IP address and default gateway must be configured on each switch • The switches do not share the same VTP domain • Port fa 0/24 must be configured as a trunk in order for the switches to share neighbor information • The switches are cabled incorrectly

  50. PSTN Point to Point ATM Circuit Switched Leased Line Packet Switched Frame Relay Cell Switched

More Related