TEKA-TEKI SILANG
Jawaban:
- Layer 2 forwarding protocol
- Data Encryption Standard
- Secure hash algorithmi
- Advanced Encryption Standard
- Diffiehellman
- RSA
- Generic Routing Encapsulation
- Layer 2 Tunneling Protocol
- 3 DES
- IPSEC
- PPTD
- Message Digests
1A network engineer researched whether there are mechanisms available to help with the
transition from an IPv4 addressing structure to IPv6. What three options did the engineer find?(Choose three.)
a.A protocol translation mechanism allows communication between the IPv4 and IPv6 networks.
b.A packet analyzer determines the addressing structure and converts it to the appropriate IPv4 or IPv6 scheme.
c. New Core devices that support IPV6 must be purchased.
d. A protocol converter changes IPv4 packets into IPv6 packets and vice versa.
e.A dual-stack network design allows both IPv4 and IPv6 addressing to be used on all network devices.
f.Tunneling allows IPv4 packets to be encapsulated so that they can traverse IPv6
networks and vice versa.
2
When should the command no auto-summary be used?
a.with RIP version 1, to enable classless routing
b.with RIP version 2, to enable classless routing
c. with RIP version 1, when discontigous networks exist
d. with RIP version 2, when discontigous networks exist
3
Refer to the exhibit. What must an administrator do on R3 to ensure that update packets are sent
with subnet mask information?
a.Add the commands:
R3(config-router)# auto-summary
R3(config-router)# no version 2
b.Add the commands:
R3(config-router)# version 2
R3(config-router)# no auto-summary
c.Change the network statement on R3:
R3(config)# network 10.10.4.0
d.Add the command:
R3(config)# ip route 0.0.0.0 0.0.0.0 s0/0
4
What best describes a discontiguous network?
a. combines several classfull networking address
b. contains more than one route to a destination
c. implements more than one routing protocol
d. separated from the rest of the hierarchical group by another network
5
Refer to the exhibit. A company has decided to add a new workgroup. If the subnetting scheme
for the network uses contiguous blocks of addresses, what subnet is assigned to WGROUP3?
a. 172.16.3.12/29
b. 172.16.3.16/29
c. 172.16.3.20/29
d. 172.16.3.24/29
e. 172.16.3.32/29
6
A network administrator is using the 10.0.0.0/8 network for the company. The administrator must
create a masking scheme to support 750 users at the main office and 620 users at the remote
office. What mask should be assigned to the 10.0.0.0/8 network to preserve the most addresses?
a. 255.255.255.0
b. /19
c. /20
d. 255.255.252.0
e. /23
f. /21
7
What is another format for the IPv6 address 1080:0000:0000:0000:0000:0000:1267:01A2?
a. 1080::1267:01A2
b. 1080:0:0:0:0:1267:01A2
c. 1080::0:1267:01A2
d. 1080:::::1267.01A2
8
How many bits make up an IPv6 address?
a. 32
b. 48
c. 64
d. 128
9
After activating IPv6 traffic forwarding, configuring IPv6 addresses, and globally configure RIPng,
what is the remaining step to activate RIPng?
a. Enter the ipv6 router rip name command and then use network statements to activate RIPng on the interfaces.
b. Enter the ipv6 router rip name command and then specify which interfaces run RIPng,
which are passive, and which only receive.
c. Enter the interface mode for each IPv6 interface and enable RIPng with the ipv6 rip name enable command.
d. Enter the interface mode for each IPv6 interface and enable the multicast group FF02::9,
and then activate RIPng globally using the ipv6 router rip name command.
e. Enter the router rip command, and then activate RIPng using the version command.
f. RIPng then automatically runs on all IPv6 interfaces.
10
Refer to the exhibit. The IT management has determined that the new subnet for WGROUP3
needs to be broken down into four more subnets. What would the subnet mask be for the four
newly created subnets within WGROUP3?
a. 255.255.128.0
b. 255.255.192.0
c. 255.255.224.0
d. 255.255.248.0
e. 255.255.252.0
11
Refer to the exhibit. What is the first usable IP address that can be assigned to the WGROUP3
switch?
a. 172.16.50.96/27
b. 172.16.50.97/27
c. 172.16.50.98/27
d. 172.16.50.99/27
e. 255.255.255.0
12
Refer to the exhibit. Which set of router commands is required to turn on unequal-cost load
sharing so that RTRA selects the path A-B-E and the lowest cost path A-C-E to the Internet?
a. RTRA(config)# router eigrp 1
RTRA(config-router)# variance 2
b. RTRA(config)# router eigrp 1
RTRA(config-router)# variance 1
c. RTRA(config)# router eigrp 1
RTRA(config-router)# maximum-paths 2
d. RTRA(config)# router eigrp 1
RTRA(config-router)# maximum-paths 1
13
Refer to the exhibit. Assuming that the default EIGRP configuration is running on both routers,
which statement is true about Router A reaching the 2.2.2.0/24 network?
a. The no auto-summary command needs to be issued to disable automatic summarization.
b. The network 2.2.2.0 command needs to be issued to ensure that Router A recognizes the 2.2.2.0 network.
c. EIGRP supports VLSM and automatically recognizes the 2.2.2.0 network.
d. EIGRP does not support VLSM; therefore it cannot be used with discontiguous networks.
14
Refer to the exhibit. The network administrator wants router RTA to send only the summarized
route of 10.10.0.0/16 to RTC. Which configuration accomplishes this?
a. RTA(config)# interface s0/0
RTA(config-if)# ip summary-address eigrp 101 10.10.0.0 255.255.0.0
RTA(config-if)# exit
RTA(config)# router eigrp 101
RTA(config-router)# no auto-summary
b. RTA(config)# interface s0/1
RTA(config-if)# ip summary-address eigrp 101 10.10.0.0 255.255.0.0
RTA(config-if)# exit
RTA(config)# router eigrp 101
RTA(config-router)# no auto-summary
c. RTA(config)# interface s0/0
RTA(config-if)# ip summary-address eigrp 101 10.10.0.0 255.255.0.0
d. RTA(config)# interface s0/1
RTA(config-if)# ip summary-address eigrp 101 10.10.0.0 255.255.0.0
15
What is a good design practice when developing a hierarchical addressing scheme?
a. Address the nodes in the Access Layer and work toward the Core Layer.
b. Assign addresses to the Core devices before planning the addressing scheme for the server farm.
c. Determine where statically configured addressing will be implemented.
d. Determine what percentage of devices are wired and what percentage of devices are wireless.
16
A network administrator is asked to design a new addressing scheme for a corporate network.
Presently, there are 850 users at the head office, 220 users at sales, 425 at manufacturing, and
50 at the research site. Which statement defines the correct VLSM addressing map with minimal
waste using the 172.17.0.0/16 network?
a. 172.17.0.0/20 head office
172.17.1.0/21 manufacturing
172.17.1.0/22 sales
172.17.3.0/26 research
b. 172.17.48.0/19 head office
172.17.16.0/20 manufacturing
172.17.48.128/25 sales
172.17.48.0/26 research
c. 172.17.0.0/22 head office
172.17.4.0/23 manufacturing
172.17.5.0/24 sales
172.17.6.0/26 research
d. 172.17.2.0/22 head office
172.17.3.0/23 manufacturing
172.17.4.0/26 sales
172.17.4.128/25 research
16
How would the routes for networks 172.16.1.0/24, 172.16.3.0/24, and 172.16.15.0/24 be summarized?
a. 172.16.0.0/20
b. 172.16.0.0/21
c. 172.16.0.0/22
d. 172.16.0.0/24
17
What two advantages does CIDR provide to a network? (Choose two.)
a. dynamic address assignment
b. automatic route redistribution
c. reduced routing update traffic
d. easier management of summarization
e. automatic summarization at classfull boundaries
18
Which statement describes MD5 authentication for neighbor authentication?
a. All passwords are sent in clear text when neighbors first learn about each other.
b. Only the initiating router sends its password using encrypted text when it first discovers a new router.
c. All routers send their password using encrypted text only when they first learn of each other.
d. All routers send their password using encrypted text each time they exchange update packets.
19
Refer to the exhibit. What are the broadcast addresses for each subnet?
a. Admin - 172.16.31.0
QA - 172.16.1.127
Development - 172.16.2.255
Sales - 172.16.32.255
b. Admin - 172.16.31.255
QA - 172.16.1.255
Development - 172.16.3.255
Sales - 172.16.63.255
c. Admin - 172.16.31.255
QA - 172.16.1.127
Development - 172.16.3.255
Sales - 172.16.63.255
d. Admin - 172.16.31.0
QA - 172.16.1.255
Development - 172.16.2.255
Sales - 172.16.32.255
20
Refer to the exhibit. The IT management is adding three VLANs to the wgroup3 switch.
The current subnet will be broken down to support 14 hosts for each of the new VLANs.
What will the new subnet mask be for these VLANs?
a. 255.255.255.192
b. 255.255.255.240
c. 255.255.248.0
d. 255.255.255.224
e. 255.255.240.0
f. 255.255.255.248
21
An administrator is configuring IPv6 on a router. The steps that
have already been completed are:
1. Activate IPv6 traffic forwarding.
2. Configure IPv6 addresses.
3. Globally configure RIPng.
What is the remaining step to complete the activation of RIPng?
a. Enter the ipv6 router rip name command and then use network statements to
activate RIPng on the interfaces.
b. Enter the ipv6 router rip name command and then specify which interfaces run
RIPng, which are passive, and which only receive.
c. Enter the interface mode for each IPv6 interface and enable RIPng with the ipv6
rip name enable command.
d. Enter the interface mode for each IPv6 interface and enable the multicast group
FF02::9, and then activate RIPng globally using the ipv6 router rip name command.
e. Enter the router rip command, and then activate RIPng using the version
command. RIPng then automatically runs on all IPv6 interfaces.
22
Which range includes all available networks in the 192.168.8.0/21 network?
a. 192.168.8.0/24 - 192.168.14.0/24
b. 192.168.8.0/24 - 192.168.15.0/24
c. 192.168.8.0/24 - 192.168.16.0/24
d. 192.168.8.0/24 - 192.168.17.0/24
23
Which two are best practices for creating a new IP addressing
scheme for a network? (Choose two.)
a. Plan and allow for significant growth.
b. Assign addresses to the access layer before any other layer.
c. Plan the entire addressing scheme before assigning any addresses.
d. Begin with the access layer network summary addresses and work to the edge.
e. Plan the addressing scheme to meet the current minimum requirement needs.
f. Implement statically assigned addresses to all hosts in the distribution layer first.
24
Refer to the exhibit. Which subnet will provide sufficient addresses for the Production
network with minimal waste?
a. 172.16.0.192/26
b. 172.16.0.192/27
c. 172.16.0.224/26
d. 172.16.0.160/26
e. 172.16.0.144/27
25
A network designer is implementing a new network for a company.
The designer is using all new Cisco equipment and has decided to select a hierarchical
routing protocol for the network. The designer wishes to minimize traffic from routing
updates but also needs fast routing convergence in the event of a topology change. Also,
the existing IP addressing scheme requires that the selected protocol support VLSM.
Which routing protocol should be chosen?
a. BGP
b. RIP v1
c. RIP v2
d. OSPF
• The test network experiences real-world network traffic.
• Users within the enterprise are not affected by the test.
• Network response can be tested in unplanned and unpredictable situations.
• Unlikely failure conditions can be conveniently tested.
• Network response can be tested in a highly controlled simulated environment.
2. While preparing a network test plan document, a network designer records all initial and modified device configurations. Which section of the document typically contains this information?
• Appendix
• Test Procedures
• Test Description
• Actual Results and Conclusions
• Anticipated Results and Success Criteria
3. Refer to the exhibit. A network designer creates a test plan that includes the specification shown. In which section of the test plan would this specification be found?
• Test Description
• Test Procedures
• Design and Topology Diagram
• Actual Results and Conclusions
• Anticipated Results and Success Criteria
4. What OSI model Layer 2 security measure can a network engineer implement when prototyping network security?
• a firewall at the network edge
• port security at the access design layer
• port security at the distribution design layer
• IP access control lists at the access design layer
5. How do designers decide which network functions need to be included in the prototype test?
• They select the functions that align with the business goals.
• They select the functions that occur at the network core.
• They select the functions that do not exist in the existing network.
• They select the functions from a list of generic network operations.
6. Refer to the exhibit. During prototype testing of the Cisco network shown, connectivity must be verified. Assuming all connections are working and CDP is enabled on all devices and interfaces, on which device was the command issued?
• R1
• S1
• R3
• S2
• R5
• S3
7. Refer to the exhibit. During prototyping, Layer 2 functionality is being tested. Based on the output shown, which two pieces of information can be determined? (Choose two.)
• Switch1 is the root bridge.
• Interface Fa0/2 on Switch1 has no role in the operation of spanning tree.
• Interface Fa0/2 on Switch1 is the alternate port used to reach the root bridge.
• Based on the entries in the "Role" column, it can be concluded that RSTP has been implemented.
• Interface Fa0/1 on Switch1 is the forwarding port selected for the entire spanning-tree topology.
8. What Rapid Spanning Tree Protocol (RSTP) state is given to the forwarding port elected for every switched Ethernet LAN segment?
• root
• backup
• alternate
• designated
9. Refer to the exhibit. During prototype testing, verification of VLAN connectivity is being performed. Based on the information shown, what command produced the output?
• show spanning-tree
• show interfaces trunk
• show cdp neighbors
• show interfaces
• show ip interface brief
10. Switch port Fa0/24 was previously configured as a trunk, but now it is to be used to connect a host to the network. How should the network administrator reconfigure switch port Fa0/24?
• Use the switchport mode access command from interface configuration mode.
• Enter the switchport nonegotiate command from interface configuration mode.
• Administratively shut down and re-enable the interface to return it to the default.
• Enter the no switchport mode trunk command in interface configuration mode.
• Use the switchport access vlan vlan number command from interface configuration mode
• to remove the port from the trunk and add it to a specific VLAN.
11. Refer to the exhibit. The redundant paths are of equal bandwidth and EIGRP is the routing protocol in use. Which statement describes the data flow from Server to PC2?
• EIGRP load balances across the R3 to R1 and R3 to R2 links.
• EIGRP load balances across the R1 to Switch3 and R2 to Switch3 paths.
• EIGRP load balances across the Switch1 to Switch3 and Switch1 to Switch2 paths.
• EIGRP does not load balance in this topology.
12. A network designer needs to determine if a proposed IP addressing scheme allows efficient route summarization and provides the appropriate amount of scalability to a design. What is useful for validating a proposed hierarchical IP addressing scheme?
• NBAR
• a pilot network
• a route summary
• a network simulator
• a physical topology ma
13. In the router command encapsulation dot1q 10, what does the number 10 represent?
• the metric used for a particular route
• the number of the VLAN associated with the encapsulated subinterface
• the priority number given to the device for the election process
• the number that must match the Fast Ethernet subinterface number
• the number used to program the router for unequal cost path load balancing
14. Refer to the exhibit. The users on the 192.168.10.192 network are not allowed Internet access. The network design calls for an extended ACL to be developed and tested. Where should the ACL be placed for the least effect on other network traffic?
• inbound on Fa0/0 of R3
• outbound on Fa0/0 of R3
• inbound on Fa0/1 of R3
• outbound on Fa0/1 of R3
• inbound on Fa0/1 of R2
• outbound on S0/0 of R2
15. Refer to the exhibit. What two measures can be taken to address the areas of weakness circled in the network design? (Choose two.)
• Provide redundant connections to all end users.
• Add another core switch to increase redundancy.
• Add a switch in the server block connecting the server farm to each core switch.
• Add an additional switch to the DMZ and direct links from the new switch to the core switches.
• Provide a redundant firewall router connecting to a second ISP, the core switches, and the DMZ.
16. Why is it important to record baseline measurements of a prototype network?
• Test results show security weaknesses after the baseline tests are run.
• The baseline is the point at which the network is operating at its fullest potential.
• Baseline measurements define a point at which network traffic has exceeded the designed capabilities of the network.
• Test results are compared to the baseline to see how the test conditions increase processor use or decrease available bandwidth.
17. Refer to the exhibit. A network administrator has been given the task of creating a design for a temporary classroom building that is to be set up outside an overcrowded school. In testing the prototype, it is found that the student PC cannot ping the teacher PC. All the switch interfaces are active and connected properly, as is interface Fa0/0 of the router. Given that only the commands shown have bee added to the router configuration, what is the source of the problem?
• The IP settings on the student PC are incorrect.
• The default gateway on the teacher PC is misconfigured.
• The router Fa0/0 interface has not been configured as a VLAN trunk.
• The Fa0/0 physical interface has not been configured with an IP address and subnet mask.
• The administrator forgot to configure a routing protocol to allow the ping packets to reach the teacher PC subnet.
18. Refer to the exhibit. Why are interfaces Fa0/11, Fa0/23, and Fa0/24 not shown in this switch output?
• Interfaces Fa0/11, Fa0/23, and Fa0/24 are trunks.
• Interfaces Fa0/11, Fa0/23, and Fa0/24 are shutdown.
• Interfaces Fa0/11, Fa0/23, and Fa0/24 are blocking.
• Interfaces Fa0/11, Fa0/23, and Fa0/24 failed diagnostics
19. Refer to the exhibit. A network technician is performing an initial installation of a new switch in the east wing. The technician removes the switch from the box, makes the connections to the network, and adds the configuration shown. The technician notifies the network administrator that the switch has been installed. When the network administrator at the home office attempts to telnet to the switch from host 192.168.0.1, the connection fails. What action should the network technician take?
• Add an enable password to the switch.
• Add a default gateway to the switch configuration.
• Configure the switch with an IP access list to permit the host connection.
• Enable the physical interfaces of the switch with the no shutdown command.
20. Refer to the exhibit. After all the interfaces have stabilized, what is the spanning-tree state of all the enabled interfaces of SW11?
• discarding
• forwarding
• learning
• listening
Copyright 2009 - alone_Lagee
Blogspot Theme designed by: Ray Creations, Ray Hosting.