CNS 217 Final Worksheet Part Four(1)

Embed Size (px)

Citation preview

CNS 217 Worksheet Part Four

1.

Refer to the exhibit. If router RTA fails, which statement is true? A. Hosts A and B can reach each other, but cannot reach hosts C and D or the server B. No host can reach any other host. C. Hosts A, B, C, and D can reach each other, but cannot reach the server. D. All hosts can reach each other.

2.

Refer to the exhibit. Users on the 172.30.20.0/24 network are unable to access any of the servers located on the 192.168.0.0/23 network. Given the network topology and OSPF configuration, what two problems exist in this network? (Choose two.) A. There is a routing loop occurring between all three routers. B. There is a network statement missing. C. Network 172.30.20.0 has an incorrect wildcard mask. D. The OSPF area configuration is incorrect E. /23 is an invalid subnet mask for the 192.168.0.0 network.

3. Refer to the exhibit. A network support technician has been asked to set an IP address on one of the FastEthernet interfaces on a new router. What is causing the interface to reject the address? A. The IP address is already in use. B. The technician is using a network address. C. The technician is using the wrong subnet mask for /26. D. The technician must enable VLSM on the interface. 4. How does CHAP secure connectivity on a PPP link? A. It uses a two-way handshake to send the username and password. B. It encrypts user data that is sent across the link. C. It designates the remote node to control the frequency and timing of the login attempts. D. It authenticates the username and password during initial link establishment and repeatedly during the time the link is active.

5.

What are two features of an ACL? (Choose two.) A. A single ACL applied to a router interface will affect both inbound and outbound traffic. B. An ACL without a permit statement blocks all traffic. C. All Cisco ACLs end with an implicit deny statement. D. An ACL is active immediately after it has been created in global configuration mode. E. A router compares a packet to all statements of an ACL before permitting or denying access through an interface.

6. Refer to the exhibit. The network administrator wants to restrict the Production network from accessing the HR network. All other traffic will have access to all networks. Which combination of interface and direction should the administrator use to apply the ACL? A. Fa0/1, out B. Fa1/0, out C. Fa0/1, in D. Fa1/0, in

CNS 217 Worksheet Part Four

7. Refer to the exhibit. The command that is displayed was run on a switch with 24 FastEthernet ports. Why are some ports missing from VLAN1? A. The missing ports are administratively down B. The missing ports are not configured for STP. C. The missing ports are not connected to any active device. D. The missing ports are configured for trunk ports

8. Refer to the exhibit. The network administrator has configured R1, R2, and R3 to use RIPv2, and the network is fully converged. The hosts on the internal network are able to access R2, but they are unable to access the Internet. How can the administrator solve this problem? A. Enable the Serial0/0/0 interface of R2. B. Configure a default route on R2 via Serial0/0/0 and propagate it to R1 and R3 using RIPv2. C. Configure a default route on the ISP via Serial0/0/0. D. Configure the correct subnet mask on the Serial0/0/0 interface of R2.

9. Refer to the exhibit. Which VTP function will this switch perform? A. It will create, change and share local VLAN information with other switches in the XYZ domain. B. It will forward to other switches the VLANs that are created in Switch1. C. It will back up the VTP database for domain XYZ. D. It will forward VTP configuration information for domain XYZ.

10. Which WAN connection method uses a PVC? A. leased line B. ISDN C. DSL D. Frame Relay 11. What are two features of an extended IP ACL? (Choose two.) A. It uses numbers 1 through 99 for identification. B. It can permit or deny traffic based on source or destination address. C. It detects malicious attacks against the network and logs them on a server. D. It can filter traffic based on the protocol and port numbers. E. It encrypts traffic between hosts. 12. Which two statements are correct about Cisco HDLC encapsulation? (Choose two.) A. It defines a Layer 3 framing structure. B. It supports multiple network layer protocols. C. It supports the callback option on serial links. D. It is the default encapsulation type on Cisco router serial links. E. It uses a layered architecture to encapsulate multiprotocol datagrams.

13. A company is trying to decide whether to use a PVC or an SVC for the company WAN connection. Which statement best describes an SVC? A. It is dynamically established between two points when a router requests a transmission. B. It provides faster flow of information across the WAN as compared to a PVC connection. C. It eliminates the need for call setup and clearing. D. An SVC does not require a service provider.

14.

CNS 217 Worksheet Part Four

Refer to the exhibit. A network administrator wants to block Telnet sessions from host B to hosts E and F. Where should the administrator place the ACL that is displayed in the exhibit? A. on the Fa0/0 inbound interface of R1 B. on the S0/0/0 inbound interface of R1 C. on the S0/0/0 outbound interface of R3 D. on the Fa0/0 inbound interface of R3

15. What is the function of Inverse ARP in a Frame Relay network? A. It maps the IP address to the MAC address. B. It maps the MAC address to the DLCI. C. It maps the DLCI to the remote IP address. D. It maps the local IP address to the remote MAC address.

16. Which two wildcard masks are required in an extended access list statement that blocks the traffic from network 192.168.20.0/26 to network 172.16.32.0/19? (Choose two.) A. 0.0.63.255 B. 0.0.0.31 C. 0.0.31.255 D. 0.0.0.63 E. 0.0.0.0