Discovery 2 Final

Embed Size (px)

DESCRIPTION

2014 July Discovery 2 final exam

Citation preview

Top of FormWhich type of address is 192.168.17.111/28?

host address

network address

broadcast address

multicast address

Bottom of Form

Top of FormRefer to the exhibit. Which two statements describe the data conversation shown? (Choose two.)

The data conversation was started by the HTTP application process running on the client.

The data conversation is identified by TCP port 80 on the client.

The user started the data conversation by sending an e-mail.

The IP address of the Internet server is 192.168.17.43.

The Internet server will send data to port 8547 on the client.

Bottom of Form

Top of FormWhat are two purposes of DNS? (Choose two.)

to dynamically assign IP addressing information to network hosts

to simplify the administration of host and default gateway addressing on client computers

to assign TCP port numbers to hosts as part of the data transfer process

to resolve human-readable domain names to numeric IP addresses

to replace the static HOSTS file with a more practical dynamic system

Bottom of Form

Top of FormA company is developing an Internet store for its website. Which protocol should be used to transfer credit card information from customers to the company web server?

FTPS

HTTP

HTTPS

WEP2

TFTP

Bottom of Form

How do port filtering and access lists help provide network security?

They prevent specified types of traffic from reaching specified network destinations.

They alert network administrators to various type of denial of service attacks as they occur.

They prevent viruses, worms, and Trojans from infecting host computers and servers.

They enable encryption and authentication of confidential data communications.

A hacker attempts to reach confidential information that is stored on a server inside the corporate network. A network security solution inspects the entire packet, determines that it is a threat, and blocks the packet from entering the inside network. Which security measure protected the network?

an IDS

an IPS

a host-based firewall

Anti-X software

Top of FormRefer to the exhibit. A new branch office has been added to the corporate network and a new router is to be installed to allow branch office users to access the database server at headquarters. How should the serial 0/0/0 interface of the new branch office router be configured to connect to the headquarters router?

branch_23(config-if)# ip address 192.168.5.19 255.255.255.240 branch_23(config-if)# no shutdown

branch_23(config-if)# encapsulation hdlc branch_23(config-if)# ip address 192.168.5.25 255.255.255.240 branch_23(config-if)# no shutdown

branch_23(config-if)# encapsulation ppp branch_23(config-if)# no shutdown

branch_23(config-if)# encapsulation ppp branch_23(config-if)# ip address 192.168.5.33 255.255.255.240

branch_23(config-if)# encapsulation ppp branch_23(config-if)# ip address 192.168.5.21 255.255.255.240 branch_23(config-if)# no shutdown

Bottom of Form

Top of FormA network technician is using a network management station to gather data about the performance of devices and links within the ISP. Which application layer protocol makes this possible?

SNMP

FTP

DHCP

SMTP

Bottom of Form

What is the purpose of the routing process?

to encapsulate data that is used to communicate across a network

to select the paths that are used to direct traffic to destination networks

to convert a URL name into an IP address

to provide secure Internet file transfer

to forward traffic on the basis of MAC addresses

Top of FormRefer to the exhibit. A NOC technician at an ISP enters the command c:\ping 209.165.201.7. What are two reasons to use this command? (Choose two.)

map the path to 209.165.201.7

test reachability to 209.165.201.7

locate connectivity problems along the route to 209.165.201.7

identify ISPs that interconnect the NOC and remote host with IP 209.165.201.7

measure the time that packets take to reach 209.165.201.7 and return to the technician's workstation

Bottom of Form

Top of FormA user is attempting to do an http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)

DNS server

WINS server

HTTP server

default gateway

Netbios

Bottom of Form

How does a switch interface that uses sticky port security handle MAC addresses?

The addresses are configured manually and are saved in the running configuration.

They are configured manually and are not saved in the running configuration.

They are configured dynamically and are saved in the running configuration.

They are configured dynamically and are not saved in the running configuration.

Top of FormRefer to the exhibit. A network administrator is troubleshooting the serial connection between R1 and R2. There is no communication between R1 and R2. Based on the output of the show ip interface brief command, what is the cause of the problem?

There is a misconfiguration of IP addresses.

There is a mismatch of encapsulation methods.

The no shutdown command should be issued on R2.

The routing protocols are not compatible.

Bottom of Form

Which combination of network address and subnet mask allows 62 hosts to be connected in a single subnet?

Network address 10.1.1.4 Subnet mask 255.255.255.240

Network address 10.1.1.0 Subnet mask 255.255.255.252

Network address 10.1.1.0 Subnet mask 255.255.255.192

Network address 10.1.1.4 Subnet mask 255.255.255.248

Top of FormWhich cable type is used to interconnect the FastEthernet interfaces of two routers?

straight-through

crossover

console

rollover

Bottom of Form

Top of FormWhich routing protocol depends on the DUAL algorithm to calculate the shortest path to a destination?

OSPF

EIGRP

RIP

BGP

Bottom of Form

Which routing protocol facilitates the exchange of routing information between different autonomous systems?

OSPF

EIGRP

RIP

BGP

Top of FormWhich statement is true about the reverse lookup DNS zone?

It is most commonly experienced when users are surfing the Internet.

It is the backup for the forward lookup zone.

It dynamically updates the resource records.

It resolves an IP address to a fully qualified domain name.

Bottom of Form

Which routing protocol excludes the subnet information from routing updates?

EIGRP

OSPF

RIPv1

BGP

A network is spread across two buildings that are separated by a distance of 500 feet (152 meters). An electrical transformer is installed near the cable route. Which type of cable should be used in this network?

STP

UTP

coaxial

fiber-optic

What is a feature of PAT?

It maps IP addresses to URLs.

It displays private IP addresses to public networks.

It sends acknowledgments of received packets.

It allows multiple hosts on a single LAN to share globally unique IP addresses.

In order to load an initial configuration on a new switch, a network administrator has connected a laptop to the switch via the use of a console cable. About a minute after the network administrator powers on the switch, the SYST LED on the front of the switch changes from blinking green to amber. What does this indicate?

The network administrator has made an improper physical connection to the switch.

The switch is ready to have a configuration file loaded.

A port on the switch is bad.

The switch failed POST.

Top of FormWhat is the effect of issuing the hostname RouterA command on a router?

A description will be configured on the router interfaces identifying them as belonging to RouterA.

The router will attempt to establish a connection to the host with the name RouterA.

The router will map an IP address to the domain name RouterA.

The router prompt will change from Router(config)# to RouterA(config)#

Bottom of Form

Top of FormRefer to the exhibit. While configuring the serial interface of a router, the network administrator sees the highlighted error message. What is the reason for this?

The serial interface is administratively down.

The serial interface is already configured with an IP address.

The network administrator has attempted to configure the serial interface with a broadcast address.

The same IP address has been configured on another interface.

Bottom of Form

Top of FormRefer to the exhibit. R2 is connected to the Serial0/0/1 interface of R1 and is properly configured to share routing updates with R1. Which network will R2 exclude from installing in its routing table?

R 192.168.10.0/24 [120/2] via 192.168.1.2, 00:00:10, Serial0/0/1

R 192.168.7.0/24 [120/1] via 192.168.1.2, 00:00:10, Serial0/0/1

R 192.168.6.0/24 [120/15] via 192.168.3.2, 00:00:10, Serial0/0/0

R 192.168.8.0/24 [120/2] via 192.168.3.2, 00:00:10, Serial0/0/0

Bottom of Form

Top of FormRefer to the exhibit. The network administrator uses the command below to configure a default route on RTB:

RTB(config)# ip route 0.0.0.0 0.0.0.0 fa0/0

A ping issued from PC3 is successful to RTB. However, echo request packets arrive at PC1 but the echo replies do not make it back to PC3. What will fix this problem?

RTA must be configured to forward packets to the 192.168.2.0 network.

The ip route command needs to be edited so that the next hop address is 10.1.1.5.

The ip route command needs to be edited so that the 192.168.2.1 address is the next hop address.

The ip route command should be removed from the RTB router configuration.

Another default route should be configured on RTA with a next hop address of 10.1.1.6.

Bottom of Form

Top of FormRefer to the exhibit. What is used to exchange routing information between routers within each AS?

static routing

IGP routing protocols

EGP routing protocols

default routing

Bottom of Form

8Top of FormRefer to the exhibit. Which three IP addresses could be assigned to the hosts? (Choose three.)

192.168.88.1

192.168.88.8

192.168.88.9

192.168.88.12

192.168.88.14

192.168.88.15

192.168.88.16

192.168.88.18

Bottom of Form

Top of FormFor the assignment of permissions to files and folders, what does the "principle of least privilege" imply?

No user has more privileges than any other user.

Permissions to files are given based on seniority.

Users only have access to resources that are necessary for their jobs.

Users should be given no access to computer resources until they ask.

Bottom of Form

A user calls a help desk about being unable to connect to a web server. The technician asks the user to issue a ping 127.0.0.1 command. What is the purpose of this command?

verify if the network cable is connected to the PC

verify if the TCP/IP stack is functioning on the PC

verify if the IP address is configured correctly on the PC

verify if the DNS server IP addresses are present on the PC

An administrator wishes to protect a router by encrypting the console access password noaccess. Which command should be used?

Router(config)# enable secret noaccess

Router(config)# enable password noaccess

Router(config-line)# password noaccess

Router(config)# service password-encryption

When a field technician visits a customer site and resolves the issue that was opened in a trouble ticket, what should the technician do?

assess the network design of the customer site

survey users at the customer site for further needs

document the solution and obtain acceptance of the customer

discuss further problems that are identified during the visit and offer cost estimates

What will a router do with a packet that is destined for a host with the IP address 192.168.1.5/24 if no entry for the 192.168.1.0/24 network exists in the routing table?

It will drop the packet.

It will send the packet back to the source address.

It will broadcast the packet out all of its active interfaces.

It will broadcast the packet out all of its active interfaces except the interface that received the packet.

Top of FormRefer to the exhibit. What does the ^ symbol indicate?

It marks the end of an error message and an insert point for a new command.

It marks the beginning of an error message and an insert point for a new command.

It marks a point in the command string where there is an incorrect or unrecognized character.

It marks a point in the command string where a parameter has to be entered to complete the command configuration.

Bottom of Form

Top of FormRefer to the exhibit. What effect will the commands have when entered on R2?

They will prevent all simultaneous in-band connections.

They will permit an unlimited number of in-band connections.

They will permit a maximum of five simultaneous in-band connections.

They will permit a minimum of four simultaneous in-band connections with a different password on each connection.

Bottom of Form

A network technician wants to restore a backup copy of the saved configuration file on a router from a TFTP server. After restoring the file from the TFTP server, the technician reloads the router and finds that it still has the old configuration file instead of the restored file. What could have caused this?

The technician entered the command delete flash: before reloading the router.

The technician entered the command boot system rom before reloading the router.

The technician entered the command erase startup-config before reloading the router.

The technician failed to enter the command copy running-config startup-config before reloading the router.

What is a characteristic of a scalable network?

100% uptime

redundant links

easy expansion

multiple backup devices

A Cisco switch is installed into a network and two module slots are purposefully left empty. Which network design consideration does this address?

reliability

scalability

redundancy

accessibility

What are three characteristics of the TCP protocol? (Choose three.)

exchanges datagrams unreliably

is used to send IP error messages

forces the retransmission of unacknowledged packets

carries the IP address of the destination host in the TCP header

is responsible for breaking messages into segments and reassembling them at their destination

manages the exchange of messages between source and destination hosts to maintain a communication session

Top of FormA network engineer has been asked to design a new structured cable system. What should be the first step in the project?

Obtain an accurate floor plan.

Identify all potential sources of EMI.

Sketch the proposed network design.

Determine the locations of all network devices.

Bottom of Form

Top of FormRefer to the exhibit. Host 2 has in-band and out-of-band connections to the switch. Select the appropriate cable type for each segment in the graphic.

A - straight-throughB - consoleC - crossoverD - crossoverE - serial

A - straight-throughB - straight-throughC - crossoverD - straight-throughE - straight-through

A - straight-throughB - consoleC - straight-throughD - straight-throughE - crossover

A - straight-throughB - consoleC - crossoverD - straight-throughE - serial

Bottom of Form

Which two pieces of information can an administrator verify by using the show version command? (Choose two.)

contents of NVRAM

operating system version

allocated and available memory

current configuration commands

operational status of interfaces

Top of FormRefer to the exhibit. What is the technician intending to do with the software application?

remotely access a network device

test secure Layer 3 connectivity to a remote network device

configure a directly connected Cisco network device

determine the number of hops between a computer and a remote network device

Bottom of Form

Top of FormThe show ip route command was executed on one of the routers shown in the graphic and the following output was displayed:

C 192.168.4.0/24 is directly connected, Serial0/0 R 192.168.5.0/24 [120/1] via 192.168.4.2, 00:00:19, Serial0/0 R 192.168.1.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1 R 192.168.2.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1 C 192.168.3.0/24 is directly connected, Serial0/1

From which router was this command executed?

A

B

C

D

Bottom of Form

Top of FormIf the start-up configuration is not found in NVRAM, where will the router look for it next by default?

flash

ROM

RAM

TFTP server

Bottom of Form

Which statement best describes the operation of a Layer 2 switch?

functions at the network layer of the OSI model

forwards traffic from one local IP network to another

directs traffic from one port to another based on the destination MAC address

dynamically creates a forwarding table that maps IP addresses to MAC addresses

Top of FormRefer to the exhibit. What is the possible reason that a technician is unable to telnet into the HQ router and make configuration changes?

A password is required for vty 0.

A password for line con 0 is required.

All five virtual interfaces must be configured before Telnet is possible.

The service password-encryption command is preventing Telnet access.

Bottom of Form

Which protocol is used to send e-mail messages between two servers that are in different e-mail domains?

HTTP

POP3

SMTP

IMAP4

A network administrator is configuring a DTE serial interface on a 1841 router. The serial interface is installed in the first controller, second slot, first port, with an IP address from the 192.168.1.8 /30 network. Which set of commands correctly configures this interface?

Router(config)# interface serial 0/0/0 Router(config-if)# ip address 192.168.1.10 255.255.255.252 Router(config-if)# clock rate 64000 Router(config-if)# no shutdown

Router(config)# interface serial 0/1/1 Router(config-if)# ip address 192.168.1.10 255.255.255.252 Router(config-if)# clock rate 64000 Router(config-if)# no shutdown

Router(config)# interface serial 0/1/0 Router(config-if)# ip address 192.168.1.10 255.255.255.252 Router(config-if)# no shutdown

Router(config)# interface serial 1/2/1 Router(config-if)# ip address 192.168.1.10 255.255.255.252 Router(config-if)# no shutdown