22
Which type of address is 192.168.17.111/28? host address network address broadcast address multicast address Refer to the exhibit. Which two statements describe the data conversation shown? (Choose two.) The data conversation was started by the HTTP application process running on the client. The data conversation is identified by TCP port 80 on the client. The user started the data conversation by sending an e-mail. The IP address of the Internet server is 192.168.17.43. The Internet server will send data to port 8547 on the client. What are two purposes of DNS? (Choose two.) to dynamically assign IP addressing information to network hosts

Discovery Two Final

Embed Size (px)

Citation preview

Page 1: Discovery Two Final

Which type of address is 192.168.17.111/28?

host address

network address

broadcast address

multicast address

Refer to the exhibit. Which two statements describe the data conversation shown? (Choose two.)

The data conversation was started by the HTTP application process running on the client.

The data conversation is identified by TCP port 80 on the client.

The user started the data conversation by sending an e-mail.

The IP address of the Internet server is 192.168.17.43.

The Internet server will send data to port 8547 on the client.

What are two purposes of DNS? (Choose two.)

to dynamically assign IP addressing information to network hosts

Page 2: Discovery Two Final

to simplify the administration of host and default gateway addressing on client computers

to assign TCP port numbers to hosts as part of the data transfer process

to resolve human-readable domain names to numeric IP addresses

to replace the static HOSTS file with a more practical dynamic system

A company is developing an Internet store for its website. Which protocol should be used to transfer credit card information from customers to the company web server?

FTPS

HTTP

HTTPS

WEP2

TFTP

How do port filtering and access lists help provide network security?

They prevent specified types of traffic from reaching specified network destinations.

They alert network administrators to various type of denial of service attacks as they occur.

They prevent viruses, worms, and Trojans from infecting host computers and servers.

They enable encryption and authentication of confidential data communications.

A hacker attempts to reach confidential information that is stored on a server inside the corporate network. A network security solution inspects the entire packet, determines that it is a threat, and blocks the packet from entering the inside network. Which security measure protected the network?

an IDS

Page 3: Discovery Two Final

an IPS

a host-based firewall

Anti-X software

Which routing protocol depends on the DUAL algorithm to calculate the shortest path to a destination?

OSPF

EIGRP

RIP

BGP

Which routing protocol facilitates the exchange of routing information between different autonomous systems?

OSPF

EIGRP

RIP

BGP

Which statement is true about the reverse lookup DNS zone?

It is most commonly experienced when users are surfing the Internet.

It is the backup for the forward lookup zone.

It dynamically updates the resource records.

It resolves an IP address to a fully qualified domain name.

Page 4: Discovery Two Final

A network is spread across two buildings that are separated by a distance of 500 feet (152 meters). An electrical transformer is installed near the cable route. Which type of cable should be used in this network?

STP

UTP

coaxial

fiber-optic

What is the effect of issuing the hostname RouterA command on a router?

A description will be configured on the router interfaces identifying them as belonging to RouterA.

The router will attempt to establish a connection to the host with the name RouterA.

The router will map an IP address to the domain name RouterA.

The router prompt will change from Router(config)# to RouterA(config)#

Refer to the exhibit. While configuring the serial interface of a router, the network administrator sees the highlighted error message. What is the reason for this?

The serial interface is administratively down.

The serial interface is already configured with an IP address.

The network administrator has attempted to configure the serial interface with a broadcast address.

The same IP address has been configured on another interface.

Page 5: Discovery Two Final

Refer to the exhibit. What is the technician intending to do with the software application?

remotely access a network device

test secure Layer 3 connectivity to a remote network device

configure a directly connected Cisco network device

determine the number of hops between a computer and a remote network device

Page 6: Discovery Two Final

The show ip route command was executed on one of the routers shown in the graphic and the following output was displayed: C 192.168.4.0/24 is directly connected, Serial0/0 R 192.168.5.0/24 [120/1] via 192.168.4.2, 00:00:19, Serial0/0 R 192.168.1.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1 R 192.168.2.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1 C 192.168.3.0/24 is directly connected, Serial0/1 From which router was this command executed?

A

B

C

D

If the start-up configuration is not found in NVRAM, where will the router look for it next by default?

Page 7: Discovery Two Final

flash

ROM

RAM

TFTP server

Which statement best describes the operation of a Layer 2 switch?

functions at the network layer of the OSI model

forwards traffic from one local IP network to another

directs traffic from one port to another based on the destination MAC address

dynamically creates a forwarding table that maps IP addresses to MAC addresses

Which protocol is used to send e-mail messages between two servers that are in different e-mail domains?

HTTP

POP3

SMTP

IMAP4

A network administrator is configuring a DTE serial interface on a 1841 router. The serial interface is installed in the first controller, second slot, first port, with an IP address from the 192.168.1.8 /30 network. Which set of commands correctly configures this interface?

Router(config)# interface serial 0/0/0 Router(config-if)# ip address 192.168.1.10 255.255.255.252 Router(config-if)# clock rate 64000 Router(config-if)# no shutdown

Page 8: Discovery Two Final

Router(config)# interface serial 0/1/1 Router(config-if)# ip address 192.168.1.10 255.255.255.252 Router(config-if)# clock rate 64000 Router(config-if)# no shutdown

Router(config)# interface serial 0/1/0 Router(config-if)# ip address 192.168.1.10 255.255.255.252 Router(config-if)# no shutdown

Router(config)# interface serial 1/2/1 Router(config-if)# ip address 192.168.1.10 255.255.255.252 Router(config-if)# no shutdown

Refer to the exhibit. What effect will the commands have when entered on R2?

They will prevent all simultaneous in-band connections.

They will permit an unlimited number of in-band connections.

They will permit a maximum of five simultaneous in-band connections.

They will permit a minimum of four simultaneous in-band connections with a different password on each connection.

Page 9: Discovery Two Final

Refer to the exhibit. What does the ^ symbol indicate?

It marks the end of an error message and an insert point for a new command.

It marks the beginning of an error message and an insert point for a new command.

It marks a point in the command string where there is an incorrect or unrecognized character.

It marks a point in the command string where a parameter has to be entered to complete the command configuration.

What will a router do with a packet that is destined for a host with the IP address 192.168.1.5/24 if no entry for the 192.168.1.0/24 network exists in the routing table?

It will drop the packet.

It will send the packet back to the source address.

It will broadcast the packet out all of its active interfaces.

It will broadcast the packet out all of its active interfaces except the interface that received the packet.

When a field technician visits a customer site and resolves the issue that was opened in a trouble ticket, what should the technician do?

assess the network design of the customer site

survey users at the customer site for further needs

document the solution and obtain acceptance of the customer

discuss further problems that are identified during the visit and offer cost estimates

Page 10: Discovery Two Final

An administrator wishes to protect a router by encrypting the console access password noaccess. Which command should be used?

Router(config)# enable secret noaccess

Router(config)# enable password noaccess

Router(config-line)# password noaccess

Router(config)# service password-encryption

A user calls a help desk about being unable to connect to a web server. The technician asks the user to issue a ping 127.0.0.1 command. What is the purpose of this command?

verify if the network cable is connected to the PC

verify if the TCP/IP stack is functioning on the PC

verify if the IP address is configured correctly on the PC

verify if the DNS server IP addresses are present on the PC

For the assignment of permissions to files and folders, what does the "principle of least privilege" imply?

No user has more privileges than any other user.

Permissions to files are given based on seniority.

Users only have access to resources that are necessary for their jobs.

Users should be given no access to computer resources until they ask.

Page 11: Discovery Two Final

Refer to the exhibit. Which three IP addresses could be assigned to the hosts? (Choose three.)

192.168.88.1

192.168.88.8

192.168.88.9

192.168.88.12

192.168.88.14

192.168.88.15

192.168.88.16

192.168.88.18

Page 12: Discovery Two Final

Refer to the exhibit. What is used to exchange routing information between routers within each AS?

static routing

IGP routing protocols

EGP routing protocols

default routing

Page 13: Discovery Two Final

Refer to the exhibit. The network administrator uses the command below to configure a default route on RTB: RTB(config)# ip route 0.0.0.0 0.0.0.0 fa0/0

A ping issued from PC3 is successful to RTB. However, echo request packets arrive at PC1 but the echo replies do not make it back to PC3. What will fix this problem?

RTA must be configured to forward packets to the 192.168.2.0 network.

The ip route command needs to be edited so that the next hop address is 10.1.1.5.

The ip route command needs to be edited so that the 192.168.2.1 address is the next hop address.

The ip route command should be removed from the RTB router configuration.

Another default route should be configured on RTA with a next hop address of 10.1.1.6.

Page 14: Discovery Two Final

Refer to the exhibit. R2 is connected to the Serial0/0/1 interface of R1 and is properly configured to share routing updates with R1. Which network will R2 exclude from installing in its routing table?

R 192.168.10.0/24 [120/2] via 192.168.1.2, 00:00:10, Serial0/0/1

R 192.168.7.0/24 [120/1] via 192.168.1.2, 00:00:10, Serial0/0/1

R 192.168.6.0/24 [120/15] via 192.168.3.2, 00:00:10, Serial0/0/0

R 192.168.8.0/24 [120/2] via 192.168.3.2, 00:00:10, Serial0/0/0

Refer to the exhibit. While configuring the serial interface of a router, the network administrator sees the highlighted error message. What is the reason for this?

The serial interface is administratively down.

The serial interface is already configured with an IP address.

The network administrator has attempted to configure the serial interface with a broadcast address.

The same IP address has been configured on another interface.

Page 15: Discovery Two Final

What is the effect of issuing the hostname RouterA command on a router?

A description will be configured on the router interfaces identifying them as belonging to RouterA.

The router will attempt to establish a connection to the host with the name RouterA.

The router will map an IP address to the domain name RouterA.

The router prompt will change from Router(config)# to RouterA(config)#

In order to load an initial configuration on a new switch, a network administrator has connected a laptop to the switch via the use of a console cable. About a minute after the network administrator powers on the switch, the SYST LED on the front of the switch changes from blinking green to amber. What does this indicate?

The network administrator has made an improper physical connection to the switch.

The switch is ready to have a configuration file loaded.

A port on the switch is bad.

The switch failed POST

What is a feature of PAT?

It maps IP addresses to URLs.

It displays private IP addresses to public networks.

It sends acknowledgments of received packets.

It allows multiple hosts on a single LAN to share globally unique IP addresses.

A network is spread across two buildings that are separated by a distance of 500 feet (152 meters). An electrical transformer is installed near the cable route. Which type of cable should be used in this network?

STP

Page 16: Discovery Two Final

UTP

coaxial

fiber-optic

Which routing protocol excludes the subnet information from routing updates?

EIGRP

OSPF

RIPv1

BGP

Which statement is true about the reverse lookup DNS zone?

It is most commonly experienced when users are surfing the Internet.

It is the backup for the forward lookup zone.

It dynamically updates the resource records.

It resolves an IP address to a fully qualified domain name.

Which routing protocol facilitates the exchange of routing information between different autonomous systems?

OSPF

EIGRP

RIP

BGP

Page 17: Discovery Two Final

What are three characteristics of the TCP protocol? (Choose three.)

exchanges datagrams unreliably

is used to send IP error messages

forces the retransmission of unacknowledged packets

carries the IP address of the destination host in the TCP header

is responsible for breaking messages into segments and reassembling them at their destination

manages the exchange of messages between source and destination hosts to maintain a communication session

A network engineer has been asked to design a new structured cable system. What should be the first step in the project?

Obtain an accurate floor plan.

Identify all potential sources of EMI.

Sketch the proposed network design.

Determine the locations of all network devices.

Which two pieces of information can an administrator verify by using the show version command?

(Choose two.)

contents of NVRAM

operating system version

allocated and available memory

current configuration commands

operational status of interfaces

Page 18: Discovery Two Final

Refer to the exhibit. What is the technician intending to do with the software application?

remotely access a network device

test secure Layer 3 connectivity to a remote network device

configure a directly connected Cisco network device

determine the number of hops between a computer and a remote network device

Page 19: Discovery Two Final

The show ip route command was executed on one of the routers shown in the graphic and the following output was displayed: C 192.168.4.0/24 is directly connected, Serial0/0 R 192.168.5.0/24 [120/1] via 192.168.4.2, 00:00:19, Serial0/0 R 192.168.1.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1 R 192.168.2.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1 C 192.168.3.0/24 is directly connected, Serial0/1 From which router was this command executed?

A

B

C

D

If the start-up configuration is not found in NVRAM, where will the router look for it next by default?

Page 20: Discovery Two Final

flash

ROM

RAM

TFTP server

Which statement best describes the operation of a Layer 2 switch?

functions at the network layer of the OSI model

forwards traffic from one local IP network to another

directs traffic from one port to another based on the destination MAC address

dynamically creates a forwarding table that maps IP addresses to MAC addresses

Page 21: Discovery Two Final

Refer to the exhibit. What is the possible reason that a technician is unable to telnet into the HQ router and make configuration changes?

A password is required for vty 0.

A password for line con 0 is required.

All five virtual interfaces must be configured before Telnet is possible.

The service password-encryption command is preventing Telnet access.

Which protocol is used to send e-mail messages between two servers that are in different e-mail domains?

HTTP

POP3

Page 22: Discovery Two Final

SMTP

IMAP4