34 questions
272. A client is establishing a TCP session with a server. How is the acknowledgment number in the response segment to the client determined?
The acknowledgment number field is modified by adding 1 to the randomly chosen initial sequence number in response to the client.
The acknowledgment number is set to 11 to signify an acknowledgment packet and synchronization packet back to the client.
The acknowledgment number field uses a random source port number in response to the client.
The acknowledgment number is set to 1 to signify an acknowledgment packet back to the client.
274. There was also a question about if you activated service password encryption in the past and you prompt “no service password encryption” what password are modified ?
no password at all;
password of the lines are in clear;
login password;
275. What type of communication rule would best describe CSMA/CD?
message encapsulation
flow control
message encoding
access method
276. What is the primary reason to subnet IPv6 prefixes?
to conserve IPv6 addresses
to avoid wasting IPv6 addresses
to conserve IPv6 prefixes
to create a hierarchical Layer 3 network design
279. How could a faulty network device create a source of hazard for a user? (Choose two.)
It could stop functioning.
It could apply dangerous voltage to other pieces of equipment.
It could explode.
It could apply dangerous voltage to itself.
It could produce an unsafe electromagnetic field.
280. What are three important considerations when planning the structure of an IP addressing scheme? (Choose three.)
preventing duplication of addresses
providing and controlling access
monitoring security and performance
documenting the network
conserving addresses
281. What is the metric value that is used to reach the 10.1.1.0 network in the following routing table entry? D 10.1.1.0/24 [90/2170112] via 209.165.200.226, 00:00:05, Serial0/0/0
24
90
05
2170112
282. Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two)
VoIP
DNS
HTTP
POP3
FTP
283. What action does a DHCPv4 client take if it receives more than one DHCPOFFER from multiple DHCP servers?
It sends a DHCPREQUEST that identifies which lease offer the client is accepting.
It sends a DHCPNAK and begins the DHCP process over again.
It discards both offers and sends a new DHCPDISCOVER.
It accepts both DHCPOFFER messages and sends a DHCPACK.
284. To what legacy address class does the address 10.0.0.0 belong?
Class D
Class B
Class A
Class C
Class E
288. What is a characteristic of DNS?
DNS servers can cache recent queries to reduce DNS query traffic.
DNS servers are programmed to drop requests for name translations that are not within their zone.
DNS relies on a hub-and-spoke topology with centralized servers.
All DNS servers must maintain mappings for the entire DNS structure.
290. What information is maintained in the CEF adjacency table?
Layer 2 next hops
MAC address to IPv4 address mappings
IP address to interface mappings
the IP addresses of all neighboring routers
1. Refer to the exhibit. Assuming that the routing tables are up to date and no ARP messages are needed, after a packet leaves H1, how many times is the L2 header rewritten in the path to H2?
1
2
3
4
5
4. Refer to the exhibit. Which route was configured as a static route to a specific network using the next-hop address?
S 10.17.2.0/24 [1/0] via 10.16.2.2
S 0.0.0.0/0 [1/0] via 10.16.2.2
C 10.16.2.0/24 is directly connected, Serial0/0/0
S 10.17.2.0/24 is directly connected, Serial 0/0/0
7. Refer to the exhibit. Currently router R1 uses an EIGRP route learned from Branch2 to reach the 10.10.0.0/16 network. Which floating static route would create a backup route to the 10.10.0.0/16 network in the event that the link between R1 and Branch2 goes down?
ip route 10.10.0.0 255.255.0.0 Serial 00/0 100
ip route 10.10.0.0 255.255.0.0 209.165.200.226 100
ip route 10.10.0.0 255.255.0.0 209.165.200.225 100
ip route 10.10.0.0 255.255.0.0 209.165.200.225 50
12. Refer to the exhibit. What is the administrative distance value that indicates the route for R2 to reach the 10.10.0.0/16 network?
1
0
90
20512256
14. Refer to the exhibit. An administrator is attempting to install an IPv6 static route on router R1 to reach the network attached to router R2. After the static route command is entered, connectivity to the network is still failing. What error has been made in the static route configuration?
The network prefix is incorrect.
The destination network is incorrect.
The interface is incorrect
The next hop address is incorrect.
15. A network administrator reviews the routing table on the router and sees a route to the destination network 172.16.64.0/18 with a next-hop IP address of 192.168.1.1. What are two descriptions of this route? (Choose two.)
default route
parent route
level 2 child route
ultimate route
supernet route
25. Refer to the exhibit. A network engineer is examining a configuration implemented by a new intern who attached an IP phone to a switch port and configured the switch. Identify the issue, if any, with the configuration.
The voice VLAN should be 150.
The configuration is correct.
There must be a data VLAN added.
The spanning-tree BPDU guard feature is missing.
The switch port is not configured as a trunk.
30. Refer to the exhibit. What protocol should be configured on SW-A Port 0/1 if it is to send traffic from multiple VLANs to switch SW-B?
RIP v2
IEEE 802.1Q
Spanning Tree
ARP
Rapid Spanning Tree
34. Refer to the exhibit. A network administrator is configuring inter-VLAN routing on a network. For now, only one VLAN is being used, but more will be added soon. What is the missing parameter that is shown as the highlighted question mark in the graphic?
It identifies the type of encapsulation that is used
It identifies the VLAN number
It identifies the subinterface
It identifies the number of hosts that are allowed on the interface
It identifies the native VLAN number
36. The computers used by the network administrators for a school are on the 10.7.0.0/27 network. Which two commands are needed at a minimum to apply an ACL that will ensure that only devices that are used by the network administrators will be allowed Telnet access to the routers? (Choose two.)
access-class 5 in
access-list 5 deny any
access-list standard VTY
access-list 5 permit 10.7.0.0 0.0.0.31
ip access-group 5 in
41. Refer to the exhibit. A network administrator is configuring a router as a DHCPv6 server. The administrator issues a show ipv6 dhcp pool command to verify the configuration. Which statement explains the reason that the number of active clients is 0?
The default gateway address is not provided in the pool.
No clients have communicated with the DHCPv6 server yet.
The IPv6 DHCP pool configuration has no IPv6 address range specified.
The state is not maintained by the DHCPv6 server under stateless DHCPv6 operation
42. Refer to the exhibit. R1 has been configured as shown. However, PC1 is not able to receive an IPv4 address. What is the problem?
A DHCP server must be installed on the same LAN as the host that is receiving the IP address.
R1 is not configured as a DHCPv4 server.
The ip address dhcp command was not issued on the interface Gi0/1.
The ip helper-address command was applied on the wrong interface.
48. A small company has a web server in the office that is accessible from the Internet. The IP address 192.168.10.15 is assigned to the web server. The network administrator is configuring the router so that external clients can access the web server over the Internet. Which item is required in the NAT configuration?
an ACL to identify the local IPv4 address of the web server
the keyword overload for the ip nat inside source command
an IPv4 address pool
the ip nat inside source command to link the inside local and inside global addresses
74. Which commands are used to re-enable a port that has been disabled as a result of a port security violation?
shutdown
no shutdown
shutdown
no switchport port-security
shutdown
no switchport port-security violation shutdown
shutdown
no switchport port-security maximum
78. Refer to the exhibit. Inter-VLAN communication between VLAN 10, VLAN 20, and VLAN 30 is not successful. What is the problem?
The access interfaces do not have IP addresses and each should be configured with an IP address.
The switch interface FastEthernet0/1 is configured as an access interface and should be configured as a trunk interface.
The switch interface FastEthernet0/1 is configured to not negotiate and should be configured to negotiate.
The switch interfaces FastEthernet0/2, FastEthernet0/3, and FastEthernet0/4 are configured to not negotiate and should be configured to negotiate.
82. What is indicated by the M in the Cisco IOS image name c1900-universalk9-mz.SPA.153-3.M.bin?
a maintenance deployment release
a mainline release
a minor release
an extended maintenance release
88. On which two routers would a default static route be configured? (Choose two.)
stub router connection to the rest of the corporate or campus network
any router where a backup route to dynamic routing is needed for reliability
edge router connection to the ISP
any router running an IOS prior to 12.0
the router that serves as the gateway of last resort
102. What is the purpose of the Cisco PAK?
It is a key for enabling an IOS feature set.
It is a proprietary encryption algorithm.
It is a compression file type used when installing IOS 15 or an IOS upgrade.
It is a way to compress an existing IOS so that a newer IOS version can be co-installed on a router.
104. What is the reason that an ISP commonly assigns a DHCP address to a wireless router in a SOHO environment?
better connectivity
easy IP address management
better network performance
easy configuration on ISP firewall
A network administrator is explaining to a junior colleague the use of the lt and gt keywords when filtering packets using an extended ACL. Where would the lt or gt keywords be used?
in an IPv6 extended ACL that stops packets going to one specific destination VLAN
in an IPv4 named standard ACL that has specific UDP protocols that are allowed to be used on a specific server
in an IPv6 named ACL that permits FTP traffic from one particular LAN getting to another LAN
in an IPv4 extended ACL that allows packets from a range of TCP ports destined for a specific network device
118. A network administrator is adding ACLs to a new IPv6 multirouter environment. Which IPv6 ACE is automatically added implicitly at the end of an ACL so that two adjacent routers can discover each other?
permit ip any any
permit ip any host ip_address
permit icmp any any nd-na
deny ip any any
184. A network administrator is implementing a distance vector routing protocol between neighbors on the network. In the context of distance vector protocols, what is a neighbor?
routers that are reachable over a TCP session
routers that share a link and use the same routing protocol
routers that reside in the same area
routers that exchange LSAs