~~~~~~~~~~~~~~~~~~~~~ Modul 1 ~~~~~~~~~~~~~~~~~~~~~

bunchlearnedΔίκτυα και Επικοινωνίες

30 Οκτ 2013 (πριν από 3 χρόνια και 11 μήνες)

184 εμφανίσεις

~~~~~~~~~~~~~~~~~~~~~
Modul 1

~~~~~~~~~~~~~~~~~~~~~


1. Which of the following can be done to allow the users on the 10.0.0.0 network to communicate with the Web
Server shown in the graphic? (Choose two.)




* Configure the Miami router to use NAT.


Confi
gure the Web Server with a private address.


* Configure the Miami router to use PAT.


Change the Internet link IP address of 128.56.0.0 to a private address.


Configure the Tampa router to use PAT.


2. Given the accompanying graphic, which statement

would be applied to the S0 interface when configuring
NAT on the Tampa router?




ip nat inside


* ip nat outside


ip pat inside


ip pat outside


3. Given the accompanying graphic, which addresses could be assigned to traffic leaving S0 as a result of

the
statement ip nat pool Tampa 179.9.8.96 179.9.8.111 netmask 255.255.255.240? (Choose two.)




10.0.0.125


179.9.8.95


* 179.9.8.98


* 179.9.8.101


179.9.8.112


4. Given the accompanying graphic, which command would establish a group of 32 IP addre
sses that could be
used to hide inside addresses from the Internet?




ip nat pool Raleigh 10.0.0.32 10.0.0.63 netmask 255.255.255.224


ip nat pool Raleigh 10.0.0.32 10.0.0.63 netmask 255.255.255.240


* ip nat pool Raleigh 171.11.10.32 171.11.10.63 netma
sk 255.255.255.224


ip nat pool Raleigh 171.11.10.32 171.11.10.63 netmask 255.255.255.240


5. What is the purpose of the command marked with an arrow shown in the partial configuration output of a
Cisco 806 broadband router?




defines which addresses ar
e allowed out of the router


defines which addresses are allowed into the router


* defines which addresses can be translated


defines which addresses are assigned to a NAT pool


6. Given the accompanying debug output from a Cisco router, what kind of
address is 10.10.10.3 with the IP
identification number of 29855?




* inside local


inside global


outside local


outside global


7. The Raleigh router shown in the diagram is configured with PAT. Which of the following must be changed if
the private
network is migrated to a 10.0.0.0 network? (Choose two.)




* E0 interface address


S0 interface address


* the access
-
list statement


the NAT outside interface


the NAT inside interface


8. Given the accompanying diagram, which commands are necessary

to implement PAT on the Raleigh router?
(Choose four.)




* access
-
list 10 permit 192.168.10.0 0.0.0.255


access
-
list 10 permit 171.11.0.0 0.0.255.255


ip nat inside source static 192.168.10.1 171.11.0.0


* ip nat inside source list 10 interface S0 ove
rload


* ip nat outside


* ip nat inside


9. Which of the following traffic types are supported by Cisco IOS NAT? (Choose two.)




Routing table updates


* ICMP


* FTP


BOOTP


SNMP


10. A company was issued 207.48.12.8/29 as its registered address
from its ISP. Which of the following is a
solution that will allow Internet access to 300 employees simultaneously?




VLSM to further subnet the registered address and create more IP addresses


normal subnetting on the Class C network and address the hos
t


* RFC 1918 and port address translation


this is an impossible scenario because there are not enough addresses


11. What is true regarding the differences between NAT and PAT?




PAT uses the word "overload" at the end of the access
-
list statement t
o share a single registered address.


Static NAT allows an unregistered address to map to multiple registered addresses.


Dynamic NAT allows hosts to receive the same global address each time external access is required.


* PAT uses unique source port n
umbers to distinguish between translations.



12. What is the purpose of the DHCPDECLINE message?




If the DHCP client received multiple DHCPOFFERs, it uses the DHCPDECLINE to refuse the offers it does
not use.


If the DHCP server sends an IP configura
tion update that the DHCP client does not need, it uses the
DHCPDECLINE to refuse the information.


The DHCP server uses the DHCPDECLINE message to refuse a DHCP client's request for IP configuration
information.


* If the DHCP client detects that the ad
dress supplied by the DHCP server is in use on the network, it uses the
DHCPDECLINE to refuse the offer.



13. A network administrator needs to configure a router to offer DHCP services. Assuming the router is
operating with factory defaults and the IOS s
upports DHCP, what must be done to start the DHCP service?




Use the global configuration command service dhcp.


Use the privileged command service dhcp start.


Use the start service dhcp command during the setup processes.


* Do nothing. The DHCP serv
ice is enabled by default during start up.


14. Users are complaining that they cannot attach to network resources. A technician has confirmed that clients
are not properly receiving IP configuration information through the DHCP process. The network admin
istrator
wants to watch the DHCP process while the technician tries to release and renew addresses on the clients.
Which command would the network administrator use to monitor the process of address allocation?




show ip dhcp server statistics


show ip d
hcp binding


* debug ip dhcp server events


debug ip dhcp binding


15. Refer to the graphic. Which command would allow the router to forward DHCP broadcasts from Host A to
the DHCP server?




* ip helper
-
address


dhcp helper
-
address


dhcp relay
-
agent


dhcp
-
relay


16. What is the default lease time for addresses assigned to clients through Easy IP?




* twenty
-
four hours


forty
-
eight hours


one week


two weeks


17. In addition to assigning addresses from predefined pools, which other services can
a DHCP server offer?
(Choose three.)




* DNS server addresses


* domain names


global IP assignments


NAT translations


* WINS server addresses


18. Which configuration parameters are provided by the dynamic allocation process of DHCP? (Choose three.
)




* Gateway address


* DNS server


DHCP Server


* Subnet mask


Key server


ARP server


19. Which of the following are broadcasts sent by a client to a DHCP server? (Choose two.)




* DHCPDISCOVER


DHCPRELEASE


DHCPACK


* DHCPREQUEST


DHCPOFFER



20. Which configuration information might a DHCPOFFER include? (Choose three.)




* IP address


* DNS server address


DHCP binding


* Lease time


DHCP database


21. What is the default number of pings issued by a DHCP server to a pool address befor
e sending the
DHCPOFFER to a client?




one


* two


three


four


five













































~~~~~~~~~~~~~~~~~~~~~
Modul
2 ~~~~~~~~~~~~~~~~~~~~~


1. Which term describes the cabling that connects the customer site to the nearest e
xchange of the WAN service
provider?




CPE


CO


* local loop


DCE


DTE


2. Which of the following is commonly used as Data Terminal Equipment?




ISDN


modem


* router


CSU/DSU



3. On which of the following are most Layer 2 WAN encapsulations b
ased?




IP


PPP


* HDLC


SLIP


HSSI


CSU


4. Which of the following describes a packet
-
switched network using connection
-
oriented data transfer?
(Choose two.)




* Each packet carries an identifier.


Each packet carries full addressing information.



Each switch in the route must evaluate the addressing information to determine where to send the packet.


* Each switch determines where to send the packet by examining tables in memory.


The addressing information is used to set switches along the ro
ute of data transfer to create a continuous
copper circuit.


5. A U.S. company requires a WAN connection used only to transfer sales data from individual stores to the
home office. All transfers will occur after business hours. The required bandwidth for

this connection is
estimated to be less than 38 kbps. Which type of connection requires the least investment for this company?




ATM


ISDN


* analog dialup


T1 Leased Line



6. A company requires a WAN connection that will carry 64 kbps and allow fas
t call setup time. The
connection does not need to carry video. What is the best choice for this company?




ATM


* ISDN BRI


X.25


analog dialup


7. Which of the following connections will provide the equivalent of a T1/E1 connection and is intended f
or
large businesses?




BRI


* PRI


DLCI


PSTN


POTS


8. A large company already has a T1 leased line but this connection is inadequate at peak business hours.
Furthermore, they would like a backup WAN connection in case their leased line temporarily
fails. What type
of WAN connection is commonly used in this situation?




X.25


DSL


* ISDN


cable modem


56 kbps


9. A European company needs a low cost, dialup WAN connection to validate transactions for point
-
of
-
sale
card readers. Which connection
type is commonly used for this situation?




ATM


* X.25


Frame Relay


Leased lines


10. Which statements are correct regarding ATM connections? (Choose two.)




uses only PVCs


* is useful for video transfers


* has data rates beyond 155 Mbps


cell
s have 32 byte payload and a 5 byte overhead


mandates single virtual circuits on a single leased line connection


11. Which of the statements regarding DSL are correct? (Choose three.)




DSL provides a consistent bandwidth of 2.154 Mbps.


DSL connecti
ons provide a fast dialup to establish a WAN connection.


* DSL connects the local loop to a digital subscriber line access multiplexer.


* DSL bandwidth varies and can exceed the bandwidth of a T1/E1 leased line.


* For DSL to function properly, the lo
cal loop must be less than 5.5 kilometers (3.5 miles).


DSL is a popular choice for enterprises that need to connect home users to the local network due to strong
security.


12. Which statement is true regarding WAN technologies?




Most WANS use only on
e technology throughout the infrastructure such as ISDN, Frame Relay or ATM.


Data transfer speeds on the WAN are typically faster than the speeds on a LAN.


* WANs operate at the lower three layers of the OSI model.


WANs are unable to support the tran
sfer of voice or video traffic.


13. Why is it important to identify the type of traffic that will be carried on the WAN links before choosing a
WAN technology?




to determine the routing protocol to be used on the WAN link


to determine the WAN topolog
y


* to determine the requirements for latency and jitter


to determine the type of signaling protocol to be used on the WAN link


14. Depending on the company size and geographical layout, there might be many end points on the company
WAN. Why is it im
portant to identify all the end points of the WAN before choosing a WAN design?




to determine the routing protocol to be used on the WAN link


* to determine the WAN topology


to determine the requirements for latency and jitter


to determine the sign
aling protocol to be used on the WAN link


15. Which of the following is true of WANs?




Shared network WAN technologies such as Frame Relay and ATM are more expensive but offer less latency
and jitter than dedicated lines.


ISDN is suitable for large e
nterprises.


* The more network devices that data has to pass through across the WAN, the more latency and less reliability
the network will experience.


WANs typically incorporate only one technology such as ISDN, Frame Relay, or ATM.


16. A new intern
ational company needs to have a design for WAN connectivity. The company will have at least
five offices in every state in the United States and Mexico. Some states will have as many as 20 offices. The
branch offices will require constant contact with the
services of the main office. Which design model is best for
WAN connectivity in this situation?




a mesh network of all branch WANs


a simple star topology connecting all branch LANs to a central router with multiple interfaces


a one layer design using

Frame Relay links between LANs


* a three layer hierarchical topology interconnecting branch LANs within an area, the area LANs within a
region, and connecting the regions to form the core of the WAN




























~~~~~~~~~~~~~~~~~~~~~
Modu
l
3 ~~~~~~~~~~~~~~~~~~~~~


1. How did Cisco alter the HDLC encapsulation to allow a single link to carry multiple protocols?




split the transmissions into multiple channels each carrying a single protocol


identified the protocol in the FCS field


comp
ressed the datagrams differently for each protocol


* added a type field to identify the protocol


2. A technician has used Telnet to gain remote access to a router that has no connectivity on its serial interface.
Which command should be issued to deter
mine if the serial cable is connected properly?




* show controllers


show processes


show run


show status


3. A two router network is running PPP over the serial interfaces that connect them. The enable password on
the Denim router is "gateway". The

Denim router also has a locally configured authentication password for the
Plaid router which is "fortress". Which command must be executed on the Plaid router to allow Denim to
authenticate to the Plaid router using CHAP?




Plaid(config)# enable secret
gateway


Plaid(config)# enable secret fortress


Plaid(config)# username Plaid password fortress


* Plaid(config)# username Denim password fortress


Plaid(config)# hostname Plaid secret password gateway


Plaid(config)# hostname Plaid secret password fo
rtress


4. Which authentication protocol can be spoofed to allow playback attacks?




MD5


CHAP


* PAP


NCP


5. How is the MD5 function valuable in authentication? (Choose two.)




* uses a one
-
way hash function


authentication occurs more rapidly


* challenges are unique


the remote router assumes control of frequency of challenge


the remote router assumes control of timing of challenge


6. Which command specifies a link quality over a PPP link?




ppp link 50


ppp link quality 60


ppp percent
age 80


* ppp quality 90


7. Refer to the output of the show interface Serial0/0 command in the graphic. How many NCPs have been
established?




1


* 2


3


4


8. Which of the following is an advantage of using time
-
division multiplexing (TDM) for tra
nsmitting data?
(Choose two.)




It allows a single source to transmit over multiple data channels.


* Multiple sources can transmit over a single channel.


* Original data streams must be reconstructed at the destination.


TDM relies on Layer 3 protoco
ls to operate.


9. Which of the following describes the High
-
Level Data Link Control protocol? (Choose three.)




* HDLC provides flow and error control.


Standard HDLC supports multiple protocols on a single link.


* HDLC uses sequencing and acknowledg
ements.


HDLC is defined as the default encapsulation on Cisco LAN interfaces.


* Cisco implemented a proprietary version of HDLC.


10. A technician is testing the functionality of a recently installed router. The technician is unable to ping the
serial

interface of a remote router. The technician executes the show interface serial 0/0 command on the local
router and receives the following output:


Serial0/0 is up, line protocol is down(disabled)


What are possible causes for this command output? (Choose

two.)




interface missing the no shutdown command


clockrate command missing


* CSU/DSU failed


* interface shutdown due to high error rate


cable missing


11. When troubleshooting the Serial 0/0 interface of a router, a technician issues the show c
ontrollers command.
The following was the output of the command:


Interface is Serial0/0, electrical interface is UNKNOWN.


What can be concluded about the Serial 0/0 interface? (Choose three.)




* Serial0/0 is down, line protocol is down


Serial0/0 is
down, line protocol is up


Serial0/0 is up, line protocol is down


The interface is neither DCE or DTE.


* The interface hardware may be faulty.


* The cabling may be improperly connected.


12. ISDN BRI service uses two B channels to send data, voice,

and video. If the first channel becomes saturated,
the second channel can be configured to forward packets. Which command will allow ISDN to load balance
across both links?




Router(config
-
if)# ppp quality 2


Router(config
-
if)# ip variance


Router(con
fig
-
if)# ip maximum
-
paths 2


* Router(config
-
if)# ppp multilink


13. Which of the following describe functions of the Point
-
to
-
Point protocol with regards to the OSI model?
(Choose three.)




PPP uses Layer 3 of the OSI model to establish and maintain a
session between devices.


PPP operates at all layers of the OSI model.


* PPP uses the data link layer to configure such options as error detection and compression.


* PPP provides a mechanism to multiplex several network layer protocols.


PPP uses Net
work Control Protocols (NCP) to test and maintain connectivity between devices.


* PPP can be configured on both synchronous and asynchronous serial interfaces.


14. PPP uses several protocols for communication. Which of the following are options that th
e LCP protocol in
the PPP architecture can provide? (Choose two.)




* testing the quality of the link


routing packets between devices


assigning individual station addresses


configuring network layer protocols


* negotiating authentication options


15. Several tasks must occur before a link between two routers can pass data using PPP. Which of the following
are required to establish and maintain a PPP session between two routers?




configure each host with a PPP address


configure authentication b
etween the two routers


* send LCP and NCP frames to negotiate configuration parameters


send hostname and password information between the two routers


16. Which of the following is a reason for using such protocols as PAP and CHAP?




to establish a P
PP session


to provide error checking on a WAN link


* to restrict access to networks connected by serial and ISDN links


to provide a backup hostname and privilege mode password on the router


17. Which of the following describes the CHAP protocol? (C
hoose three.)




* exchanges a random challenge number during the session to verfiy identity


sends authentication password to verify identity


* prevents transmission of login information in plain text


* disconnects the PPP session if authentication f
ails


initiates a two
-
way handshake


18. Which command was used to display the partial output shown in the graphic?




show ppp traffic


show lcp traffic


* debug ppp negotiation


debug ppp authentication


19. What can be concluded from the output sh
own in the graphic? (Choose three.)




A two
-
way handshake is occuring.


* The LCPs were already negotiated.


* The router can begin NCP negotiations.


The debug ppp negotiation command was executed.


* The debug ppp authentication command was executed
.


20. Which advantage does the multilink option provide when using PPP?




* Data transmission has load balancing possibilities.


Interfaces can be configured using both HDLC and PPP.


More than one authentication method can be used.


More than one co
mpression protocol can be configured.


















































~~~~~~~~~~~~~~~~~~~~~
Modul
4 ~~~~~~~~~~~~~~~~~~~~~


1. Which of the following correctly describes ISDN BRI? (Choose three.)




* two 64 kbps B channels and one 16 kbps

D channel


* B channel is suitable for voice data


uses in
-
band signaling


* uses out
-
of
-
band signaling


offers the equivalent of a T1/E1 connection


twenty
-
three 64 kbps B channels and one 16 kbps D channel


2. A network administrator in Europe has

been asked to provide the network with an ISDN WAN link. The
router available to provide the WAN connection is a non
-
modular Cisco router with an S/T interface. What
further equipment will be provided by the ISP for the ISDN connection?




Nothing. The ro
uter is already suitable.


BRI WAN interface card to install in the router


* an external NT1 to terminate the local loop


a TA/NT1 device to install on the router


3. What must be configured for an ISDN PRI connection? (Choose three.)




* ISDN switch

type


Service Profile Identifier (SPID)


Dial
-
on
-
Demand Routing (DDR)


* PRI group time slot


* T1/E1 controller, framing type and line coding


4. A small company uses an ISDN WAN link to transfer e
-
mail to remote sites. What command would the
admini
strator use to determine if the ISDN link is up?




* show isdn status


show isdn active


show dialer


show interface bri0/0


debug isdn active


5. A network administrator is troubleshooting ISDN connectivity. The administrator suspects the problem li
es
with the authentication protocol. What command should the administrator use to view the authentication
process between the router and the ISDN switch?




debug pap authentication


debug chap authentication


* debug ppp authentication


debug isdn auth
entication


6. The network administrator of XYZ company needs to configure a new ISDN router. After entering the
commands shown in the graphic, the administrator tries to access the Internet but the ISDN connection does not
open. If the service provider v
erifies that the problem is with XYZ's configuration, what is a possible cause of
the problem?




The dialer map is configured incorrectly.


The encapsulation type is configured incorrectly.


* The dialer group is configured incorrectly.


The ACL is con
figured incorrectly.


The isdn switch
-
type command needs to be configured globally.


7. Which of the following are true of ISDN routers configured with dialer profiles? (Choose two.)




They do not use ACL to define interesting traffic.


* Their B chann
els can be configured with different subnets and encapsulation types.


* Their BRI interfaces can belong to multiple dialer pools.


They use PPP only.


They can only use the CHAP authentication protocol.


8. Which of the following describes the use of
a SPID? (Choose two.)




selects the ISDN switch type


* identifies the line configuration of the BRI service


* allows multiple ISDN devices to share the local loop


designates whether a device is a TE1 or TE2


allows ISDN broadcasts


9. Which of the

following is considered out
-
of
-
band signaling?




using a frequency outside of the rated bandwidth for transmission


transmitting data over a control channel


* using a separate channel for control signals


transmitting control signals over a data chan
nel


10. Why must routers be configured to specify the ISDN switch type?




* Switches use various implementations of Q.931.


The IOS of most routers lacks the ability to autosense the switch.


The switch must know what type of router it is communicatin
g with.


The Layer 3 connection between the terminal equipment and the ISDN switch is not standardized.


11. Which command configures an ISDN interface to use a switch type which is different from that used on
other interfaces on the router?




Router(co
nfig)#switch
-
type switch
-
type


Router(config
-
if)#switch
-
type switch
-
type


Router(config)#isdn switch
-
type switch
-
type


* Router(config
-
if)#isdn switch
-
type switch
-
type


12. Which router command would be used to enter the mode for configuring a T1 PRI c
onnection?




* Router(config)# controller t1 {slot/port}


Router(config)# interface pri t1 {slot/port}


Router(config)# interface pri {slot/port} t1


Router(config)# controller {slot/port} t1


13. Which command is used within an existing ISDN network
to display current call information, including the
called number?




show isdn status


* show isdn active


show interfaces bri0/0


show ip interfaces


14. You have just taken delivery of a new US standard Cisco 2620 router that includes a BRI "U" inter
face?
Which of the following describes how this router will be connected in the ISDN network?




An external terminal adapter (TA) must be attached to the router for connectivity.


An NT1 must be connected to the router for connectivity.


* The router is

a TE1 device and is ready to connect to the provider's network.


The router is a TE2 device and requires both a TA and NT1 for connectivity.


15. Which of the following protocols can be used to encapsulate data traffic sent from a router BRI interface?
(Choose two.)




Link Access Protocol
-

Data


* High
-
Level Data Link Control


Logical Link Control


Serial Data Link Control


* Point to Point protocol


Binary Synchronous Control protocol


16. Which of the following is essential for all ISDN BRI int
erface configurations?




* ISDN switch type


line encoding technique


line framing method


local directory number


service profile identifier


17. What is a reason why static routes are preferred over dynamic routes for DDR to operate on an ISDN
inte
rface?




An ISDN interface will not allow dynamic routing updates that use broadcast technology.


A dynamic route will take precedence over a static route because of its lower administrative distance.


Dynamic routing can never be considered interesting

traffic by default.


Dialer
-
list configuration does not support dynamic routing.


* Dynamic routes may cause the ISDN connection to dial constantly to transmit updates.


18. A network administrator is troubleshooting an ISDN connectivity problem. Users

are complaining they
cannot connect to the Internet. The network administrator suspects the ISDN connection attempt is timing out
before a connection can be established. What command would the network administrator use to determine what
the "wait for carr
ier" timeout value is set to?




show isdn status


show isdn active


* show dialer


show interfaces bri0/0


debug isdn q931


show ISDN interfaces













~~~~~~~~~~~~~~~~~~~~~
Modul
5 ~~~~~~~~~~~~~~~~~~~~~


1. Which data link layer protocol is us
ed to carry frames across a Frame Relay link?




HDLC


PPP


LAPD


* LAPF


Frame Relay


2. Which of the following statements are true about a basic Frame Relay WAN connection between a customer
and the service provider? (Choose two.)




* DTE devices s
uch as routers and FRADs transmit user data.


DTE devices such as Frame Relay switches transport the data between DTE devices.


An Ethernet connection between the router and the frame relay switch allow access to the frame relay network.


* Serial conne
ctions between the customer and the frame relay network are used to transport data.


The Frame Relay WAN is a mesh of interconnected routers.


3. How does Frame Relay technology process frames that contain errors? (Choose two.)




* Frame Relay services
depend on the upper layer protocols to handle error recovery.


It requires the receiving device to request that the sender retransmit erroneous frames.


FECN, BECN, and DE bits are set in the frames to minimize errors.


* The receiving device drops any
frames that contain errors without notifying the sender.


The frame relay switch notifies the sender that errors were detected.


4. Which features make Frame Relay technology a cost
-
effective alternative to a mesh of dedicated leased
lines? (Choose three
.)




* allows a single interface to support multiple PVCs


* minimizes the equipment required to be purchased by the customer


requires one router interface for each PVC


provides the customer with redundancy if a single interface goes down


* allows
the customer to pay for the average bandwidth requirement rather than the maximum bandwidth
requirement


5. Which methods are used to minimize heavy traffic on a Frame Relay network? (Choose two.)




FRADs or routers set ECN bits to request that the Frame

Relay switch reduce the flow of frames on the link.


Windowing is used to reduce the size of the frames sent across the link.


* The Frame Relay switch will drop packets that have the DE bit set.


* When a switch sees its queue increasing, it notifies
DTEs to reduce the flow of traffic.


When congestion occurs, all frames are dropped until the congestion clears.


6. What does a DLCI of 1023 indicate about a frame?




The LMI type is ANSI.


The LMI type is IETF.


* The LMI type is Cisco.


The LMI ty
pe is Q933a.


The encapsulation is Cisco.


The encapsulation is IETF.


7. Which of the following allow the router to map data link layer addresses to network layer addresses in a
Frame Relay network? (Choose two.)




ARP


RARP


Proxy ARP


* Inverse A
RP


* LMI status messages


ICMP


8. A ping is sent to address 192.168.50.10 from the Peanut router. Which DLCI will be used to send the ping?




* 110


115


220


225


9. What is created between two DTEs in a Frame Relay network?




switched parallel

circuit


* permanent virtual circuit


limited access circuit


ISDN circuit


Frame Relay circuit


10. Which bits are set in the data frames to request that a device reduce the flow of data sent to or from a Frame
Relay switch?




EIR bits


* ECN bits



CIR bits


DE bits


Window bits


11. Which commands were added to the configuration to produce the output shown in the graphic? (Choose
two.)




Router(config)# ip route 192.168.192.4 255.255.255.0 17 broadcast


Router(config
-
if)# frame
-
relay lmi
-
typ
e cisco 17


* Router(config
-
if)# frame
-
relay map ip 192.168.192.4 17 broadcast


Router(config
-
if)# ip address 192.168.192.4 255.255.255.0 DLCI 17 static


Router(config
-
if)# interface S0/0.1 point
-
to
-
point


* Router(config
-
if)# encapsulation frame
-
relay

cisco


12. Which of the following occurs when the command frame
-
relay map ip 10.1.1.1 22 is configured on the
router? (Choose two.)




DLCI 22 will replace the MAC address in the ARP table for entry 10.1.1.1


The remote circuit with DLCI 22 can receive
a ping.


Inverse
-
ARP will be used to add an entry for 10.1.1.1 into the frame
-
relay map table using DLCI 22.


* Pings to 10.1.1.1 will be sent on the circuit labeled DLCI 22.


* The router will use DLCI 22 to forward data to 10.1.1.1.


13. When trouble
shooting a frame
-
relay connection, an administrator entered the show interfaces s0/0
command and received the output shown in the graphic. The line protocol is down. Which of the following are
probable reasons for this problem? (Choose two.)




The cable b
etween the CSU/DSU and the router is disconnected.


The serial 0/0 interface is shutdown.


* The router is not configured for the same frame
-
relay PVC as the switch.


* The LMI type on the frame
-
relay switch is NOT ANSI.


The address of the frame
-
relay

switch is not in the routing table.


14. When troubleshooting a frame relay connection, a technician entered the show frame
-
relay pvc command
shown in the graphic. What can be concluded from the output shown in the graphic? (Choose three.)




* The outpu
t in the debug frame
-
relay lmi command will indicate status 0x2 for DLCI 18.


* DLCI 16 was correctly programmed on the switch, but the remote router may be misconfigured.


* The frame relay switch is sending LMI status messages about DLCI 16 to the Sing
apore router.


Congestion has been experienced on DLCI 18.


Some packets have been set to be dropped if congestion is experienced on the PVC.


15. How is a permanent virtual circuit identified in a Frame Relay network that is carrying IP traffic?




* I
t is given a fixed locally significant identification number.


It is identified by the MAC address of the router interface.


Dynamic virtual channel identifiers are assigned to each frame transmitted across the network.


It is identifed by the MAC addre
ss of the switch port.


16. What is the purpose of the FCS field in a Frame Relay frame?




It serves to distinguish one frame from the next.


It is used to signal network congestion.


* It is used to detect if the frame has been corrupted and should be

discarded.


It determines which VC should be used for transmission.


17. Why are full mesh topologies seldom found in large Frame Relay networks?




Additional hardware is required to achieve the mesh.


The additional virtual circuits slow the link acc
ess speeds.


* The required number of links becomes prohibitive.


Additional interfaces are required since each can only support 10 virtual circuits.


The speed of transmission slows in inverse proportion to the square of the number of links.


18. Why
keepalive mechanism added as an extention to the Local Management Interface in a Frame Relay
network?




to identify which routers were experiencing congestion


* to verify the status of PVCs in the frame relay network


to dynamically map a MAC address t
o an IP address in a Frame Relay network


to signal to the router the status of the routing protocols configured in the Frame Relay network


19. Which of the following DLCIs are reserved?




16


127


255


* 1023


2048


20. Which statement identifies

a reason for using point
-
to
-
point subinterfaces in Frame Relay networks?




* Subinterfaces overcome routing update and split
-
horizon issues that occur with multipoint logical interfaces
on a single physical interface.


A point
-
to
-
point subinterface does

not require an IP address and therefore saves address space.


Point
-
to
-
point subinterfaces provide greater reliability and reachability in Frame Relay networks by requiring a
mesh topology for network configurations.


Point
-
to
-
point subinterfaces increa
se the number of DLCIs that can be configured in a Frame Relay network.


21. Which of the following statements regarding multipoint subinterfaces are true? (Choose two.)




* A single multipoint subinterface is used to establish PVC connections to multipl
e physical interfaces on
remote routers.


Each multipoint link is in its own subnet.


* The physical interface does not have an IP address.


Split
-
horizon is disabled allowing routing updates to be re
-
transmitted on every subinterface.


Multipoint subi
nterfaces require the encapsulation frame
-
relay command to be issued individually for each
subinterface to operate correctly.











































~~~~~~~~~~~~~~~~~~~~~
Modul
6 ~~~~~~~~~~~~~~~~~~~~~


1. Which of the following are exam
ples of network management applications? (Choose two.)




Windows 2000 Professional


* Ciscoworks2000


* HP Openview


Red Hat Linux


Cisco ConfigMaker


2. Which statements are true regarding configuring SNMP? (Choose three.)




It is best to use the d
efault read
-
only community strings in enterprise networks.


* It is not advisable to use the default read
-
write community string in an enterprise network.


* More than one read
-
only community string is supported.


* Authorized management stations can mo
dify MIB objects with read
-
write access specified.


The maximum number of read
-
write strings supported is one.


3. Which statements describe the Windows 2000 operating system family? (Choose three.)




* .NET Server was designed to run enterprise level w
eb and FTP services.


Active Directory services run on both Windows 2000 Professional and Windows 2000 Server.


* The entire family of Windows 2000 operating systems can operate as a file, print, FTP or web server.


Both Windows 2000 Professional and Se
rver can support up to 256 simultaneous dialup sessions.


* .NET server was designed to compete with Linux and Unix.


4. For which platform was UNIX first marketed commercially?




workstations and servers


workstations


* network servers


large mainf
rame systems


5. Which features are supported by the Mac OS X system that make it a competitive choice for operating
systems? (Choose four.)




* protected memory


sixty
-
two bit addressing


* preemptive multitasking


open source operating system code


* symmetric multiprocessing


* Appletalk
-
to
-
Windows network connectivity


6. Which operating systems support multiuser capability? (Choose three.)




* Linux


Windows 98


Windows ME


* Windows XP


* Windows 2000


7. How does SNMPv3 address the secu
rity shortcomings of SNMPv1 and SNMPv2c?




improved SMI features


support for centralized and distributed management


* secure access to MIBs


control of heterogeneous networks


8. Which means of communication does an SNMP network agent use to provide

a network management station
with important but unsolicited information?




query


broadcast


ICMP ping


* trap


poll


9. An SNMPv1 agent would issue a GetResponse message to reply to which NMS requests? (Choose three.)




* GetRequest


GetBulkReque
st


* GetNextRequest


* SetRequest


GetNextbulkRequest


10. Why are SNMPv1 and SNMPv2c community strings considered a security risk?




SNMPv1 and SNMPv2c encapsulations are not encrypted by default.


* SNMPv1 and SNMPv2c community strings are sent as

cleartext.


SNMPv1 and SNMPv2c are limited to 32
-
bit counters.


SNMPv1 and SNMPv2c uses a connectionless protocol.


11. In the above illustration, which configuration commands can be used to specify the location of a managed
device and the main system
contacts for the device? (Choose two.)




SanJose(config
-
if)# snmp
-
server SanJose


* Atlanta(config)# snmp
-
server contact JPSmith


Atlanta(config)# snmp contact JPSmith


* SanJose(config)# snmp
-
server location SanJose


Chicago#(config)# snmp chicago


12. How does RMON gather statistics on a segment?




analyzes traps on the segment


polls packets on the segment


* analyzes every frame on the segment


analyzes source and destination addresses


13. Which command would enable logging on all supported

destinations?




Router(config)# logging 131.152.0.0


Router(config)# logging routerA


* Router(config)# logging on


Router(config)# logging enable


14. Which of the following is a collection of software which includes a GUI interface to allow the net
work
administrator to monitor and manage the network?




* network management application


network management agent


management information base


network management protocol


15. Which of the following describes the community strings used for SNMPv1 an
d SNMPv2c? (Choose two.)




* The community strings are sent using UDP.


The read only string on most devices is set to private.


The read/write string on most devices is set to public.


Only the NMA needs to be configured with the community strings.


* The community strings are sent across the network in cleartext.


16. Which of the following does SNMP use to hold information collected about the network?




network management station


network management database


* management information base


dat
abase information agent