~~~~~~~~~~~~~~~~~~~~~ Modul 1 ~~~~~~~~~~~~~~~~~~~~~

bunchlearnedNetworking and Communications

Oct 30, 2013 (4 years and 8 months ago)


Modul 1


1. Which of the following can be done to allow the users on the network to communicate with the Web
Server shown in the graphic? (Choose two.)

* Configure the Miami router to use NAT.

gure the Web Server with a private address.

* Configure the Miami router to use PAT.

Change the Internet link IP address of to a private address.

Configure the Tampa router to use PAT.

2. Given the accompanying graphic, which statement

would be applied to the S0 interface when configuring
NAT on the Tampa router?

ip nat inside

* ip nat outside

ip pat inside

ip pat outside

3. Given the accompanying graphic, which addresses could be assigned to traffic leaving S0 as a result of

statement ip nat pool Tampa netmask (Choose two.)



4. Given the accompanying graphic, which command would establish a group of 32 IP addre
sses that could be
used to hide inside addresses from the Internet?

ip nat pool Raleigh netmask

ip nat pool Raleigh netmask

* ip nat pool Raleigh netma

ip nat pool Raleigh netmask

5. What is the purpose of the command marked with an arrow shown in the partial configuration output of a
Cisco 806 broadband router?

defines which addresses ar
e allowed out of the router

defines which addresses are allowed into the router

* defines which addresses can be translated

defines which addresses are assigned to a NAT pool

6. Given the accompanying debug output from a Cisco router, what kind of
address is with the IP
identification number of 29855?

* inside local

inside global

outside local

outside global

7. The Raleigh router shown in the diagram is configured with PAT. Which of the following must be changed if
the private
network is migrated to a network? (Choose two.)

* E0 interface address

S0 interface address

* the access
list statement

the NAT outside interface

the NAT inside interface

8. Given the accompanying diagram, which commands are necessary

to implement PAT on the Raleigh router?
(Choose four.)

* access
list 10 permit

list 10 permit

ip nat inside source static

* ip nat inside source list 10 interface S0 ove

* ip nat outside

* ip nat inside

9. Which of the following traffic types are supported by Cisco IOS NAT? (Choose two.)

Routing table updates





10. A company was issued as its registered address
from its ISP. Which of the following is a
solution that will allow Internet access to 300 employees simultaneously?

VLSM to further subnet the registered address and create more IP addresses

normal subnetting on the Class C network and address the hos

* RFC 1918 and port address translation

this is an impossible scenario because there are not enough addresses

11. What is true regarding the differences between NAT and PAT?

PAT uses the word "overload" at the end of the access
list statement t
o share a single registered address.

Static NAT allows an unregistered address to map to multiple registered addresses.

Dynamic NAT allows hosts to receive the same global address each time external access is required.

* PAT uses unique source port n
umbers to distinguish between translations.

12. What is the purpose of the DHCPDECLINE message?

If the DHCP client received multiple DHCPOFFERs, it uses the DHCPDECLINE to refuse the offers it does
not use.

If the DHCP server sends an IP configura
tion update that the DHCP client does not need, it uses the
DHCPDECLINE to refuse the information.

The DHCP server uses the DHCPDECLINE message to refuse a DHCP client's request for IP configuration

* If the DHCP client detects that the ad
dress supplied by the DHCP server is in use on the network, it uses the
DHCPDECLINE to refuse the offer.

13. A network administrator needs to configure a router to offer DHCP services. Assuming the router is
operating with factory defaults and the IOS s
upports DHCP, what must be done to start the DHCP service?

Use the global configuration command service dhcp.

Use the privileged command service dhcp start.

Use the start service dhcp command during the setup processes.

* Do nothing. The DHCP serv
ice is enabled by default during start up.

14. Users are complaining that they cannot attach to network resources. A technician has confirmed that clients
are not properly receiving IP configuration information through the DHCP process. The network admin
wants to watch the DHCP process while the technician tries to release and renew addresses on the clients.
Which command would the network administrator use to monitor the process of address allocation?

show ip dhcp server statistics

show ip d
hcp binding

* debug ip dhcp server events

debug ip dhcp binding

15. Refer to the graphic. Which command would allow the router to forward DHCP broadcasts from Host A to
the DHCP server?

* ip helper

dhcp helper

dhcp relay


16. What is the default lease time for addresses assigned to clients through Easy IP?

* twenty
four hours

eight hours

one week

two weeks

17. In addition to assigning addresses from predefined pools, which other services can
a DHCP server offer?
(Choose three.)

* DNS server addresses

* domain names

global IP assignments

NAT translations

* WINS server addresses

18. Which configuration parameters are provided by the dynamic allocation process of DHCP? (Choose three.

* Gateway address

* DNS server

DHCP Server

* Subnet mask

Key server

ARP server

19. Which of the following are broadcasts sent by a client to a DHCP server? (Choose two.)






20. Which configuration information might a DHCPOFFER include? (Choose three.)

* IP address

* DNS server address

DHCP binding

* Lease time

DHCP database

21. What is the default number of pings issued by a DHCP server to a pool address befor
e sending the
DHCPOFFER to a client?


* two




2 ~~~~~~~~~~~~~~~~~~~~~

1. Which term describes the cabling that connects the customer site to the nearest e
xchange of the WAN service



* local loop



2. Which of the following is commonly used as Data Terminal Equipment?



* router


3. On which of the following are most Layer 2 WAN encapsulations b







4. Which of the following describes a packet
switched network using connection
oriented data transfer?
(Choose two.)

* Each packet carries an identifier.

Each packet carries full addressing information.

Each switch in the route must evaluate the addressing information to determine where to send the packet.

* Each switch determines where to send the packet by examining tables in memory.

The addressing information is used to set switches along the ro
ute of data transfer to create a continuous
copper circuit.

5. A U.S. company requires a WAN connection used only to transfer sales data from individual stores to the
home office. All transfers will occur after business hours. The required bandwidth for

this connection is
estimated to be less than 38 kbps. Which type of connection requires the least investment for this company?



* analog dialup

T1 Leased Line

6. A company requires a WAN connection that will carry 64 kbps and allow fas
t call setup time. The
connection does not need to carry video. What is the best choice for this company?




analog dialup

7. Which of the following connections will provide the equivalent of a T1/E1 connection and is intended f
large businesses?






8. A large company already has a T1 leased line but this connection is inadequate at peak business hours.
Furthermore, they would like a backup WAN connection in case their leased line temporarily
fails. What type
of WAN connection is commonly used in this situation?




cable modem

56 kbps

9. A European company needs a low cost, dialup WAN connection to validate transactions for point
card readers. Which connection
type is commonly used for this situation?


* X.25

Frame Relay

Leased lines

10. Which statements are correct regarding ATM connections? (Choose two.)

uses only PVCs

* is useful for video transfers

* has data rates beyond 155 Mbps

s have 32 byte payload and a 5 byte overhead

mandates single virtual circuits on a single leased line connection

11. Which of the statements regarding DSL are correct? (Choose three.)

DSL provides a consistent bandwidth of 2.154 Mbps.

DSL connecti
ons provide a fast dialup to establish a WAN connection.

* DSL connects the local loop to a digital subscriber line access multiplexer.

* DSL bandwidth varies and can exceed the bandwidth of a T1/E1 leased line.

* For DSL to function properly, the lo
cal loop must be less than 5.5 kilometers (3.5 miles).

DSL is a popular choice for enterprises that need to connect home users to the local network due to strong

12. Which statement is true regarding WAN technologies?

Most WANS use only on
e technology throughout the infrastructure such as ISDN, Frame Relay or ATM.

Data transfer speeds on the WAN are typically faster than the speeds on a LAN.

* WANs operate at the lower three layers of the OSI model.

WANs are unable to support the tran
sfer of voice or video traffic.

13. Why is it important to identify the type of traffic that will be carried on the WAN links before choosing a
WAN technology?

to determine the routing protocol to be used on the WAN link

to determine the WAN topolog

* to determine the requirements for latency and jitter

to determine the type of signaling protocol to be used on the WAN link

14. Depending on the company size and geographical layout, there might be many end points on the company
WAN. Why is it im
portant to identify all the end points of the WAN before choosing a WAN design?

to determine the routing protocol to be used on the WAN link

* to determine the WAN topology

to determine the requirements for latency and jitter

to determine the sign
aling protocol to be used on the WAN link

15. Which of the following is true of WANs?

Shared network WAN technologies such as Frame Relay and ATM are more expensive but offer less latency
and jitter than dedicated lines.

ISDN is suitable for large e

* The more network devices that data has to pass through across the WAN, the more latency and less reliability
the network will experience.

WANs typically incorporate only one technology such as ISDN, Frame Relay, or ATM.

16. A new intern
ational company needs to have a design for WAN connectivity. The company will have at least
five offices in every state in the United States and Mexico. Some states will have as many as 20 offices. The
branch offices will require constant contact with the
services of the main office. Which design model is best for
WAN connectivity in this situation?

a mesh network of all branch WANs

a simple star topology connecting all branch LANs to a central router with multiple interfaces

a one layer design using

Frame Relay links between LANs

* a three layer hierarchical topology interconnecting branch LANs within an area, the area LANs within a
region, and connecting the regions to form the core of the WAN

3 ~~~~~~~~~~~~~~~~~~~~~

1. How did Cisco alter the HDLC encapsulation to allow a single link to carry multiple protocols?

split the transmissions into multiple channels each carrying a single protocol

identified the protocol in the FCS field

ressed the datagrams differently for each protocol

* added a type field to identify the protocol

2. A technician has used Telnet to gain remote access to a router that has no connectivity on its serial interface.
Which command should be issued to deter
mine if the serial cable is connected properly?

* show controllers

show processes

show run

show status

3. A two router network is running PPP over the serial interfaces that connect them. The enable password on
the Denim router is "gateway". The

Denim router also has a locally configured authentication password for the
Plaid router which is "fortress". Which command must be executed on the Plaid router to allow Denim to
authenticate to the Plaid router using CHAP?

Plaid(config)# enable secret

Plaid(config)# enable secret fortress

Plaid(config)# username Plaid password fortress

* Plaid(config)# username Denim password fortress

Plaid(config)# hostname Plaid secret password gateway

Plaid(config)# hostname Plaid secret password fo

4. Which authentication protocol can be spoofed to allow playback attacks?





5. How is the MD5 function valuable in authentication? (Choose two.)

* uses a one
way hash function

authentication occurs more rapidly

* challenges are unique

the remote router assumes control of frequency of challenge

the remote router assumes control of timing of challenge

6. Which command specifies a link quality over a PPP link?

ppp link 50

ppp link quality 60

ppp percent
age 80

* ppp quality 90

7. Refer to the output of the show interface Serial0/0 command in the graphic. How many NCPs have been


* 2



8. Which of the following is an advantage of using time
division multiplexing (TDM) for tra
nsmitting data?
(Choose two.)

It allows a single source to transmit over multiple data channels.

* Multiple sources can transmit over a single channel.

* Original data streams must be reconstructed at the destination.

TDM relies on Layer 3 protoco
ls to operate.

9. Which of the following describes the High
Level Data Link Control protocol? (Choose three.)

* HDLC provides flow and error control.

Standard HDLC supports multiple protocols on a single link.

* HDLC uses sequencing and acknowledg

HDLC is defined as the default encapsulation on Cisco LAN interfaces.

* Cisco implemented a proprietary version of HDLC.

10. A technician is testing the functionality of a recently installed router. The technician is unable to ping the

interface of a remote router. The technician executes the show interface serial 0/0 command on the local
router and receives the following output:

Serial0/0 is up, line protocol is down(disabled)

What are possible causes for this command output? (Choose


interface missing the no shutdown command

clockrate command missing

* CSU/DSU failed

* interface shutdown due to high error rate

cable missing

11. When troubleshooting the Serial 0/0 interface of a router, a technician issues the show c
ontrollers command.
The following was the output of the command:

Interface is Serial0/0, electrical interface is UNKNOWN.

What can be concluded about the Serial 0/0 interface? (Choose three.)

* Serial0/0 is down, line protocol is down

Serial0/0 is
down, line protocol is up

Serial0/0 is up, line protocol is down

The interface is neither DCE or DTE.

* The interface hardware may be faulty.

* The cabling may be improperly connected.

12. ISDN BRI service uses two B channels to send data, voice,

and video. If the first channel becomes saturated,
the second channel can be configured to forward packets. Which command will allow ISDN to load balance
across both links?

if)# ppp quality 2

if)# ip variance

if)# ip maximum
paths 2

* Router(config
if)# ppp multilink

13. Which of the following describe functions of the Point
Point protocol with regards to the OSI model?
(Choose three.)

PPP uses Layer 3 of the OSI model to establish and maintain a
session between devices.

PPP operates at all layers of the OSI model.

* PPP uses the data link layer to configure such options as error detection and compression.

* PPP provides a mechanism to multiplex several network layer protocols.

PPP uses Net
work Control Protocols (NCP) to test and maintain connectivity between devices.

* PPP can be configured on both synchronous and asynchronous serial interfaces.

14. PPP uses several protocols for communication. Which of the following are options that th
e LCP protocol in
the PPP architecture can provide? (Choose two.)

* testing the quality of the link

routing packets between devices

assigning individual station addresses

configuring network layer protocols

* negotiating authentication options

15. Several tasks must occur before a link between two routers can pass data using PPP. Which of the following
are required to establish and maintain a PPP session between two routers?

configure each host with a PPP address

configure authentication b
etween the two routers

* send LCP and NCP frames to negotiate configuration parameters

send hostname and password information between the two routers

16. Which of the following is a reason for using such protocols as PAP and CHAP?

to establish a P
PP session

to provide error checking on a WAN link

* to restrict access to networks connected by serial and ISDN links

to provide a backup hostname and privilege mode password on the router

17. Which of the following describes the CHAP protocol? (C
hoose three.)

* exchanges a random challenge number during the session to verfiy identity

sends authentication password to verify identity

* prevents transmission of login information in plain text

* disconnects the PPP session if authentication f

initiates a two
way handshake

18. Which command was used to display the partial output shown in the graphic?

show ppp traffic

show lcp traffic

* debug ppp negotiation

debug ppp authentication

19. What can be concluded from the output sh
own in the graphic? (Choose three.)

A two
way handshake is occuring.

* The LCPs were already negotiated.

* The router can begin NCP negotiations.

The debug ppp negotiation command was executed.

* The debug ppp authentication command was executed

20. Which advantage does the multilink option provide when using PPP?

* Data transmission has load balancing possibilities.

Interfaces can be configured using both HDLC and PPP.

More than one authentication method can be used.

More than one co
mpression protocol can be configured.

4 ~~~~~~~~~~~~~~~~~~~~~

1. Which of the following correctly describes ISDN BRI? (Choose three.)

* two 64 kbps B channels and one 16 kbps

D channel

* B channel is suitable for voice data

uses in
band signaling

* uses out
band signaling

offers the equivalent of a T1/E1 connection

three 64 kbps B channels and one 16 kbps D channel

2. A network administrator in Europe has

been asked to provide the network with an ISDN WAN link. The
router available to provide the WAN connection is a non
modular Cisco router with an S/T interface. What
further equipment will be provided by the ISP for the ISDN connection?

Nothing. The ro
uter is already suitable.

BRI WAN interface card to install in the router

* an external NT1 to terminate the local loop

a TA/NT1 device to install on the router

3. What must be configured for an ISDN PRI connection? (Choose three.)

* ISDN switch


Service Profile Identifier (SPID)

Demand Routing (DDR)

* PRI group time slot

* T1/E1 controller, framing type and line coding

4. A small company uses an ISDN WAN link to transfer e
mail to remote sites. What command would the
strator use to determine if the ISDN link is up?

* show isdn status

show isdn active

show dialer

show interface bri0/0

debug isdn active

5. A network administrator is troubleshooting ISDN connectivity. The administrator suspects the problem li
with the authentication protocol. What command should the administrator use to view the authentication
process between the router and the ISDN switch?

debug pap authentication

debug chap authentication

* debug ppp authentication

debug isdn auth

6. The network administrator of XYZ company needs to configure a new ISDN router. After entering the
commands shown in the graphic, the administrator tries to access the Internet but the ISDN connection does not
open. If the service provider v
erifies that the problem is with XYZ's configuration, what is a possible cause of
the problem?

The dialer map is configured incorrectly.

The encapsulation type is configured incorrectly.

* The dialer group is configured incorrectly.

The ACL is con
figured incorrectly.

The isdn switch
type command needs to be configured globally.

7. Which of the following are true of ISDN routers configured with dialer profiles? (Choose two.)

They do not use ACL to define interesting traffic.

* Their B chann
els can be configured with different subnets and encapsulation types.

* Their BRI interfaces can belong to multiple dialer pools.

They use PPP only.

They can only use the CHAP authentication protocol.

8. Which of the following describes the use of
a SPID? (Choose two.)

selects the ISDN switch type

* identifies the line configuration of the BRI service

* allows multiple ISDN devices to share the local loop

designates whether a device is a TE1 or TE2

allows ISDN broadcasts

9. Which of the

following is considered out
band signaling?

using a frequency outside of the rated bandwidth for transmission

transmitting data over a control channel

* using a separate channel for control signals

transmitting control signals over a data chan

10. Why must routers be configured to specify the ISDN switch type?

* Switches use various implementations of Q.931.

The IOS of most routers lacks the ability to autosense the switch.

The switch must know what type of router it is communicatin
g with.

The Layer 3 connection between the terminal equipment and the ISDN switch is not standardized.

11. Which command configures an ISDN interface to use a switch type which is different from that used on
other interfaces on the router?

type switch

type switch

Router(config)#isdn switch
type switch

* Router(config
if)#isdn switch
type switch

12. Which router command would be used to enter the mode for configuring a T1 PRI c

* Router(config)# controller t1 {slot/port}

Router(config)# interface pri t1 {slot/port}

Router(config)# interface pri {slot/port} t1

Router(config)# controller {slot/port} t1

13. Which command is used within an existing ISDN network
to display current call information, including the
called number?

show isdn status

* show isdn active

show interfaces bri0/0

show ip interfaces

14. You have just taken delivery of a new US standard Cisco 2620 router that includes a BRI "U" inter
Which of the following describes how this router will be connected in the ISDN network?

An external terminal adapter (TA) must be attached to the router for connectivity.

An NT1 must be connected to the router for connectivity.

* The router is

a TE1 device and is ready to connect to the provider's network.

The router is a TE2 device and requires both a TA and NT1 for connectivity.

15. Which of the following protocols can be used to encapsulate data traffic sent from a router BRI interface?
(Choose two.)

Link Access Protocol


* High
Level Data Link Control

Logical Link Control

Serial Data Link Control

* Point to Point protocol

Binary Synchronous Control protocol

16. Which of the following is essential for all ISDN BRI int
erface configurations?

* ISDN switch type

line encoding technique

line framing method

local directory number

service profile identifier

17. What is a reason why static routes are preferred over dynamic routes for DDR to operate on an ISDN

An ISDN interface will not allow dynamic routing updates that use broadcast technology.

A dynamic route will take precedence over a static route because of its lower administrative distance.

Dynamic routing can never be considered interesting

traffic by default.

list configuration does not support dynamic routing.

* Dynamic routes may cause the ISDN connection to dial constantly to transmit updates.

18. A network administrator is troubleshooting an ISDN connectivity problem. Users

are complaining they
cannot connect to the Internet. The network administrator suspects the ISDN connection attempt is timing out
before a connection can be established. What command would the network administrator use to determine what
the "wait for carr
ier" timeout value is set to?

show isdn status

show isdn active

* show dialer

show interfaces bri0/0

debug isdn q931

show ISDN interfaces

5 ~~~~~~~~~~~~~~~~~~~~~

1. Which data link layer protocol is us
ed to carry frames across a Frame Relay link?





Frame Relay

2. Which of the following statements are true about a basic Frame Relay WAN connection between a customer
and the service provider? (Choose two.)

* DTE devices s
uch as routers and FRADs transmit user data.

DTE devices such as Frame Relay switches transport the data between DTE devices.

An Ethernet connection between the router and the frame relay switch allow access to the frame relay network.

* Serial conne
ctions between the customer and the frame relay network are used to transport data.

The Frame Relay WAN is a mesh of interconnected routers.

3. How does Frame Relay technology process frames that contain errors? (Choose two.)

* Frame Relay services
depend on the upper layer protocols to handle error recovery.

It requires the receiving device to request that the sender retransmit erroneous frames.

FECN, BECN, and DE bits are set in the frames to minimize errors.

* The receiving device drops any
frames that contain errors without notifying the sender.

The frame relay switch notifies the sender that errors were detected.

4. Which features make Frame Relay technology a cost
effective alternative to a mesh of dedicated leased
lines? (Choose three

* allows a single interface to support multiple PVCs

* minimizes the equipment required to be purchased by the customer

requires one router interface for each PVC

provides the customer with redundancy if a single interface goes down

* allows
the customer to pay for the average bandwidth requirement rather than the maximum bandwidth

5. Which methods are used to minimize heavy traffic on a Frame Relay network? (Choose two.)

FRADs or routers set ECN bits to request that the Frame

Relay switch reduce the flow of frames on the link.

Windowing is used to reduce the size of the frames sent across the link.

* The Frame Relay switch will drop packets that have the DE bit set.

* When a switch sees its queue increasing, it notifies
DTEs to reduce the flow of traffic.

When congestion occurs, all frames are dropped until the congestion clears.

6. What does a DLCI of 1023 indicate about a frame?

The LMI type is ANSI.

The LMI type is IETF.

* The LMI type is Cisco.

The LMI ty
pe is Q933a.

The encapsulation is Cisco.

The encapsulation is IETF.

7. Which of the following allow the router to map data link layer addresses to network layer addresses in a
Frame Relay network? (Choose two.)



Proxy ARP

* Inverse A

* LMI status messages


8. A ping is sent to address from the Peanut router. Which DLCI will be used to send the ping?

* 110




9. What is created between two DTEs in a Frame Relay network?

switched parallel


* permanent virtual circuit

limited access circuit

ISDN circuit

Frame Relay circuit

10. Which bits are set in the data frames to request that a device reduce the flow of data sent to or from a Frame
Relay switch?

EIR bits

* ECN bits

CIR bits

DE bits

Window bits

11. Which commands were added to the configuration to produce the output shown in the graphic? (Choose

Router(config)# ip route 17 broadcast

if)# frame
relay lmi
e cisco 17

* Router(config
if)# frame
relay map ip 17 broadcast

if)# ip address DLCI 17 static

if)# interface S0/0.1 point

* Router(config
if)# encapsulation frame


12. Which of the following occurs when the command frame
relay map ip 22 is configured on the
router? (Choose two.)

DLCI 22 will replace the MAC address in the ARP table for entry

The remote circuit with DLCI 22 can receive
a ping.

ARP will be used to add an entry for into the frame
relay map table using DLCI 22.

* Pings to will be sent on the circuit labeled DLCI 22.

* The router will use DLCI 22 to forward data to

13. When trouble
shooting a frame
relay connection, an administrator entered the show interfaces s0/0
command and received the output shown in the graphic. The line protocol is down. Which of the following are
probable reasons for this problem? (Choose two.)

The cable b
etween the CSU/DSU and the router is disconnected.

The serial 0/0 interface is shutdown.

* The router is not configured for the same frame
relay PVC as the switch.

* The LMI type on the frame
relay switch is NOT ANSI.

The address of the frame

switch is not in the routing table.

14. When troubleshooting a frame relay connection, a technician entered the show frame
relay pvc command
shown in the graphic. What can be concluded from the output shown in the graphic? (Choose three.)

* The outpu
t in the debug frame
relay lmi command will indicate status 0x2 for DLCI 18.

* DLCI 16 was correctly programmed on the switch, but the remote router may be misconfigured.

* The frame relay switch is sending LMI status messages about DLCI 16 to the Sing
apore router.

Congestion has been experienced on DLCI 18.

Some packets have been set to be dropped if congestion is experienced on the PVC.

15. How is a permanent virtual circuit identified in a Frame Relay network that is carrying IP traffic?

* I
t is given a fixed locally significant identification number.

It is identified by the MAC address of the router interface.

Dynamic virtual channel identifiers are assigned to each frame transmitted across the network.

It is identifed by the MAC addre
ss of the switch port.

16. What is the purpose of the FCS field in a Frame Relay frame?

It serves to distinguish one frame from the next.

It is used to signal network congestion.

* It is used to detect if the frame has been corrupted and should be


It determines which VC should be used for transmission.

17. Why are full mesh topologies seldom found in large Frame Relay networks?

Additional hardware is required to achieve the mesh.

The additional virtual circuits slow the link acc
ess speeds.

* The required number of links becomes prohibitive.

Additional interfaces are required since each can only support 10 virtual circuits.

The speed of transmission slows in inverse proportion to the square of the number of links.

18. Why
keepalive mechanism added as an extention to the Local Management Interface in a Frame Relay

to identify which routers were experiencing congestion

* to verify the status of PVCs in the frame relay network

to dynamically map a MAC address t
o an IP address in a Frame Relay network

to signal to the router the status of the routing protocols configured in the Frame Relay network

19. Which of the following DLCIs are reserved?




* 1023


20. Which statement identifies

a reason for using point
point subinterfaces in Frame Relay networks?

* Subinterfaces overcome routing update and split
horizon issues that occur with multipoint logical interfaces
on a single physical interface.

A point
point subinterface does

not require an IP address and therefore saves address space.

point subinterfaces provide greater reliability and reachability in Frame Relay networks by requiring a
mesh topology for network configurations.

point subinterfaces increa
se the number of DLCIs that can be configured in a Frame Relay network.

21. Which of the following statements regarding multipoint subinterfaces are true? (Choose two.)

* A single multipoint subinterface is used to establish PVC connections to multipl
e physical interfaces on
remote routers.

Each multipoint link is in its own subnet.

* The physical interface does not have an IP address.

horizon is disabled allowing routing updates to be re
transmitted on every subinterface.

Multipoint subi
nterfaces require the encapsulation frame
relay command to be issued individually for each
subinterface to operate correctly.

6 ~~~~~~~~~~~~~~~~~~~~~

1. Which of the following are exam
ples of network management applications? (Choose two.)

Windows 2000 Professional

* Ciscoworks2000

* HP Openview

Red Hat Linux

Cisco ConfigMaker

2. Which statements are true regarding configuring SNMP? (Choose three.)

It is best to use the d
efault read
only community strings in enterprise networks.

* It is not advisable to use the default read
write community string in an enterprise network.

* More than one read
only community string is supported.

* Authorized management stations can mo
dify MIB objects with read
write access specified.

The maximum number of read
write strings supported is one.

3. Which statements describe the Windows 2000 operating system family? (Choose three.)

* .NET Server was designed to run enterprise level w
eb and FTP services.

Active Directory services run on both Windows 2000 Professional and Windows 2000 Server.

* The entire family of Windows 2000 operating systems can operate as a file, print, FTP or web server.

Both Windows 2000 Professional and Se
rver can support up to 256 simultaneous dialup sessions.

* .NET server was designed to compete with Linux and Unix.

4. For which platform was UNIX first marketed commercially?

workstations and servers


* network servers

large mainf
rame systems

5. Which features are supported by the Mac OS X system that make it a competitive choice for operating
systems? (Choose four.)

* protected memory

two bit addressing

* preemptive multitasking

open source operating system code

* symmetric multiprocessing

* Appletalk
Windows network connectivity

6. Which operating systems support multiuser capability? (Choose three.)

* Linux

Windows 98

Windows ME

* Windows XP

* Windows 2000

7. How does SNMPv3 address the secu
rity shortcomings of SNMPv1 and SNMPv2c?

improved SMI features

support for centralized and distributed management

* secure access to MIBs

control of heterogeneous networks

8. Which means of communication does an SNMP network agent use to provide

a network management station
with important but unsolicited information?



ICMP ping

* trap


9. An SNMPv1 agent would issue a GetResponse message to reply to which NMS requests? (Choose three.)

* GetRequest


* GetNextRequest

* SetRequest


10. Why are SNMPv1 and SNMPv2c community strings considered a security risk?

SNMPv1 and SNMPv2c encapsulations are not encrypted by default.

* SNMPv1 and SNMPv2c community strings are sent as


SNMPv1 and SNMPv2c are limited to 32
bit counters.

SNMPv1 and SNMPv2c uses a connectionless protocol.

11. In the above illustration, which configuration commands can be used to specify the location of a managed
device and the main system
contacts for the device? (Choose two.)

if)# snmp
server SanJose

* Atlanta(config)# snmp
server contact JPSmith

Atlanta(config)# snmp contact JPSmith

* SanJose(config)# snmp
server location SanJose

Chicago#(config)# snmp chicago

12. How does RMON gather statistics on a segment?

analyzes traps on the segment

polls packets on the segment

* analyzes every frame on the segment

analyzes source and destination addresses

13. Which command would enable logging on all supported


Router(config)# logging

Router(config)# logging routerA

* Router(config)# logging on

Router(config)# logging enable

14. Which of the following is a collection of software which includes a GUI interface to allow the net
administrator to monitor and manage the network?

* network management application

network management agent

management information base

network management protocol

15. Which of the following describes the community strings used for SNMPv1 an
d SNMPv2c? (Choose two.)

* The community strings are sent using UDP.

The read only string on most devices is set to private.

The read/write string on most devices is set to public.

Only the NMA needs to be configured with the community strings.

* The community strings are sent across the network in cleartext.

16. Which of the following does SNMP use to hold information collected about the network?

network management station

network management database

* management information base

abase information agent