Cisco - Actualtests.200-120.v2013-12-09.by - Watson.314q: Sections

Download as pdf or txt
Download as pdf or txt
You are on page 1of 31

Cisco.Actualtests.200-120.v2013-12-09.by.Watson.

314q

Number: 200-120
Passing Score: 825
Time Limit: 120 min
File Version: 14.5

Exam Code: 200-120

Exam Name: CCNA Cisco Certified Network Associate CCNA (803)

Sections
1. Introduction
2. TCP/IP
3. IP Addressing / VLSM
4. Introduction to Cisco IOS
5. Managing Cisco IOS
6. IP Routing
7. Security
8. NAT
9. Switching
10. VLAN
11. IPv6
12. WAN
13. Drag & Drop
14. Simulation
15. Netflow
16. SNMP/HSRP/GLBP
17. Syslog

Ahmed Tawfik
Exam B

QUESTION 1
Refer to the exhibit. What will Router1 do when it receives the data frame shown? (Choose three.)

A. Router1 will strip off the source MAC address and replace it with the MAC address 0000.0c36.6965.
B. Router1 will strip off the source IP address and replace it with the IP address 192.168.40.1.
C. Router1 will strip off the destination MAC address and replace it with the MAC address 0000.0c07.4320.
D. Router1 will strip off the destination IP address and replace it with the IP address of 192.168.40.1.
E. Router1 will forward the data packet out interface FastEthernet0/1.
F. Router1 will forward the data packet out interface FastEthernet0/2.

Correct Answer: ACF


Section: Introduction to Cisco IOS
Explanation

Explanation/Reference:
The router will decapsulate the frame, thus removing the source and destination MAC addresses. It will
consult its routing table to work out on which interface to send the packet which is going to 192.168.40.5:
interface FastEthernet0/2. The router will then encapsulate the packet into a new frame with its own MAC
address as the source MAC address and the MAC address of 192.168.40.5 as the destination MAC
address.
Looking at the ARP table, the MAC address for 192.168.40.5 is 0000.0c07.4320 (the one which has been
dynamically learned and has age 9 minutes). So what is the router’s MAC address on this link? The ARP
table shows a static entry (no age) for 192.168.40.1 which is 0000.0c36.6965. As it is static, we can
conclude that these are the router’s IP and MAC address.

QUESTION 2
Which layer in the OSI reference model is responsible for determining the availability of the receiving
program and checking to see if enough resources exist for that communication?

A. transport
B. network
C. presentation
D. session
E. application

Correct Answer: E
Section: Introduction
Explanation

Explanation/Reference:
Programs live at the top end of the OSI model, so this rules out the network (delivery of packets across

Ahmed Tawfik
multiple links) and transport (end-to-end reliability and ports). The presentation layer is concerned with the
representation of data. The session layer provides the mechanism for opening, closing and managing a
session between end-user application processes, i.e., a semi-permanent dialogue (Wikipedia).
Wikipedia says: In the OSI model, the definition of its application layer is narrower in scope. The OSI model
defines the application layer as being the user interface. The OSI application layer is responsible for
displaying data and images to the user in a human-recognizable format. So the best answer is the
application layer, as this will see if there is a program (user interface) available to receive communications.

QUESTION 3
Refer to the exhibit.

Host A pings interface S0/0 on router 3. What is the TTL value for that ping?

A. 252
B. 253
C. 254
D. 255

Correct Answer: B
Section: IP Addressing / VLSM
Explanation

Explanation/Reference:
The default TTL is 255, and as a packet passes through a router the TTL is decremented. By the time the
ping packet reaches S0/0 on Router 3, it has passed through two routers and the TTL is now 253. Note that
the S0/0 interface responds to the ping: the packet is not routed by Router 3 and so the TTL in the ping
packet is not decremented to 252.

QUESTION 4

Ahmed Tawfik
A network administrator is verifying the configuration of a newly installed host by establishing an FTP
connection to a remote server.
What is the highest layer of the protocol stack that the network administrator is using for this operation?

A. application
B. presentation
C. session
D. transport
E. internet
F. data link

Correct Answer: A
Section: TCP/IP
Explanation

Explanation/Reference:
FTP is an application layer protocol, so this is the highest OSI layer involved in the operation.

QUESTION 5
A network interface port has collision detection and carrier sensing enabled on a shared twisted pair
network. From this statement, what is known about the network interface port?

A. This is a 10 Mb/s switch port.


B. This is a 100 Mb/s switch port.
C. This is an Ethernet port operating at half duplex.
D. This is an Ethernet port operating at full duplex.
E. This is a port on a network interface card in a PC.

Correct Answer: C
Section: Introduction
Explanation

Explanation/Reference:
The only time that CSMA/CD (carrier sense medium access with collision detection) is ever needed is when
the medium is shared by all devices. In this situation, devices can never send and receive at the same time;
they must operate in half-duplex mode. The bitrate is irrelevant.

QUESTION 6
A receiving host computes the checksum on a frame and determines that the frame is damaged. The frame
is then discarded. At which OSI layer did this happen?

A. physical
B. session
C. data link
D. transport
E. network

Correct Answer: C
Section: Introduction
Explanation

Explanation/Reference:
Operations on frames occur at the data link layer.

QUESTION 7
Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two)

A. The transport layer divides a data stream into segments and may add reliability and flow control
information.

Ahmed Tawfik
B. The data link layer adds physical source and destination addresses and an FCS to the segment.
C. Packets are created when the network layer encapsulates a frame with source and destination host
addresses and protocol-related control information.
D. Packets are created when the network layer adds Layer 3 addresses and control information to a
segment.
E. The presentation layer translates bits into voltages for transmission across the physical link.

Correct Answer: AD
Section: Introduction
Explanation

Explanation/Reference:
The key word here is encapsulation. The transport layer breaks the stream into segments, with ports,
reliability and flow control fields added (TCP) (A). The network layer encapsulates the segment (not a
frame) into packets by adding layer 3 addresses (D). The data link layer adds physical source and
destination addresses and an FCS to a packet, not a segment.

QUESTION 8
Refer to the graphic.

Host A is communicating with the server. What will be the source MAC address of the frames received by
Host A from the server?

A. the MAC address of the server network interface


B. the MAC address of host A
C. the MAC address of router interface e1
D. the MAC address of router interface e0

Correct Answer: D
Section: Introduction
Explanation

Explanation/Reference:
Host A and the Server are on different subnets and are separated by routers, so the MAC address of the
Server will never get back to Host A: the router will decapsulate the frames that the Server sends. The
router will re-encapsulate the packets from the Server and and put its own MAC address on the outbound
interface (e0) in the frames. Host A will see the MAC address of router interface e0.

QUESTION 9
Refer to the exhibit.
What two results would occur if the hub were to be replaced with a switch that is configured with one
Ethernet VLAN? (Choose two.)

Ahmed Tawfik
A. The number of broadcast domains would remain the same.
B. The number of collision domains would increase.
C. The number of collision domains would decrease.
D. The number of broadcast domains would decrease.
E. The number of collision domains would remain the same.
F. The number of broadcast domains would increase.

Correct Answer: AB
Section: Introduction
Explanation

Explanation/Reference:
Only routers create broadcast domains, so the number of broadcast domains will be unchanged. A hub is a
single collision domain, whereas each port on a switch is its own collision domain. Therefore, by adding a
switch the number of collision domains will increase.

QUESTION 10
Where does routing occur within the DoD TCP/IP reference model?

A. application
B. internet
C. network
D. transport

Correct Answer: B
Section: TCP/IP
Explanation

Explanation/Reference:
In the OSI reference model, routing occurs at Layer 3, i.e. the network layer. However, the question isn’t
asking about OSI, it’s asking about the DoD TCP/IP model! In this model, the internet layer does routing.

QUESTION 11
For what two purposes does the Ethernet protocol use physical addresses? (Choose two.)

A. to uniquely identify devices at Layer 2


B. to allow communication with devices on a different network
C. to differentiate a Layer 2 frame from a Layer 3 packet
D. to establish a priority system to determine which device gets to transmit first
E. to allow communication between different devices on the same network
F. to allow detection of a remote device when its physical address is unknown

Ahmed Tawfik
Correct Answer: AE
Section: Introduction
Explanation

Explanation/Reference:
Physical addresses (also known as link or MAC addresses) identify devices at layer 2 (A). They can be
used to deliver frames between different devices on the same link (subnet, network) (E). To cross different
links/subnets, we use layer 3 addresses.

QUESTION 12
In an Ethernet network, under what two scenarios can devices transmit? (Choose two.)

A. when they receive a special token


B. when there is a carrier
C. when they detect no other devices are sending
D. when the medium is idle
E. when the server grants access

Correct Answer: CD
Section: Introduction
Explanation

Explanation/Reference:
Ethernet devices don’t use tokens (rules out A). They can only transmit when there is no carrier (rules out
B) medium is idle and no other device is transmitting (C and D). There is no server required to grant access
(rules out E).

QUESTION 13
Which of the following statements describe the network shown in the graphic? (Choose two.)

What are the proper statements?. (Choose two)

A. There are two broadcast domains in the network.


B. There are four broadcast domains in the network.
C. There are six broadcast domains in the network.
D. There are four collision domains in the network.
E. There are five collision domains in the network.
F. There are seven collision domains in the network.

Correct Answer: AF
Section: Introduction

Ahmed Tawfik
Explanation

Explanation/Reference:
Each side of a router is its own broadcast domain (routers separate broadcast domains), so there are two
broadcast domains (A). All sides of a hub are the one collision domains, but each side of a switch is its own
collision domain. Thus, the number of collision domains are 1 (around the hub), 1 (between switch and
router) plus the 5 collision domains on the cables out to the five PCs: seven in total (F).

QUESTION 14
Which command can be used from a PC to verify the connectivity between hosts that connect through a
switch in the same LAN?

A. ping address
B. tracert address
C. traceroute address
D. arp address

Correct Answer: A
Section: IP Addressing / VLSM
Explanation

Explanation/Reference:
In the same LAN means that we don't need to cross through a router, while rules out any traceroute
command (B, C). The arp command only shows if we have previously received a frame from that address,
not if connectivity is still OK, so not D. We need the ping command to send an ICMP packet to the host and
receive a reply for it.

QUESTION 15
How many broadcast domains are shown in the graphic assuming only the default VLAN is configured on
the switches?

A. one
B. six
C. twelve
D. two

Correct Answer: A
Section: Introduction
Explanation

Explanation/Reference:
Routers separate broadcast domains. Hubs and switches extend broadcast domains (if we neglect VLANs).
There are no routers in the diagram, so there is only one broadcast domain.

QUESTION 16
An administrator must assign static IP addresses to the servers in a network.
For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is
given the last usable host address.
Which of the following should be entered into the IP properties box for the sales server?

Ahmed Tawfik
A. IP address: 192.168.20.14
Subnet Mask: 255.255.255.248
Default Gateway: 192.168.20.9
B. IP address: 192.168.20.254
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.20.1
C. IP address: 192.168.20.30
Subnet Mask: 255.255.255.248
Default Gateway: 192.168.20.25
D. IP address: 192.168.20.30
Subnet Mask: 255.255.255.240
Default Gateway: 192.168.20.17
E. IP address: 192.168.20.30
Subnet Mask: 255.255.255.240
Default Gateway: 192.168.20.25

Correct Answer: C
Section: IP Addressing / VLSM
Explanation

Explanation/Reference:
A /29 network has only 8 IP addresses, of which 6 are usable IP addresses. This means that 192.168.20.24
represents the network, 192.168.20.25 is the first usable IP address, 192.168.20.30 is the last usable IP
address and 192.168.20.31 is the broadcast address on the network. Another way to write /29 is
255.255.255.248, so the answer is C.

QUESTION 17
Which subnet mask would be appropriate for a network address range to be subnetted for up to eight
LANs, with each LAN containing 5 to 26 hosts?

A. 0.0.0.240
B. 255.255.255.252
C. 255.255.255.0
D. 255.255.255.224
E. 255.255.255.240

Correct Answer: D
Section: IP Addressing / VLSM
Explanation

Explanation/Reference:
We need 26 usable IP addresses, so we need subnets with a range of 32 addresses. This is the /27
netmask, or 255.255.255.224.

QUESTION 18
A national retail chain needs to design an IP addressing scheme to support a nationwide network.
The company needs a minimum of 300 sub-networks and a maximum of 50 host addresses per subnet.
Working with only one Class B address, which of the following subnet masks will support an appropriate
addressing scheme? (Choose two.)

A. 255.255.255.0
B. 255.255.255.128
C. 255.255.252.0
D. 255.255.255.224
E. 255.255.255.192
F. 255.255.248.0

Correct Answer: BE
Section: IP Addressing / VLSM

Ahmed Tawfik
Explanation

Explanation/Reference:
50 hosts per subnet, so we'd need a range of 64 IP addresses which is a /26. This converts to a mask of
255.255.255.192.

QUESTION 19
Which command can you use to manually assign a static IPv6 address to a router interface?

A. ipv6 address PREFIX_1::1/64


B. ipv6 autoconfig 2001:db8:2222:7272::72/64
C. ipv6 autoconfig
D. ipv6 address 2001:db8:2222:7272::72/64

Correct Answer: D
Section: Managing Cisco IOS
Explanation

Explanation/Reference:

QUESTION 20
The network administrator is asked to configure 113 point-to-point links. Which IP addressing scheme best
defines the address range and subnet mask that meet the requirement and waste the fewest subnet and
host addresses?

A. 10.10.0.0/18 subnetted with mask 255.255.255.252


B. 10.10.0.0/25 subnetted with mask 255.255.255.252
C. 10.10.0.0/24 subnetted with mask 255.255.255.252
D. 10.10.0.0/23 subnetted with mask 255.255.255.252
E. 10.10.0.0/16 subnetted with mask 255.255.255.252

Correct Answer: D
Section: Managing Cisco IOS
Explanation

Explanation/Reference:

QUESTION 21
A Cisco router is booting and has just completed the POST process. It is now ready to find and load an IOS
image. What function does the router perform next?

A. It checks the configuration register.


B. It attempts to boot from a TFTP server.
C. It loads the first image file in flash memory.
D. It inspects the configuration file in NVRAM for boot instructions.

Correct Answer: A
Section: Managing Cisco IOS
Explanation

Explanation/Reference:
Explanation:

QUESTION 22
Refer to the exhibit. What is the meaning of the output MTU 1500 bytes?

Ahmed Tawfik
A. The maximum number of bytes that can traverse this interface per second is 1500.
B. The minimum segment size that can traverse this interface is 1500 bytes.
C. The maximum segment size that can traverse this interface is 1500 bytes.
D. The minimum packet size that can traverse this interface is 1500 bytes.
E. The maximum packet size that can traverse this interface is 1500 bytes.
F. The maximum frame size that can traverse this interface is 1500 bytes.

Correct Answer: E
Section: Introduction to Cisco IOS
Explanation

Explanation/Reference:

QUESTION 23
Which command displays CPU utilization?

A. show protocols
B. show process
C. show system
D. show version

Correct Answer: B
Section: Managing Cisco IOS
Explanation

Explanation/Reference:

QUESTION 24
Refer to the exhibit. The technician wants to upload a new IOS in the router while keeping the existing IOS.

What is the maximum size of an IOS file that could be loaded if the original IOS is also kept in flash?

Ahmed Tawfik
A. 3MB
B. 5MB
C. 7MB
D. 4MB

Correct Answer: D
Section: Managing Cisco IOS
Explanation

Explanation/Reference:

QUESTION 25
Refer to the exhibit.
The two exhibit devices are the only Cisco devices on the network. The serial network between the two
devices has a mask of 255.255.255.252.
Given the output that is shown, what three statements are true of these devices? (Choose three.)

A. The Manchester serial address is 10.1.1.1.


B. The Manchester serial address is 10.1.1.2.
C. The London router is a Cisco 2610.
D. The Manchester router is a Cisco 2610.
E. The CDP information was received on port Serial0/0 of the Manchester router.
F. The CDP information was sent by port Serial0/0 of the London router.

Correct Answer: ACE


Section: Managing Cisco IOS
Explanation

Explanation/Reference:

QUESTION 26
Before installing a new, upgraded version of the IOS, what should be checked on the router, and which
command should be used to gather this information? (Choose two.)

A. the amount of available ROM.


B. the amount of available flash and RAM memory.
C. the version of the bootstrap software present on the router.

Ahmed Tawfik
D. show version.
E. show processes.
F. show running-config.

Correct Answer: BD
Section: Managing Cisco IOS
Explanation

Explanation/Reference:

QUESTION 27
Which command reveals the last method used to powercycle a router?

A. show reload
B. show boot
C. show running-config
D. show version

Correct Answer: D
Section: Managing Cisco IOS
Explanation

Explanation/Reference:

QUESTION 28
Which command would you use on a Cisco router to verify the Layer 3 path to a host?

A. tracert address
B. traceroute address
C. telnet address
D. ssh address

Correct Answer: B
Section: Introduction to Cisco IOS
Explanation

Explanation/Reference:
Explanation:

QUESTION 29
Refer to the exhibit.
A network administrator configures a new router and enters the copy startup-config running-config
command on the router.
The network administrator powers down the router and sets it up at a remote location.
When the router starts, it enters the system configuration dialog as shown. What is the cause of the
problem?

Ahmed Tawfik
A. The network administrator failed to save the configuration.
B. The configuration register is set to 0x2100.
C. The boot system flash command is missing from the configuration.
D. The configuration register is set to 0x2102.
E. The router is configured with the boot system startup command.

Correct Answer: A
Section: Introduction to Cisco IOS
Explanation

Explanation/Reference:

QUESTION 30
Why is flash memory erased prior to upgrading the IOS image from the TFTP server?

A. In order for the router to use the new image as the default, it must be the only IOS image in flash.
B. Flash memory on Cisco routers can contain only a single IOS image.
C. Erasing current flash content is requested during the copy dialog.
D. The router cannot verify that the Cisco IOS image currently in flash is valid.

Correct Answer: C
Section: Managing Cisco IOS
Explanation

Explanation/Reference:

QUESTION 31
Which command would you configure globally on a Cisco router that would allow you to view directly
connected Cisco devices?

A. enable cdp
B. cdp enable
C. cdp run

Ahmed Tawfik
D. run cdp

Correct Answer: C
Section: Managing Cisco IOS
Explanation

Explanation/Reference:

QUESTION 32
Which two locations can be configured as a source for the IOS image in the boot system command?
(Choose two.)

A. RAM
B. NVRAM
C. flash memory
D. HTTP server
E. TFTP server
F. Telnet server

Correct Answer: CE
Section: Managing Cisco IOS
Explanation

Explanation/Reference:

QUESTION 33
Which two statements describe the process identifier that is used in the command to configure OSPF on a
router? (Choose two.)

Router(config)# router ospf 1

A. All OSPF routers in an area must have the same process ID.
B. Only one process number can be used on the same router.
C. Different process identifiers can be used to run multiple OSPF processes.
D. The process number can be any number from 1 to 65,535.
E. Hello packets are sent to each neighbor to determine the processor identifier.

Correct Answer: CD
Section: Managing Cisco IOS
Explanation

Explanation/Reference:

QUESTION 34
Refer to the exhibit.
For what two reasons has the router loaded its IOS image from the location that is shown? (Choose two)

Ahmed Tawfik
A. Router1 has specific boot system commands that instruct it to load IOS from TFTP server.
B. Router1 is acting as a TFTP server for other routers.
C. Router1 cannot locate a valid IOS image in flash memory.
D. Router1 defaulted to ROMMON mode and loaded the IOS image from a TFTP server.
E. Cisco routers will first attempt to load a image from TFTP for management purposes.

Correct Answer: AC
Section: Managing Cisco IOS
Explanation

Explanation/Reference:

QUESTION 35
Refer to the exhibit. What can be determined about the router from the console output?

A. No configuration file was found in NVRAM.


B. No configuration file was found in flash.
C. No configuration file was found in the PCMCIA card.
D. Configuration file is normal and will load in 15 seconds.

Ahmed Tawfik
Correct Answer: A
Section: Introduction to Cisco IOS
Explanation

Explanation/Reference:

QUESTION 36
Which command shows your active Telnet connections?

A. show cdp neigbors


B. show session
C. show users
D. show vty logins

Correct Answer: B
Section: Managing Cisco IOS
Explanation

Explanation/Reference:

QUESTION 37
Which statement describes the process of dynamically assigning IP addresses by the DHCP server?

A. Addresses are allocated after a negotiation between the server and the host to determine the length of
the agreement.
B. Addresses are permanently assigned so that the hosts uses the same address at all times.
C. Addresses are assigned for a fixed period of time, at the end of the period, a new request for an
address must be made.
D. Addresses are leased to hosts, which periodically contact the DHCP server to renew the lease.

Correct Answer: D
Section: TCP/IP
Explanation

Explanation/Reference:

QUESTION 38
How does a DHCP server dynamically assign IP addresses to hosts?

A. Addresses are allocated after a negotiation between the server and the host to determine the length of
the agreement.
B. Addresses are permanently assigned so that the hosts uses the same address at all times.
C. Addresses are assigned for a fixed period of time, at the end of the period, a new request for an
address must be made.
D. Addresses are leased to hosts. A host will usually keep the same address by periodically contacting the
DHCP server to renew the lease.

Correct Answer: D
Section: TCP/IP
Explanation

Explanation/Reference:

QUESTION 39
Refer to the exhibit. Which rule does the DHCP server use when there is an IP address conflict?

Ahmed Tawfik
A. The address is removed from the pool until the conflict is resolved.
B. The address remains in the pool until the conflict is resolved.
C. Only the IP detected by Gratuitous ARP is removed from the pool.
D. Only the IP detected by Ping is removed from the pool.
E. The IP will be shown, even after the conflict is resolved.

Correct Answer: A
Section: Managing Cisco IOS
Explanation

Explanation/Reference:

QUESTION 40
Which two tasks does the Dynamic Host Configuration Protocol perform? (Choose two.)

A. Set the IP gateway to be used by the network.


B. Perform host discovery used DHCPDISCOVER message.
C. Configure IP address parameters from DHCP server to a host.
D. Provide an easy management of layer 3 devices.
E. Monitor IP performance using the DHCP server.
F. Assign and renew IP address from the default pool.

Correct Answer: CF
Section: TCP/IP
Explanation

Explanation/Reference:

QUESTION 41
When a DHCP server is configured, which two IP addresses should never be assignable to hosts? (Choose
two.)

A. network or subnetwork IP address


B. broadcast address on the network
C. IP address leased to the LAN
D. IP address used by the interfaces
E. manually assigned address to the clients
F. designated IP address to the DHCP server

Correct Answer: AB
Section: IP Addressing / VLSM
Explanation

Explanation/Reference:

QUESTION 42
When you are troubleshooting an ACL issue on a router, which command can help you to verify which

Ahmed Tawfik
interfaces are affected by the ACL?

A. show access-lists
B. show interface
C. show ip interface
D. show ip access-lists
E. list ip interface

Correct Answer: C
Section: Introduction to Cisco IOS
Explanation

Explanation/Reference:

QUESTION 43
What will happen if a private IP address is assigned to a public interface connected to an ISP?

A. Addresses in a private range will be not routed on the Internet backbone.


B. Only the ISP router will have the capability to access the public network.
C. The NAT process will be used to translate this address in a valid IP address.
D. Several automated methods will be necessary on the private network.
E. A conflict of IP addresses happens, because other public routers can use the same range.

Correct Answer: A
Section: IP Addressing / VLSM
Explanation

Explanation/Reference:

QUESTION 44
Which router IOS commands can be used to troubleshoot LAN connectivity problems? (Choose three.)

A. winipcfg
B. tracert
C. ping
D. ip config
E. show ip route
F. show interfaces

Correct Answer: CEF


Section: Introduction to Cisco IOS
Explanation

Explanation/Reference:

QUESTION 45
Refer to the exhibit.
An administrator pings the default gateway at 10.10.10.1 and sees the output as shown. At which OSI layer
is the problem?

Ahmed Tawfik
A. data link layer
B. application layer
C. access layer
D. session layer
E. network layer

Correct Answer: E
Section: IP Addressing / VLSM
Explanation

Explanation/Reference:

QUESTION 46
Which statement is correct regarding the operation of DHCP?

A. A DHCP client uses a ping to detect address conficts.


B. A DHCP server uses a gratuitous ARP to detect DHCP clients.
C. A DHCP client uses a gratuitous ARP to detect a DHCP server.
D. If an address conflict is detected, the address is removed from the pool and an administrator must
resolve the conflict.
E. If an address conflict is detected, the address is removed from the pool for an amount of time
configurable by the administrator.
F. If an address conflict is detected, the address is removed from the pool and will not be reused until the
server is rebooted.

Correct Answer: D
Section: TCP/IP
Explanation

Explanation/Reference:

QUESTION 47
How does using the service password-encryption command on a router provide additional security?

A. by encrypting all passwords passing through the router.


B. by encrypting passwords in the plain text configuration file.
C. by requiring entry of encrypted passwords for access to the device.
D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges.
E. by automatically suggesting encrypted passwords for use in configuring the router.

Correct Answer: B
Section: Managing Cisco IOS
Explanation

Ahmed Tawfik
Explanation/Reference:

QUESTION 48
Refer to the exhibit. A new subnet with 60 hosts has been added to the network.
Which subnet address should this network use to provide enough usable addresses while wasting the
fewest addresses?

A. 192.168.1.56/27
B. 192.168.1.64/26
C. 192.168.1.64/27
D. 192.168.1.56/26

Correct Answer: B
Section: IP Addressing / VLSM
Explanation

Explanation/Reference:

QUESTION 49
Refer to the exhibit.
All of the routers in the network are configured with the ip subnet-zero command.
Which network addresses should be used for Link A and Network A? (Choose two.)

A. Network A - 172.16.3.48/26
B. Network A - 172.16.3.128/25
C. Network A - 172.16.3.192/26
D. Link A - 172.16.3.0/30
E. Link A - 172.16.3.40/30
F. Link A - 172.16.3.112/30

Ahmed Tawfik
Correct Answer: BD
Section: IP Addressing / VLSM
Explanation

Explanation/Reference:

QUESTION 50
A network administrator needs to allow only one Telnet connection to a router.
For anyone viewing the configuration and issuing the show run command, the password for Telnet access
should be encrypted.
Which set of commands will accomplish this task?

A. service password-encryption
access-listl permit 192.168.1.0.0.0.0.255
line vty0 4
login
password cisco
access-class 1
B. enable password secret
line vty0
login
password cisco
C. service password-encryption
line vty1
login
password cisco
D. service password-encryption
line vty0 4
login
password cisco

Correct Answer: C
Section: Managing Cisco IOS
Explanation

Explanation/Reference:

QUESTION 51
What is the effect of using the service password-encryption command?

A. Only the enable password will be encrypted.


B. It will encrypt all current and future passwords.
C. It will encrypt the secret password and remove the enable secret password from the configuration.
D. Only the enable secret password will be encrypted.
E. Only passwords configured after the command has been entered will be encrypted.

Correct Answer: B
Section: Managing Cisco IOS
Explanation

Explanation/Reference:

QUESTION 52

Ahmed Tawfik
Refer to the exhibit. What is the effect of the configuration that is shown?

A. It tells the router or switch to try establish an SSH connection first and if that fail to use telnet.
B. It configures a Cisco network device to use the SSH protocol on incoming communications via the
virtual terminal ports.
C. It allows seven failed login attempts before the VTY lines are temporarily shutdown.
D. It configures the virtual terminal lines with the password 030752180500.
E. It configures SSH globally for all logins.

Correct Answer: B
Section: Managing Cisco IOS
Explanation

Explanation/Reference:

QUESTION 53
Refer to the exhibit.

What is the reason that the interface status is "administratively down, line protocol down"?

A. There is no encapsulation type configured.


B. There is a mismatch in encapsulation types.
C. The interface is not receiving any keepalives.
D. The interface has been configured with the shutdown command.
E. The interface needs to be configured as a DTE device.
F. The wrong type of cable is connected to the interface.

Correct Answer: D
Section: Introduction to Cisco IOS
Explanation

Explanation/Reference:

QUESTION 54
What is the first 24 bits in a MAC address called?

A. NIC
B. BIA
C. OUI
D. VAI

Correct Answer: C
Section: Introduction

Ahmed Tawfik
Explanation

Explanation/Reference:

QUESTION 55
Refer to the exhibit. Which subnet mask will place all hosts on Network B in the same subnet with the least
amount of wasted addresses?

A. 255.255.255.0
B. 255.255.254.0
C. 255.255.252.0
D. 255.255.248.0

Correct Answer: B
Section: IP Addressing / VLSM
Explanation

Explanation/Reference:

QUESTION 56
Refer to the exhibit. What is the most appropriate summarization for these routes?

A. 10.0.0.0 /21
B. 10.0.0.0 /22
C. 10.0.0.0 /23
D. 10.0.0.0 /24

Correct Answer: B
Section: IP Addressing / VLSM
Explanation

Explanation/Reference:

QUESTION 57
Which command enables IPv6 forwarding on a Cisco router?

A. ipv6 local
B. ipv6 host
C. ipv6 unicast-routing
D. ipv6 neighbor

Ahmed Tawfik
Correct Answer: C
Section: Managing Cisco IOS
Explanation

Explanation/Reference:

QUESTION 58
Which command encrypts all plaintext passwords?

A. Router# service password-encryption


B. Router(config)# service password-encryption
C. Router(config)# password-encryption
D. Router# password-encryption

Correct Answer: B
Section: Managing Cisco IOS
Explanation

Explanation/Reference:

QUESTION 59
Given an IP address 172.16.28.252 with a subnet mask of 255.255.240.0, what is the correct network
address?

A. 172.16.16.0
B. 172.16.24.0
C. 172.16.0.0
D. 172.16.28.0

Correct Answer: A
Section: IP Addressing / VLSM
Explanation

Explanation/Reference:

QUESTION 60
You are working in a data center environment and are assigned the address range 10.188.31.0/23.
You are asked to develop an IP addressing plan to allow the maximum number of subnets with as many as
30 hosts each.
Which IP address range meets these requirements?

A. 10.188.31.0/27
B. 10.188.31.0/26
C. 10.188.31.0/29
D. 10.188.31.0/28
E. 10.188.31.0/25

Correct Answer: A
Section: IP Addressing / VLSM
Explanation

Explanation/Reference:

QUESTION 61
The network administrator needs to address seven LANs. RIP version 1 is the only routing protocol in use

Ahmed Tawfik
on the network and subnet 0 is not being used. What is the maximum number of usable IP addresses that
can be supported on each LAN if the organization is using one class C address block?

A. 8
B. 6
C. 30
D. 32
E. 14
F. 16

Correct Answer: C
Section: IP Addressing / VLSM
Explanation

Explanation/Reference:

QUESTION 62
What is a global command?

A. a command that is set once and affects the entire router.


B. a command that is implemented in all foreign and domestic IOS versions.
C. a command that is universal in application and supports all protocols.
D. a command that is available in every release of IOS, regardless of the version or deployment status.
E. a command that can be entered in any configuration mode.

Correct Answer: A
Section: Introduction to Cisco IOS
Explanation

Explanation/Reference:

QUESTION 63

Which will fix the issue and allow ONLY ping to work while keeping telnet disabled?

Exhibit:

Ahmed Tawfik
Ahmed Tawfik
A. Correctly assign an IP address to interface fa0/1.
B. Change the ip access-group command on fa0/0 from "in* to "our.
C. Remove access-group 106 in from interface fa0/0 and add access-group 115 in.
D. Remove access-group 102 out from interface s0/0/0 and add access-group 114 in
E. Remove access-group 106 in from interface fa0/0 and add access-group 104 in.

Correct Answer: E
Section: Managing Cisco IOS
Explanation

Explanation/Reference:
Explanation: Let's have a look at the access list 104:

The question does not ask about ftp traffic so we don't care about the two first lines. The 3rd line denies all
telnet traffic and the 4th line allows icmp traffic to be sent (ping). Remember that the access list 104 is
applied on the inbound direction so the 5th line "access-list 104 deny icmp any any echo-reply" will not
affect our icmp traffic because the "echo-reply" message will be sent over the outbound direction.

QUESTION 64
What would be the effect of issuing the command ip access-group 114 in to the fa0/0 interface?

Exhibit:

Ahmed Tawfik
Ahmed Tawfik
A. Attempts to telnet to the router would fail.
B. It would allow all traffic from the 10.4.4.0 network.
C. IP traffic would be passed through the interface but TCP and UDP traffic would not.
D. Routing protocol updates for the 10.4.4.0 network would not be accepted from the fa0/0 interface.

Correct Answer: B
Section: Managing Cisco IOS
Explanation

Explanation/Reference:
Explanation: From the output of access-list 114: access-list 114 permit ip 10.4.4.0 0.0.0.255 any we can
easily understand that this access list allows all traffic (ip) from 10.4.4.0/24 network

QUESTION 65
Before installing a new, upgraded version of the IOS, what should be checked on the router, and which
command should be used to gather this information? (Choose two.)

A. the amount of available ROM.


B. the amount of available flash and RAM memory.
C. the version of the bootstrap software present on the router.
D. show version
E. show processes
F. show running-config

Correct Answer: BD
Section: Managing Cisco IOS
Explanation

Explanation/Reference:

QUESTION 66
Which two locations can be configured as a source for the IOS image in the boot system command?
(Choose two.)

A. RAM
B. NVRAM
C. flash memory
D. HTTP server
E. TFTP server
F. Telnet server

Correct Answer: CE
Section: Managing Cisco IOS
Explanation

Explanation/Reference:

QUESTION 67
A network administrator changes the configuration register to 0x2142 and reboots the router. What are two
results of making this change? (Choose two.)

A. The IOS image will be ignored.


B. The router will prompt to enter initial configuration mode.
C. The router will boot to ROM.
D. Any configuration entries in NVRAM will be ignored.

Ahmed Tawfik
E. The configuration in flash memory will be booted.

Correct Answer: BD
Section: Managing Cisco IOS
Explanation

Explanation/Reference:

QUESTION 68
Refer to the exhibit. The networks connected to router R2 have been summarized as a 192.168.176.0/21
route and sent to R1. Which two packet destination addresses will R1 forward to R2? (Choose two.)

A. 192.168.194.160
B. 192.168.183.41
C. 192.168.159.2
D. 192.168.183.255
E. 192.168.179.4
F. 192.168.184.45

Correct Answer: BE
Section: IP Addressing / VLSM
Explanation

Explanation/Reference:

QUESTION 69
List 3 components of SNMP ?

A. MIB
B. NMS (Manager)
C. Agent
D. SET

Correct Answer: ABC


Section: Managing Cisco IOS
Explanation

Explanation/Reference:

Ahmed Tawfik

You might also like