ccna 4

16
FINAL EXAM FAHRURROZI CCNA 4 V4 rozyadventure.blogspot.com 1 Refer to the exhibit. The routers are configured with RIPv2 with default configurations. When attempting to communicate with other networks, hosts from 172.16.2.0/24 are experiencing connectivity issues. What could be done to resolve this issue? Change to a public IP address scheme. Disable automatic route summarization. Change the IP network address on R3 Fa0/0 to 172.16.1.128 /26. Change the subnet mask on the link between R2 and R3 to 255.255.255.0. 2 Refer to the exhibit. What will be the result of entering the commands as shown in the exhibit? RIPng will not be enabled on interface fa0/0 because the network address is a broadcast address. RIPng will not be enabled on this interface because the IPv6 address is only /64 bits long. RIPng will be enabled on interface fa0/0 and will advertise the configured network. The IPv6 interface configuration requires a network statement for the network. The IPv6 routing instance must be called RTA not RT0. 3 Which two technologies can provide data integrity in a VPN connection? (Choose two.) ESP DES MD5 DH1 SHA-1 4 Which protocol is enabled by default to dynamically discover and eliminate Layer 2 loops that are created by redundant links between switches? CDP DTP STMIK Widya Pratama Pekalongan@2015

Upload: fahrurrozi-pru-syariah

Post on 13-Sep-2015

220 views

Category:

Documents


4 download

DESCRIPTION

Jaringan Komputer 4

TRANSCRIPT

FINAL EXAMFAHRURROZICCNA 4 V4rozyadventure.blogspot.com1Top of Form

Refer to the exhibit. The routers are configured with RIPv2 with default configurations. When attempting to communicate with other networks, hosts from 172.16.2.0/24 are experiencing connectivity issues. What could be done to resolve this issue?

Change to a public IP address scheme.

Disable automatic route summarization.

Change the IP network address on R3 Fa0/0 to 172.16.1.128 /26.

Change the subnet mask on the link between R2 and R3 to 255.255.255.0.

Bottom of Form

2Top of Form

Refer to the exhibit. What will be the result of entering the commands as shown in the exhibit?

RIPng will not be enabled on interface fa0/0 because the network address is a broadcast address.

RIPng will not be enabled on this interface because the IPv6 address is only /64 bits long.

RIPng will be enabled on interface fa0/0 and will advertise the configured network.

The IPv6 interface configuration requires a network statement for the network.

The IPv6 routing instance must be called RTA not RT0.

Bottom of Form

3Top of FormWhich two technologies can provide data integrity in a VPN connection? (Choose two.)

ESP

DES

MD5

DH1

SHA-1

Bottom of Form

4Top of FormWhich protocol is enabled by default to dynamically discover and eliminate Layer 2 loops that are created by redundant links between switches?

CDP

DTP

STP

VTP

Bottom of Form

5Top of FormWhat is used locally by a router to identify each Frame Relay PVC?

LMI

DLCI

IP address

MAC address

Bottom of Form

6Top of FormA company decides to deploy a virtual private network (VPN) to connect remote workers and branch offices to corporate headquarters. What is the best description of the type of connectivity the company is ready to implement?

a VPN that uses LANs to connect remote sites or users

a VPN that uses a public network to connect remote sites or users

a VPN that uses a wireless LAN over the Internet to connect remote sites or users

a VPN that uses a dedicated connections, such as leased lines, to connect remote sites or users

Bottom of Form

7Top of FormIn the Cisco Enterprise Architecture, which module would include web and e-commerce servers for access by users external to the organization?

campus core

enterprise edge

enterprise branch

enterprise campus

Bottom of Form

8Top of FormWhat is one advantage of a full mesh topology at the core layer of the enterprise network compared with a partial mesh topology?

It adds scalability to the corporate network.

It provides fully redundant links to connecting modules.

It lowers the impact and risk of DoS attacks from the Internet.

It increases the manageability of the network devices in the core layer.

Bottom of Form

9Top of FormWhich command can be used to load a new Cisco IOS image on a router?

copy startup-config tftp:

copy tftp: startup-config

copy running-config tftp:

copy tftp: flash:

copy flash: tftp:

copy flash: startup-config

Bottom of Form

10Top of FormWhat functionality does NBAR provide to network technicians?

provides data which can be used to create a network diagram

allows for monitoring and managing network devices

allows for classification and monitoring of network traffic

displays the IOS versions and IP addresses on neighboring devices

Bottom of Form

11Top of FormA company has help desk staff that is not highly trained in VPNs. What two features or technologies must the network designer identify as training needs in order for the help desk to support secure remote access for teleworkers? (Choose two.)

QoS operation

VLAN configuration

tunneling protocols

IPv6 and IPv4 dual stack

encryption algorithms

Frame Relay configuration

Bottom of Form

12Top of Form

Refer to the exhibit. What three actions will R1 take after receiving a frame from host H1 which is destined for host H2? (Choose three.)

The data frames will be forwarded out interface FastEthernet 0/1 of R1.

No data frames will be forwarded out of either FastEthernet interface of R1.

Router R1 will replace the destination IP address of the packets with the IP address of host H2.

Router R1 will place the MAC address of host H2 in the destination MAC address of the frames.

Router R1 will place the MAC address of the forwarding FastEthernet interface in the place of the source MAC address.

Router R1 will place the IP address of the forwarding FastEthernet interface in the place of the source IP address in the packets.

Bottom of Form

13Top of FormWhich statement describes the use of a network baseline?

It creates a high level logical network diagram.

It provides a point of reference for future network evaluations.

It allows precise identification of the original location of network equipment.

It should be established as soon as a problem is detected on the network.

Bottom of Form

14Top of Form

Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of an access layer switch and connects three PCs. The engineer attempts to ping from each PC to the other connected PCs to test the configuration. Which statement describes the result of the last step?

Host 1 can ping Host 2.

Host 1 can ping Host 3.

Host 2 can ping Host 3.

No hosts can ping any other host.

Bottom of Form

15Top of Form

Refer to the exhibit. Which username and password combination will correctly configure PPP authentication on routers RTR_A and RTR_B?

Bottom of Form

16Top of FormDuring a review of the proposed bill of materials, an account manager of the network solution company realizes that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than was originally specified by the network designer. When questioned, the systems engineer responds that the switches specified by the designer cannot be purchased within the budget limitations of the customer. Which action should the account manager take?

Inform the customer that the project budget must be increased.

Inform the customer that the project cannot be completed given the unreasonable budget constraints.

Communicate any risks that are associated with the equipment substitution and obtain customer approval to proceed.

Because the customer is probably aware that the budget limitations will require lower cost, less capable equipment, the account manager should do nothing.

Bottom of Form

17Top of FormWhat will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?

STP

VTP

RSTP

BPDU

port security

Bottom of Form

18Top of FormWhat level of service is specified by the CIR from a Frame Relay service provider?

the minimum available clock rate

the number of available virtual circuits

the maximum average data transfer rate

the minimum amount of bandwidth available

Bottom of Form

19Top of FormWhich is a valid representation of the IPv6 address 4110:00b9:0000:0000:0303:0000:11fa:771a?

4110:b9::303:11fa:771a

4110:00b9:3:3::11fa:771a

4110:00b9::303::11fa:771a

4110:b9::303:0:11fa:771a

Bottom of Form

20Top of Form

Refer to the exhibit. EIGRP is correctly configured on router Remote and router HQ. A network technician is configuring a backup route on router Remote to network 198.133.219.32 via router Branch. Which configuration option will successfully create the backup route?

Remote(config)# ip route 198.133.219.32 255.255.255.224 198.133.219.9

Remote(config)# ip route 198.133.219.32 255.255.255.224 198.133.219.9 85

Remote(config)# ip route 198.133.219.32 255.255.255.224 198.133.219.9 90

Remote(config)# ip route 198.133.219.32 255.255.255.224 198.133.219.9 100

Bottom of Form

21Top of Form

Refer to the exhibit. What can be concluded from the output that is shown?

MDF_R1 has a MAC address of 2294:300F:0000.

MDF_R1 is connected through FastEthernet0/1 to C2960-24TT-L_IDF1.

Device C2960-24TT-L_IDF1 is running Cisco IOS Software Release 12.2(25)SEE2.

MDF_R1 is installed in the main distribution facility on floor 24 of building L.

Bottom of Form

22Top of FormWhat is a signaling standard that is used for managing and maintaining the connection between a CPE router and the service provider Frame Relay switch?

ARP

CIR

DLCI

Inverse ARP

LMI

Bottom of Form

23Top of Form

Refer to the exhibit. An administrator installs a WIC-2T module into a Cisco 1841 router. Attempts to configure the S0/0/0 interface are unsuccessful. As a first step in troubleshooting the failure, the administrator issues the show version command. What is a possible reason for the failure?

The WIC was not physically installed properly.

The WIC was installed into slot 1 instead of slot 0.

The interface type and number are invalid on an 1841.

The configuration register is the wrong value for adding new modules.

Bottom of Form

24Top of FormWhich two processes allow a smooth transition from IPv4 to IPv6? (Choose two.)

IPSec

tunneling

dual stack

authentication

anycast addressing

header simplification

Bottom of Form

25Top of Form

Refer to the exhibit. Which type of application communication model best describes this network?

client-client

client-server farm

client-enterprise edge

client-enterprise server

Bottom of Form

26Top of Form

Refer to the exhibit. Based on the EIGRP configuration that is shown, what can the field engineer conclude about the EIGRP authentication between RouterA and RouterB?

Authentication will fail because only one key is configured.

Authentication will fail because the key chain names do not match.

Authentication will succeed and EIGRP updates can be exchanged.

Authentication will fail because the key chain names must match the router names.

Bottom of Form

27Top of FormWhat type of Frame Relay subinterface must be used to connect remote sites without having to disable split horizon?

multipoint

multiaccess

point-to-point

nonbroadcast multiaccess

Bottom of Form

28Top of FormA large company plans to add several servers and requires that the servers be reachable directly from the Internet. Which action will help the company accomplish this goal?

Assign to each server a static internal IP address that is mapped statically to a public IP address.

Place all servers in their own Class C private subnet.

Provide a private address to each server using DHCP.

Assign addresses from a pool of public Class B addresses using DHCP.

Bottom of Form

29Top of FormA NetworkingCompany engineer is on a support call resolving technical problems for a client network. After the issue is resolved, the engineer also provides a training session for the network support staff. What role is the engineer filling on the networking company team?

post-sales field engineer

pre-sales engineer

network designer

account manager

Bottom of Form

30Top of FormA network administrator is given a network address of 192.168.1.64/26 to create four subnets with seven hosts in each subnet. Which subnet mask should be used?

255.255.255.224

255.255.255.240

255.255.255.248

255.255.255.252

Bottom of Form

31Top of FormWhat makes the Cisco EasyVPN application a useful tool for VPN implementation?

It provides encryption algorithms unavailable in other systems.

It ensures that remote workers actually use the VPN for connectivity.

It simplifies the configuration tasks for the device that is used as the VPN server.

It allows a greater variety of network devices to be used for VPN connections.

Bottom of Form

32Top of FormA network administrator is integrating IPv6 into an IPv4 network by encapsulating one protocol packet within another protocol. Which transition method is being used?

dual stack

tunneling

proxying and translation

NAT with Protocol Translator

Bottom of Form

33Top of FormWhat should be considered in the design of a wireless LAN on a corporate campus?

the vendor of all employee wireless NICs

the cables that are used for LAN connectivity

the number of wireless NICs required on enterprise servers

the messaging features that are used on employee cell phones

the location of the concrete pillars and walls between the offices

Bottom of Form

34Top of FormWhat is a characteristic of FTP traffic flows?

low-volume traffic

predictable bandwidth usage

large packet sizes for transfers

low throughput with high response-time requirements

Bottom of Form

35Top of FormWhich technology will prioritize traffic based upon the technical requirements of IP telephony?

PoE

QoS

RPC

RTP

VPN

Bottom of Form

36Top of FormAs part of network monitoring, a network administrator receives an alert that the CPU usage of the core router reaches 90% several times a day. Which protocol is in use to monitor the network performance?

DNS

SNMP

SMTP

DHCP

TFTP

Bottom of Form

37Top of FormWhen implementing an IP telephony solution, why should VLANs be used?

to allow the use of a single IP gateway

to separate voice from data traffic for ease of prioritization

to allow the PBX to use VLAN IDs to filter both voice and data traffic

to allow connectivity between traditional phone devices and IP-based telephony devices

Bottom of Form

38Top of FormIf traditional phones are used when introducing VoIP to a network, what component would be required to convert the analog voice from traditional telephone signals into IP packets?

Multipoint control unit

Power over Ethernet switches

a router that acts as a voice gateway

Cisco Unified Communications Manager

Bottom of Form

39Top of FormA network administrator of a middle-sized company is asked to upgrade the routing protocol of the network to support VLSM and route summarization. The current company network contains both Cisco and non-Cisco routers. Which routing protocol should be used for the upgrade?

BGP

RIPv1

RIPv2

EIGRP

Bottom of Form

40Top of Form

Refer to the exhibit. A new host needs to be connected to the switch and be assigned to VLAN 2. Router RA is attached to the switch via a trunk and is configured as shown. What IP address should be assigned to this new host?

192.168.1.1 /26

192.168.1.22 /28

192.168.1.32 /28

192.168.1.44 /28

192.168.1.47 /28

192.168.1.55 /28

Bottom of Form

41Top of FormOn a Monday morning the help desk at a large company receives an unusually high number of calls reporting no connectivity to the Internet or to any other network resources. Otherwise the PCs are functioning normally. Help desk technicians note that all the calls are from a single department, and all affected users are on the same floor of a single building. Where should the help desk technicians suspect that the problem lies?

workgroup switch

PC power supplies

patch cords from PCs to network jacks

cabling from the network jack to the wiring closet

Bottom of Form

42Top of Form

Refer to the exhibit. An extended ACL has been created to deny traffic from the 192.168.35.0/24 network to the web server with IP address 209.165.201.15. According to Cisco best practices, where should the ACL be applied?

RTB Fa0/0 inbound

RTC S0/0/1 inbound

RTD Fa0/0 outbound

RTC S0/1/0 outbound

Bottom of Form

43Top of Form

Refer to the exhibit. A networking company designer is reviewing a diagram of a customer network. What are the two problems that need to be resolved in the topology that is shown? (Choose two.)

The firewall router and ISP connection represent a single point of failure.

If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable.

A power supply failure of the server block switch will cause the entire IP telephony system to fail.

Using Layer 3 switches to interconnect the server block servers to the IP phones introduces too much delay.

The IP phones need to be redundantly connected to the switches to prevent single points of failure at the access layer.

Bottom of Form

44Top of Form

Refer to the exhibit. What problem is associated with the the addressing scheme of the network?

The WAN links need IP addresses from a different major network.

The R1 LAN is incorrect because subnet zero cannot be used with VLSM.

The WAN link IP address that connects R1 to R3 has an incorrect mask.

The R1 to R3 and R1 to R2 WAN links have IP addresses that overlap.

The WAN IP address that connects R1 to R2 overlaps with the R3 LAN IP addresses.

Bottom of Form

45Top of FormWhat are the primary design goals for the core Layer?

to provide centralized server farm and VoIP services

to provide dynamic routing services, filtering, and traffic flow management

to provide 100% uptime, maximization of throughput, and facilitation of network growth

to provide static routing, wireless access points for the network, and security for the edge devices

Bottom of Form

46Top of FormDuring prototype testing, the network designer performs a test to determine the ability of the network to recover from a link or device failure. Which design goal is validated if the test is a success?

scalability

manageability

availability

security

Bottom of Form

47Top of FormA network technician needs to install a four-port switch module in an operational Cisco 1841 router that has an available HWIC slot. What should the technician do first?

Turn off the power to the router before installing the new module.

Install the hot-swappable four-port switch module directly into slot 1 of the 1841.

Move the existing WIC-2T module to slot 1 and install the four-port module in slot 0.

Shut down all Fast Ethernet ports on the router until the switch module installation is complete.

Bottom of Form

48Top of FormWhat feature of EIGRP should be considered when selecting a routing protocol?

EIGRP cannot secure routing updates.

It does not scale well for large networks.

It is designed for WAN connections only.

It can only be configured on Cisco devices.

Bottom of Form

49Top of FormWhich two pieces of information should a network administrator have before starting an IOS transfer via TFTP? (Choose two.)

IP address of the TFTP server

name of the IOS image on the router

operating system of the TFTP server

name of the configuration file in NVRAM

name of the IOS image on the TFTP server

encapsulation of the router interface that is connected to the TFTP server

Bottom of Form

50Top of FormWhich two Frame Relay header bits are used to indicate possible virtual circuit congestion? (Choose two.)

BECN

C/R

DE

DLCI

FECN

Bottom of Form

STMIK Widya Pratama Pekalongan@2015