for full set of questions please visit: ... · traceroute,telnet,ssh,arp, ipconfig), show debug...

130
640-822 Certkiller Questions and Answers Number : 640-822 Passing Score : 825 Time Limit : 120 min File Version : 16.8 http://www.gratisexam.com/ For Full Set of Questions please visit: http://www.certkiller.com/exam-640-822.htm 640-822 Questions and Answers Exam Name: Cisco Interconnecting Cisco Networking Devices Part 1

Upload: others

Post on 22-Mar-2020

12 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

640-822 Certkiller Questions and Answers

Number: 640-822Passing Score: 825Time Limit: 120 minFile Version: 16.8

http://www.gratisexam.com/

For Full Set of Questions please visit: http://www.certkiller.com/exam-640-822.htm

640-822 Questions and Answers

Exam Name: Cisco Interconnecting Cisco Networking Devices Part 1

Page 2: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Certkiller

QUESTION 1Exam Description and Topics

Exam Description

The 640-822 Interconnecting Cisco Networking Devices Part 1 (ICND1) is the exam associated with the CiscoCertified Entry Network Technician certification and a tangible first step in achieving the Cisco Certified NetworkAssociate certification. Candidates can prepare for this exam by taking the Interconnecting Cisco NetworkingDevices Part 1 (ICND1) v1.0 course. This exam tests a candidate's knowledge and skills required tosuccessfully install, operate, and troubleshoot a small branch office network. The exam includes topics onnetworking fundamentals; connecting to a WAN; basic security and wireless concepts; routing and switchingfundamentals; the TCP/IP and OSI models; IP addressing; WAN technologies; operating and configuring IOSdevices; configuring RIPv2, static and default routing; implementing NAT and DHCP; and configuring simplenetworks.

Exam Topics

The following topics are general guidelines for the content likely to be included on the Interconnecting CiscoNetworking Devices Part 1 exam. However, other related topics may also appear on any specific delivery of theexam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below maychange at any time without notice.

Topic 1 - Describe the operation of data networks. (59Questions) Describe the purpose and functions of various network devices Select the components required to meet a givennetwork specification Use the OSI and TCP/IP models and their associated protocols to explain how data flowsin a network Describe common networking applications including web applications Describe the purpose andbasic operation of the protocols in the OSI and TCP models Describe the impact of applications (Voice Over IPand Video Over IP) on a network Interpret network diagramsDetermine the path between two hosts across a networkDescribe the components required for network and Internet communications Identify and correct commonnetwork problems at layers 1, 2, 3 and 7 using a layered model approach Differentiate between LAN/WANoperation and features

Topic 2- Implement a small switched network. (13 Questions) Select the appropriate media, cables, ports, and connectors to connect switches to other network devices andhostsExplain the technology and media access control method for Ethernet technologies Explain networksegmentation and basic traffic management concepts Explain the operation of Cisco switches and basicswitching concepts Perform, save and verify initial switch configuration tasks including remote accessmanagement Verify network status and switch operation using basic utilities (including: ping,traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for aswitch (port security, deactivate ports) Identify, prescribe, and resolve common switched network media issues,configuration issues, autonegotiation, and switch hardware failures

Topic 3- Implement an IP addressing scheme and IP services to meet network requirements for a small branchoffice.(36 Questions)Describe the need and role of addressing in a network " Create and apply an addressing scheme to a networkAssign and verify valid IP addresses to hosts, servers, and networking devices in a LAN environment Explainthe basic uses and operation of NAT in a small network connecting to one ISP Describe and verify DNSoperationDescribe the operation and benefits of using private and public IP addressing Enable NAT for a small networkwith a single ISP and connection using SDM and verify operation using CLI and pingConfigure, verify and troubleshoot DHCP and DNS operation on a router.(including: CLI/SDM) Implement staticand dynamic addressing services for hosts in a LAN environment Identify and correct IP addressing issues

Topic 4 - Implement a small routed network. (47 Questions) Describe basic routing concepts (including: packet forwarding, router lookup process) Describe the operation ofCisco routers (including: router bootup process, POST, router components) Select the appropriate media,

Page 3: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

cables, ports, and connectors to connect routers to other network devices and hostsConfigure, verify, and troubleshoot RIPv2Access and utilize the router CLI to set basic parameters Connect, configure, and verify operation status of adevice interface Verify device configuration and network connectivity using ping, traceroute, telnet, SSH orother utilitiesPerform and verify routing configuration tasks for a static or default route given specific routing requirementsManage IOS configuration files (including: save, edit, upgrade, restore) Manage Cisco IOSImplement password and physical securityVerify network status and router operation using basic utilities (including: ping, traceroute,telnet,SSH,arp,ipconfig), SHOW DEBUG commands

Topic 5 - Explain and select the appropriate administrative tasks required for a WLAN. (10 Questions)Describe standards associated with wireless media (including: IEEE WI-FI Alliance, ITU/FCC) Identify anddescribe the purpose of the components in a small wireless network. (including: SSID, BSS, ESS)Identify the basic parameters to configure on a wireless network to ensure that devices connect to the correctaccess pointCompare and contrast wireless security features and capabilities of WPA security (including: open, WEP,WPA-1/2)Identify common issues with implementing wireless networks

Topic 6 - Identify security threats to a network and describe general methods to mitigate those threats. (8Questions)Explain today's increasing network security threats and the need to implement a comprehensive security policyto mitigate the threatsExplain general methods to mitigate common security threats to network devices, hosts, and applicationsDescribe the functions of common security appliances and applications Describe security recommendedpractices including initial steps to secure network devices

Topic 7 - Implement and verify WAN links. (12 Questions)Describe different methods for connecting to a WANConfigure and verify a basic WAN serial connection

A.B.C.D.

Correct Answer: Section: (none)Explanation

Explanation/Reference:

QUESTION 2You are a network technician at P4S. Study the exhibit above carefully, as the first step in verifying a local hostconfiguration, you perform the ipconfig/all command on a computer.Answer the following questions by using the results of the command. For the following descriptions, which oneis correct concerning how the router with the IP address 172.16.236.1 would send a data packet to thiscomputer?

Page 4: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. The router encapsulates the packet in a frame addressed to the MAC address of the next hop router on thepath to the computer.

B. The router uses an ARP request to obtain the correct MAC address for the computer. It then encapsulatesthe packet in a frame addressed to the MAC address 00-0D-60-FD-F0-34.

C. The router works at Layer3 of the OSI model and does not use Layer2 MAC addresses to send packets tothe destination computer.

D. The router encapsulates the packet in a frame addressed to the MAC address FF-FF-FF-FF-FF-FF andsends it out the interface connected to the 172.16.236.0 network.

Correct Answer: BSection: (none)Explanation

QUESTION 3The IP address of a host computer is 192.168.43.139 and its netmask is 255.255.255.240. Then, this hostresides on which logical IP network?

A. 192.168.43.0/28B. 192.168.43.64/28C. 192.168.43.112/28D. 192.168.43.128/28

Correct Answer: DSection: (none)Explanation

QUESTION 4For the following protocols, which one uses both TCP and UDP ports?

A. SMTP

Page 5: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

B. TelnetC. FTPD. DNS

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

http://www.gratisexam.com/

QUESTION 5For the following IP addresses, which one is a private address?

A. 12.0.0.1B. 168.172.19.39C. 172.20.14.36D. 172.33.194.30

Correct Answer: CSection: (none)Explanation

QUESTION 6You are a network administrator for the P4Spany. You use a subnet mask of 255.255.255.192 to subnet the172.16.0.0 network. A duplicate IP address of 172.16.2.120 has accidentallybeen configured on a workstation in the network. You need to assign this workstation a new IP address withinthat same subnetwork. Which address should be assigned to the workstation?

A. 172.16.2.64B. 172.16.2.80C. 172.16.1.80D. 172.16.1.64

Correct Answer: BSection: (none)Explanation

QUESTION 7In the configuration of NAT, what does the "Inside Global" address stand for?

A. the MAC address of the router used by inside hosts to connect to the InternetB. a globally unique, private IP address assigned to a host on the inside networkC. the summarized address for all of the internal subnetted addressesD. a registered address that represents an inside host to an outside network

Page 6: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Correct Answer: DSection: (none)Explanation

QUESTION 8Refer to the following commands, which is the correct order to configure an IP address on a serial interface.(Not all options are used.)1. P4S-Hub#interface s0/02. P4S-Hub#(config)#interface s0/03. P4S-Hub#(config-if)#no shutdown4. P4S-Hub#(config)#ip address 172.16.20.21 255.255.255.05. P4S-Hub#(config-if)#ip address 10.8.5.255 255.255.252.06. P4S-Hub#(config-if)#enable interface7. P4S-Hub#(config-if)#ip address 198.18.2.63 255.255.255.2248. P4S-Hub#(config-if)#description T1 to WAN9. P4S-Hub#(config)#banner motd ! T1 to WAN !10.P4S-Hub#configure terminal

I. enable the interfaceII. label the interfaceIII. enter global configuration modeIV. enter interface configuration mode

A. I-3,II-8,III-10,IV-2,V-5B. I-3,II-8,III-10,IV-1,V-6C. I-3,II-9,III-10,IV-2,V-5D. I-3,II-9,III-10,IV-1,V-5

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 9Which value will be displayed in Box 1 of the ipconfig output of host A according to the exhibit below?

Page 7: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. 172.18.14.6B. 192.168.1.10C. 172.18.14.5D. 192.168.1.254

Correct Answer: DSection: (none)Explanation

QUESTION 10Tom works as a network administrator for the P4Spany.Study the exhibit carefully. Your company has recently installed a new router in the Orlando office and hasestablished aconsole connection with the new router. You can't backup the configuration file and IOS to a TFTP serverlocated in the Houston office. Which is the most likely cause of this problem?

Page 8: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. The Orlando router has an incorrect subnet mask.B. The TFTP server has an incorrect IP address.C. The TFTP server has an incorrect subnet mask.D. The network administrator computer has an incorrect IP address.

Correct Answer: CSection: (none)Explanation

QUESTION 11The internetwork displayed in the diagram is experiencing network connectivity problems. Which is the mostlikely cause of this problem?

Page 9: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. The IP address of Server 1 is in the wrong subnet.B. The cabling connecting host A to P4S-S3 is too long.C. The address of host B is a broadcast address.D. The cable connecting P4S-S2 and P4S-S3 should be a crossover.

Correct Answer: DSection: (none)Explanation

QUESTION 12Look at the following exhibit. You are a network administrator for certways. You have allocated the IP addressspace of 128.107.7.0/24 for all devices on this network. All devices should use thesame subnet mask and all subnets are usable. A subnet mask is required to apply the allocated address spaceto the configuration. Which is it?

Page 10: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. 255.255.254.0B. 255.255.255.0C. 255.255.255.192D. 255.255.255.128

Correct Answer: CSection: (none)Explanation

QUESTION 13Assuming a subnet mask of 255.255.248.0, three of the following addresses are valid host addresses. Whichare these addresses? (Choose three.)

A. 172.16.9.0B. 172.16.8.0C. 172.16.31.0D. 172.16.20.0

Correct Answer: ACDSection: (none)Explanation

QUESTION 14With the use of different ports, some type of NAT maps multiple private IP addresses to a single registered IPaddress. Which form is it?

A. static NATB. overloadingC. overlappingD. dynamic NAT

Page 11: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Correct Answer: BSection: (none)Explanation

QUESTION 15You are a network administrator for certways. You are required to configure a default route on a router. Whichrouter should you choose?

A. P4S-R1B. P4S-R2C. P4S-R3D. ISP router

Correct Answer: ASection: (none)Explanation

QUESTION 16All links are operational and all routers are converged. Choose from the following the one that correctlydescribes the messaging between routers.

Page 12: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. Hellos are sent every five secondsB. Broadcasts are sent every 30 secondsC. Multicasts are sent every 60 secondsD. No messaging unless the topology changes

Correct Answer: BSection: (none)Explanation

QUESTION 17Assuming that the interface from P4S-R4 connected to LAN 4 goes down, which of the following describes theroute update process?

Page 13: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. P4S-R4 tells both P4S-R1 and P4S-R3 the network not accessible. Both P4S-R3 and P4S-R1 update P4S-R2..

B. P4S-R4 tells only P4S-R3 the network is not accessible. P4S-R3 updates P4S-R2 and P4S-R2 updatesP4S-R1.

C. P4S-R4 tells only P4S-R1 the network is not accessible. P4S-R1 updates P4S-R2 and P4S-R2 updatesP4S-R3

D. No updates occur

Correct Answer: ASection: (none)Explanation

QUESTION 18In order to route incoming packets, a router take will take two actions.What are the two actions? (Choose two.)

A. Validate sources of routing information.B. Identify the source network address of each packet.C. Identify the destination network address of each packet.D. Inspect the routing table to select the best path to the destination network address.

Correct Answer: CDSection: (none)Explanation

QUESTION 19Part of the configuration of router P4S1 is shown below:Line vty 0 4password 7 030752180500logintransport input sshWhat is the effect of the configuration shown above on router P4S1?

Page 14: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. It configures the virtual terminal lines with the password 030752180500.B. It configures SSH globally for all logins.C. It tells the router or switch to try to establish an SSh connection first and if that fails to use Telnet.D. It configures a Cisco network device to use the SSH protocol on incoming communications via the virtual

terminal ports.

Correct Answer: DSection: (none)Explanation

QUESTION 20Which item is correct about the relationship between the protocol and its associated function?1.ICMP2.DHCP3.RARP4.UDP5.DNS6.ARP

A. A PC sends packets to the default gateway IP address the first since the PC turned on II.The networkadministrator is checking basic IP connectivity from a workstation on a server III.The TCP/IP protocol stackmust find an IP address for packets destined for a URL IV.A network device will automatically assign IPaddresses to workstations

B. I-6;II-1;III-4;IV-2C. I-6;II-1;III-5;IV-2D. I-6;II-3;III-5;IV-2E. I-6;II-3;III-4;IV-2

Correct Answer: BSection: (none)Explanation

QUESTION 21Which description is correct about the HDLC protocol?

A. It is the preferred protocol for LAN communication.B. HDLC is compatible between all network vendors.C. On Cisco routers it is the default encapsulation for serial interfaces.D. The Cisco implementation of HDLC does not include proprietary extensions.

Correct Answer: CSection: (none)Explanation

QUESTION 22It is reported that the hosts in the LAN are not able to connect to the Internet. To solve this problem, whichcommands should be used?

A. P4S-R(conf)#interface s0/1P4S-R(conf-if)#no shutdown

B. P4S-R(conf)#interface s0/0

Page 15: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

P4S-R(conf-if)#no shutdownC. P4S-R(conf)#interface fa0/1

P4S-R(conf-if)#no shutdownD. P4S-R(conf)#interface fa0/0

P4S-R(conf-if)#no shutdown

Correct Answer: BSection: (none)Explanation

QUESTION 23You are a network administrator for certways. The following shows part of the certways WAN:The network shown in the exhibit is running the RIP version 2. This network has converged, and the routers inthis network are functioning properly. Then, the FastEthernet0/0 interface on router certways1 goes down. Therouters in this network will respond to this change in two ways. What are them? (Choose two)

A. Because of the split-horizon rule, router certways2 will be prevented from sending erroneous information tocertways1 about connectivity to the 192.168.1.0 network.

B. Routers certways2 and certways3 mark the route as inaccessible and will not accept any further routingupdates from certways1 until their hold-down timers expire.

C. All routers will reference their topology database to determine if any backup routes to the 192.168.1.0network are known.

D. When router certways2 learns from certways1 that the link to the 192.168.1.0 network has been lost,certways2 will respond by sending a route back to certways1 with an infinite metric to the 192.168.1.0network.

Correct Answer: ADSection: (none)Explanation

QUESTION 24You are a network administrator for certways.You fail to establish connectivity between two Cisco routers. Thefollowing shows the command output of both routers. What caused the problem?

Page 16: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. Router names are incorrectly configured.B. Username/password is incorrectly configured.C. Serial ip addresses of routers are not on the same subnet.D. Authentication needs to be changed to PAP for both routers.

Correct Answer: BSection: (none)Explanation

QUESTION 25The frame has been received by the P4S-ILM router and will be delivered on the local LAN. Choose from thefollowing two statements that describe the addressing of the Ethernet frame that hasbeen created by the P4S-ILM router. (choose two)

A. The destination address will be the MAC address of the WWW server.B. The source address will be the MAC address of interface Fa0/0 of the P4S-ILM router.C. The destination address will be the MAC address of the P4S-SWA port attached to the WWW server.

Page 17: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

D. The destination address will the be the MAC address of the P4S-SWA port attached to the Fa0/0 interfaceof the P4S-ILM router.

Correct Answer: ABSection: (none)Explanation

QUESTION 26Which one of the following commands will you use to determine the type of cable attached to the Serial 0/0interface on a router?

A. show ip interfaceB. show line serial 0/0C. show running-configD. show controllers serial 0/0

Correct Answer: DSection: (none)Explanation

QUESTION 27For purposes of testing, the P4S-R1 and P4S-R2 routers are directly connected with their serial interfaces. As aadministrator, you are required to make the serial line operational. By the outputshown in the following exhibit, what must be done?

A. Start the clock on the P4S-R1.B. Replace the broken cable between the two devices.C. Change the IP address on the P4S-R2.D. Configure the serial 0/0 interface on the P4S-R2 with a clockrate.

Correct Answer: DSection: (none)

Page 18: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Explanation

QUESTION 28What do you think is the purpose of a default route?

A. It is a route to be used when the routing protocol fails.B. It is a route configured by an ISP that sends traffic into a corporate network.C. It is a route used when a packet is destined for a remote network that is not listed in the routing table.D. It is a route manually configured for a specific remote network for which a routing protocol is not configured.

Correct Answer: CSection: (none)Explanation

QUESTION 29As it is shown in the exhibit, Serial0/0 does not respond to a ping request from a host on the FastEthernet0/0LAN. To resolve this problem, what should you do?

A. Enable the Serial 0/0 interface.B. Correct the IP address for Serial 0/0.C. Correct the IP address for FastEthernet 0/0.D. Change the encapsulation type on Serial 0/0.

Correct Answer: ASection: (none)Explanation

QUESTION 30As it is shown in the following graphic, the RIP network has been fully operational for two days. Each routingtable is complete. Some of the networks will be included in the next routing updatefrom the P4S-RA to the P4S-RC. Which are these networks?

Page 19: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. A,CB. B,DC. A,B,CD. A,B,C,D

Correct Answer: CSection: (none)Explanation

QUESTION 31Which two functions will be performed by routers on packets? (Choose two.)

A. examine the Layer 3 headers of inbound packets and use that information to determine the complete pathsalong which the packets will be routed to their ultimate destinations

B. update the Layer 2 headers of outbound packets with the MAC addresses of the next hopsC. examine the Layer 3 headers of inbound packets and use that information to determine the next hops for

the packetsD. update the Layer 3 headers of outbound packets so that the packets are properly directed to their ultimate

destinations

Correct Answer: BCSection: (none)Explanation

QUESTION 32LAB

Page 20: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A.B.C.D.

Correct Answer: Section: (none)Explanation

Explanation/Reference:Answer & ExplanationCorrect Answer

Router>enableRouter#config terminalRouter(config)#hostname P4S-RCP4S-RC(config)#enable secret certways 1P4S-RC(config)#line console 0P4S-RC(config-line)#password certways2P4S-RC(config-line)#exitP4S-RC(config)#line vty 0 4P4S-RC(config-line)#password certways3P4S-RC(config-line)#loginP4S-RC(config-line)#exitP4S-RC(config)#interface fa0/0P4S-RC(config-if)#ip address 209.165.202.158 255.255.255.224 P4S-RC(config-if)#no shutdownP4S-RC(config-if)#exitP4S-RC(config)#interface s0/0/0

Page 21: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

P4S-RC(config-if)#ip address 192.0.2.30 255.255.255.240P4S-RC(config-if)#no shutdownP4S-RC(config-if)#exitP4S-RC(config)#router ripP4S-RC(config-router)#version 2P4S-RC(config-router)#network 209.165.202.128P4S-RC(config-router)#network 192.0.2.16P4S-RC(config-router)#endP4S-RC#copy run start

ExplanationsNo more information available

QUESTION 33Look at the following exhibit. Why was this message received?

A. No enable password has been set.B. No VTY password has been set.C. No console password has been set.D. No enable secret password has been set.

Correct Answer: BSection: (none)Explanation

QUESTION 34In order to reach the global configuration mode, which of the following command is used on a Cisco router?

A. P4S-R# setupB. P4S-R# configure terminalC. P4S-R# routerD. P4S-R# interface

Correct Answer: BSection: (none)Explanation

QUESTION 35The following graphic shows some common router ports. Which of the following port can be used for a WAN T1connection?

Page 22: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. BRIB. AUIC. Serial 0D. Console

Correct Answer: CSection: (none)Explanation

QUESTION 36Tom works as a network administrator .Study the exhibit carefully, Tom is resolving a connectivity problem onthe serial interfaces. It is known that the serial interface is up and line protocol isdown based on the output from the show interfaces command on both routers. Which will be the reason of thisproblem according to the partial output for the show running-config in the exhibit?

A. The serial cable is bad.B. The MTU is incorrectly configured.C. The Layer 2 framing is misconfigured.D. The IP addresses are not in the same subnet.

Correct Answer: CSection: (none)

Page 23: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Explanation

QUESTION 37Jim works as a network administrator for certways Ltd. According to the exhibit below, after configuring twointerfaces on the P4S-HQ router, Jim discovers an error message. How to fix this error?

A. The subnet mask of the serial interface should be changed to 255.255.255.0.B. The serial interface must be configured first.C. The serial interface must use the address 192.168.1.2.D. The subnet mask of the FastEthernet interface should be changed to 255.255.255.240.

Correct Answer: DSection: (none)Explanation

QUESTION 38What will happen when computers on a private network try to connect to the Internet via a Cisco router runningPAT?

A. The router uses the same IP address but a different TCP source port number for each connection.B. The router assigns a unique IP address from a pool of legally registered addresses for the duration of the

connection.C. An IP address is assigned based on the priority of the computer requesting the connection.D. The router selects an address from a pool of one-to-one address mappings held in the lookup table.

Correct Answer: ASection: (none)Explanation

QUESTION 39What source and destination information can you find in the data link layer?

A. port numberB. URLC. IP address

Page 24: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

D. MAC address

Correct Answer: DSection: (none)Explanation

QUESTION 40The global configuration mode on a Cisco router is identified by which prompt?

A. router>B. router#C. router(config)#D. router(config-if)#

Correct Answer: CSection: (none)Explanation

QUESTION 41According to the graphic below, assuming routing is correctly configured, HostA is not able to ping HostB.Which will be the most likely cause of this problem?

A. The address of P4S-SA is a subnet address.B. The Fa0/0 interface on P4S-RA is on a subnet that can't be used.C. HostA is not on the same subnet as its default gateway.D. The serial interfaces of the routers are not on the same subnet.

Page 25: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Correct Answer: DSection: (none)Explanation

QUESTION 42You are a network technician at P4S, study the exhibitcarefully. Host P4S-A has created a communication session with host P4S-B for the first time. What enabledP4S-R1 to transmitthis traffic in the correct direction to reach the network to which host P4S-B is attached?

A. TCP/IPB. a Layer 4 protocolC. DHCPD. a routing protocol

Correct Answer: DSection: (none)Explanation

QUESTION 43Which description is correct about the operational state of the FastEthernet 0/0 interface on the basis of theexhibit below?

Page 26: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. The interface is generating protocol errors.B. The interface has failed because of a media error.C. The interface is operational and currently handling traffic.D. The interface requires a no shutdown command to be issued.

Correct Answer: CSection: (none)Explanation

QUESTION 44Two certways routers are connected as shown below:certways1 configuration exhibit:certways2 configuration exhibit:Two routers named certways1 and certways2 are connected by their serial interfaces as shown in the exhibit,but there is no data connectivity between them. The certways1 router is known to have a correct configuration.Given the partial configurations shown in the exhibit, what is the problem on the certways2 router that iscausing the lack of connectivity?

Page 27: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. A loopback is not set.B. The IP address is incorrect.C. The subnet mask is incorrect.D. The serial line encapsulations are incompatible.

Correct Answer: BSection: (none)Explanation

QUESTION 45According to the exhibit below. Information about P4S-RA, including platform and IP addresses, should not beaccessible from the Internet due to security reasons. However, this information

Page 28: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

needs to be accessible to devices on the internal networks of P4S-RA. Which command or series ofcommands will achieve these goals?

A. P4S-RA(config)#no cdp enableB. P4S-RA(config)#interface s0/0

P4S-RA(config-if)#no cdp runC. P4S-RA(config)#no cdp runD. P4S-RA(config)#interface s0/0

P4S-RA(config-if)#no cdp enable

Correct Answer: DSection: (none)Explanation

QUESTION 46Which will be the result of adding this command to a router already configured for dynamic routing?ip route 0.0.0.0 0.0.0.0 192.168.1.2

A. It configures the router to block routing updates from being sent to IP address 192.168.1.2.B. It configures the router to drop all packets for which the destination network is unknown.C. It configures the router as a firewall, blocking all packets from IP address 192.168.1.2.D. It configures the router to send all packets to IP address 192.168.1.2 if the packets match no other entry in

the routing table.

Correct Answer: DSection: (none)Explanation

QUESTION 47Look at the picture:

Page 29: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A.B.C.D.

Correct Answer: Section: (none)Explanation

Explanation/Reference:Answer & ExplanationCorrect Answer

Page 30: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

ExplanationsThis question is to examine the command show cdp neighbor. CDP is a Cisco proprietary protocol. The showcdp neighbor command can display detailed information about neighboring devices discovered using CDP,including hardware platform, port number and the local interfaces used by the connecting devices. You canview the IP address configuration of each interface using the show run command.So the correct answer is just as shown in the figure.

QUESTION 48Look at the following exhibit. You are a network administrator for certways. You need to install a network devicein the place of the icon labeled Network Device to accommodate a leased lineattachment to the Internet. To meet the minimum requirements for this installation, which network device andinterface configuration would you use?

Page 31: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. a router with two Ethernet interfacesB. a switch with two Ethernet interfacesC. a switch with one Ethernet and one serial interfaceD. a router with one Ethernet and one serial interface

Correct Answer: DSection: (none)Explanation

QUESTION 49Which command would configure a default route to any destination network not found in the routing table?

A. P4S-R(config)# ip route 0.0.0.0 255.255.255.255 s0B. P4S-R(config)# ip default-route 0.0.0.0 s0C. P4S-R(config)# ip default-route 0.0.0.0 255.255.255.255 s0D. P4S-R(config)# ip route 0.0.0.0 0.0.0.0 s0

Correct Answer: DSection: (none)Explanation

QUESTION 50According to the exhibit below. P4S-PC1 pings P4S-PC2. Which three things will P4S-CORE router do with thedata received from P4S-PC1? (Choose three.)

Page 32: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. The data frames will be forwarded out interface FastEthernet0/1 of P4S-CORE router.B. The data frames will be forwarded out interface FastEthernet1/0 of P4S-CORE routerC. P4S-CORE router will place the MAC address of P4S-PC2 in the destination MAC address of the frames.D. P4S-CORE router will put the MAC address of the forwarding FastEthernet interface in the place of the

source MAC address.

Correct Answer: BCDSection: (none)Explanation

QUESTION 51According to the exhibit below. Configuring P4S-R1 and P4S-R3 with RIPv2. What are the minimum networkcommands required on P4S-R2 for all networks to converge?

Page 33: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. (config-router)# network 192.168.0.0B. (config-router)# network 192.168.0.0

(config-router)# network 192.168.1.0C. config-router)# network 192.168.0.0

(config-router)# network 192.168.1.0(config-router)# network 192.168.3.0

D. (config-router)# network 192.168.2.0(config-router)# network 192.168.3.0(config-router)# network 192.168.4.0

Correct Answer: CSection: (none)Explanation

QUESTION 52The command ip route 192.168.100.160 255.255.255.224 192.168.10.2 20 was performed on a router. Norouting protocols or other static routes are configured on the router.Which statementbest describes this command?

A. The interface with IP address 192.168.10.2 is on this router.B. The command sets a gateway of last resort for the router.C. Packets that are destined for host 192.168.100.190 will be sent to 192.168.10.2.D. The number 20 indicates the number of hops to the destination network.

Correct Answer: CSection: (none)Explanation

Page 34: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

QUESTION 53What does the address 192.168.2.167 stand for on the basis of the following exhibit?

A. the router from which the file startup-config is being transferredB. the TFTP server from which the file router-confg is being transferredC. the TFTP server from which the file startup-config is being transferredD. the TFTP server to which the file router-confg is being transferred

Correct Answer: DSection: (none)Explanation

QUESTION 54Tom is a network technician for the P4S company. Observe the exhibit carefully. He is trying to useHyperTerminal to configure a new router by use of the settings presented.Why Tom can'tconnect to the router?

Page 35: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. The bits per second should be set to 9600.B. Parity should be set to mark.C. The stop bits should be set to 2.D. The data bits should be set to 6.

Correct Answer: ASection: (none)Explanation

QUESTION 55There are three locations in a school district of a large city: P4S-M, P4S-W and P4S-U. The network connectionbetween two of these locations has already functioned.Configure the P4S-M routerIP addresses on the E0 and S0 interfaces so that the E0 receives the first usable subnet while the S0 receivesthe second usable subnet from the network 192.168.160.0/28. Both interfaces would receive the last availableIP address on the proper subnet.

Page 36: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A.B.C.D.

Correct Answer: Section: (none)Explanation

Explanation/Reference:

Answer & ExplanationCorrect Answer

P4S-M> enablePassword: ciscoP4S-M# config tP4S-M(config)# interface e0P4S-M(config-if)# ip address 192.168.160.14 255.255.255.240 P4S-M(config-if)# no shutdownP4S-M(config-if)# exit

Page 37: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

P4S-M(config)# interface s0P4S-M(config-if)# ip address 192.168.160.30 255.255.255.240 P4S-M(config-if)# no shutdownP4S-M(config-if)# endP4S-M# copy run start

ExplanationsThis question is to examine the basic configuration of Cisco devices. The last available IP address for192.168.160.0/28 subnet is 192.168.160.14; The last available IP address for 192.168.160.16/28 subnet is192.168.160.30.

QUESTION 56Look at the following exhibit. You are a technician for certways. The configurations in the exhibit are pasted intothe two new routers shown. Otherwise, the routers are configured with theirdefault configurations. You cannot ping from P4S-Host1 to P4S-Host2, but you can ping the S0/0 interface ofP4S-R2 from P4S-Host1. You have verified the configurations of the hosts and they are correct. What causedthe problem?

A. The serial cable on P4S-R1 needs to be replaced.B. P4S-R1 has no route to the 192.168.1.128 network.C. The interfaces on P4S-R2 are not configured properly.D. The IP addressing scheme has overlapping subnetworks.

Correct Answer: BSection: (none)Explanation

QUESTION 57The protocol that provides the information displayed by the show cdp neighbors command may operate at alayer of the OSI model. Which level is it?

A. network

Page 38: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

B. physicalC. transportD. data link

Correct Answer: DSection: (none)Explanation

QUESTION 58In an effort to increase security within the certways wireless network, WPA is being utilized. Which twostatements shown below best describe the wireless security standard that is defined by WPA?(Choose two)

A. It specifies use of a static encryption key that must be changed frequently to enhance security.B. It requires use of an open authentication method.C. It specifies the use of dynamic encryption keys that change each time a client establishes a connection.D. It includes authentication by PSK.

Correct Answer: CDSection: (none)Explanation

QUESTION 59You work as a network technician for certways and are responsible for this network. And you have chosenWPA over WEP in their wireless network. What is one reason why WPA encryption ispreferred over WEP in this network?

A. WPA key values remain the same until the client configuration is changed.B. A WPA key is longer and requires more special characters than the WEP key.C. The access point and the client are manually configured with different WPA key values.D. The values of WPA keys can change dynamically while the system is used.

Correct Answer: DSection: (none)Explanation

QUESTION 60The Wi-Fi logo is a registered mark of the Wi-Fi Alliance. When the Wi-Fi logo appears on a wireless accesspoint or client adapter, which two of these does it signify? (Choose two.)

A. The Wi-Fi Alliance has tested this device and determined that it meets IEEE WLAN standards.B. The access point or client adapter has been manufactured by the Wireless Fidelity company.C. The manufacturer of the equipment has paid the Wi-Fi Alliance to market its products.D. The Wi-Fi Alliance has verified that the device can interoperate with other devices using the same

standards.

Correct Answer: ADSection: (none)Explanation

QUESTION 61

Page 39: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

As the certways network administrator, you need to troubleshoot an interference issue with the certwayswireless LAN. Which two devices can interfere with the operation of this network becausethey operate on similar frequencies? (choose two)

A. AM radioB. microwave ovenC. toasterD. cordless phone

Correct Answer: BDSection: (none)Explanation

QUESTION 62Install and configure three access points to cover a small office. Which one of the following terms defines thewireless topology?

A. BSSB. IBSSC. ESSD. SSID

Correct Answer: CSection: (none)Explanation

QUESTION 63You are a network technician. You have just installed a single 802.11g access point in the center of a squareoffice. Some wireless users come across slow performance and drops when most usersare operating at peak efficiency. Which three items most likely cause this problem? (Choose three.)

A. mismatched TKIP encryptionB. cordless phonesC. metal file cabinetsD. antenna type or direction

Correct Answer: BCDSection: (none)Explanation

QUESTION 64Which encryption type will be used by WPA2?

A. AES-CCMPB. PSKC. TKIP/MICD. PPK via IV

Correct Answer: ASection: (none)Explanation

Page 40: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

QUESTION 65Assuming that you are a network technician, can you tell me which two practices help secure the configurationutilities on wireless access points from unauthorized access? (Choose two.)

A. assigning a private IP address to the APB. changing the default SSID valueC. configuring a new administrator passwordD. changing the mixed mode setting to single mode

Correct Answer: BCSection: (none)Explanation

QUESTION 66Which protocol will be used by a network host to resolve a destination IPv4 address to a destination MACaddress?

A. ARPB. RARPC. DHCPD. DNS

Correct Answer: ASection: (none)Explanation

QUESTION 67What objective does an IDS accomplish?

A. hide the private IP addressing structure from outside attackersB. perform stateful firewall functionsC. detect malicious traffic and send alerts to a management stationD. block suspicious network activity from entering the network

Correct Answer: CSection: (none)Explanation

QUESTION 68The certways administrator is concerned with enhancing network security. To do this, what are tworecommended ways of protecting network device configuration files from outside security threatson the network?(Choose two.)

A. Always use Telnet to access the device command line because its data is automatically encrypted.B. Use a firewall to restrict access from the outside to the network devices.C. Allow unrestricted access to the console or VTY ports.D. Use SSH or another encrypted and authenticated transport to access device configurations.

Correct Answer: BDSection: (none)Explanation

Page 41: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

QUESTION 69Choose from the following the effect of using the service password-encryption command.

A. Only the enable password will be encrypted.B. It will encrypt all current and future passwords.C. Only the enable secret password will be encrypted.D. Only passwords configured after the command has been entered will be encrypted.

Correct Answer: BSection: (none)Explanation

QUESTION 70To protect network device configuration files from outside network security threats, what should you do?(Choose two.)

A. Allow unrestricted access to the console or VTY ports.B. Use a firewall to restrict access from the outside to the network devices.C. Use SSH or another encrypted and authenticated transport to access device configurations.D. Always use Telnet to access the device command line because its data is automatically encrypted.

Correct Answer: BCSection: (none)Explanation

QUESTION 71One of the following attack is characterized by a flood of packets that are requesting a TCP connection to aserver. Which is it?

A. brute forceB. Trojan horseC. reconnaissanceD. denial of service

Correct Answer: DSection: (none)Explanation

QUESTION 72Match the corresponding command and configuration task. (Not all options are used.)1. login password certways12. enable password certways23. enable secret certways44. service password-encryption5. line vty 0 4 password certways56. line console 0 password certways3

A. encrypt all clear text passwordsII.protect access to the user mode promptIII.set privileged mode encrypted passwordIV.set password to allow Telnet connections

Page 42: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

B. set privileged mode clear text passwordC. I-4,II-3,III-5,IV-2,V-6D. I-4,II-5,III-3,IV-2,V-6E. I-4,II-6,III-3,IV-5,V-2F. I-4,II-6,III-5,IV-3,V-2

Correct Answer: CSection: (none)Explanation

QUESTION 73You need to create a security plan for the certways network. What should be part of a comprehensive networksecurity plan?

A. Delay deployment of software patches and updates until their effect on end-user equipment is well knownand widely reported.

B. Physically secure network equipment from potential access by unauthorized individuals.C. Encourage users to use personal information in their passwords to minimize the likelihood of passwords

being forgotten.D. Allow users to develop their own approach to network security.

Correct Answer: BSection: (none)Explanation

QUESTION 74Topic - Implement and verify WAN links.

Describe different methods for connecting to a WANConfigure and verify a basic WAN serial connection

A.B.C.D.

Correct Answer: Section: (none)Explanation

Explanation/Reference:

QUESTION 75Two of the following statements correctly describe the following network. What are them? (Choose two.)

Page 43: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. There are six broadcast domains in the network.B. There are four broadcast domains in the network.C. There are two broadcast domains in the network.D. There are seven collision domains in the network.

Correct Answer: CDSection: (none)Explanation

QUESTION 76You need to create a security plan for the certways network. What should be part of a comprehensive networksecurity plan?

A. 64 Kbit/secB. 32 Kbit/secC. 512 Kbit/secD. 128 Kbit/sec

Correct Answer: CSection: (none)Explanation

QUESTION 77Look at the following exhibit. You are a network administrator for certways. You are configuring P4S-R toconnect to a non-Cisco network. Which two commands would be applied to the S0/0WAN interface, but not to the Fa0/0 LAN interface? (Choose two.)

Page 44: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. ip addressB. no shutdownC. encapsulation pppD. authentication pap

Correct Answer: CDSection: (none)Explanation

QUESTION 78Which of the following are included WAN data link encapsulation types? (Choose two.)

A. DSLB. T1C. PPPD. Frame Relay

Correct Answer: CDSection: (none)Explanation

QUESTION 79Which item gives the correct relationship between WAN connection technology and the associatedcommunication link type?1.PSTN2.ATM3.Leased Line4.Frame Relay

Page 45: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. Point to PointII.Circuit SwitchedIII.Packet SwitchedIV.Cell Switched

B. I-3;II-1;III-4;IV-2C. I-3;II-2;III-1;IV-4D. I-3;II-1;III-2;IV-4E. I-3;II-2;III-4;IV-1

Correct Answer: ASection: (none)Explanation

QUESTION 80Part of the certways WAN is shown below:Two buildings on the Los Angeles campus of a small company must be connected to use Ethernet with abandwidth of at least 100 Mbps. The company is concerned about possible problems from voltage potentialdifferences between the two buildings. Which media type should be used for the connection?

A. coaxial cableB. UTP cableC. STP cableD. fiber optic cable

Correct Answer: DSection: (none)Explanation

QUESTION 81John works as a network administrator. It is difficult for him to establish a serial link between a Cisco router anda router from another vendor. Both routers are configured for HDLC encapsulation.Which two options are correct about this configuration? (Choose two.)

A. The Cisco HDLC frame uses a proprietary "Type" field that may not be compatible with equipment of othervendors.

B. Usernames must be configured at both ends of the HDLC serial linkC. PPP encapsulation is recommended for serial links between equipment from multiple vendors.D. HDLC requires a clock rate to be configured on the routers at both ends of the serial link.

Correct Answer: ACSection: (none)

Page 46: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Explanation

QUESTION 82Which two characteristics belong to a Frame Relay point-to-point subinterface? (Choose two.)

A. requires the frame-relay map commandB. resolves NBMA split horizon issuesC. maps one IP subnet across multiple DLCIsD. maps one IP subnet per DLCI

Correct Answer: BDSection: (none)Explanation

QUESTION 83Examine the following technologies, which one will you use when a router connected to a LAN has only oneWAN interface, but multiple virtual circuits are needed?

A. DSLB. ADSLC. CableD. Frame Relay

Correct Answer: DSection: (none)Explanation

QUESTION 84As a network administrator, you will need to decide on the appropriate network devices to use. Which of thefollowing correctly describes the roles of devices in a WAN? (Choose three)

A. A CSU/DSU terminates a digital local loop.B. A CSU/DSU terminates an analog local loop.C. A modem terminates a digital local loop.D. A modem terminates an analog local loop.E. A router is commonly considered a DTE device.

Correct Answer: ADESection: (none)Explanation

QUESTION 85The certways WAN connection is shown below:Based on this diagram shown above, which two devices can be used to complete the connection between theWAN router at the customer site and the service provider? (Choose two.)

Page 47: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. multiplexerB. ATM switchC. CSU/DSUD. modem

Correct Answer: CDSection: (none)Explanation

QUESTION 86Topic - Describe the operation of data networks.

Describe the purpose and functions of various network devices Select the components required to meet a given network specification Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network Describe common networking applications including web applications Describe the purpose and basic operation of the protocols in the OSI and TCP models Describe the impact of applications (Voice Over IP and Video Over IP) on a network Interpret network diagramsDetermine the path between two hosts across a networkDescribe the components required for network and Internet communications Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach Differentiate between LAN/WAN operation and features

A.B.C.D.

Correct Answer: Section: (none)Explanation

Explanation/Reference:

QUESTION 87As it is shown in the exhibit, two World Wide Web documents from the WWW server Host are displayed byP4S-F in two browser windows at the same time. How did the data find its way to thecorrect browser windows?

Page 48: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. The browsers track the data by the URL.B. TCP port numbers are used to direct the data to the correct application window.C. The OSI application layer tracks the conversations and directs them to the correct brower.D. The IP source addresses of the packets will be used to direct the data to the correct browser window.

Correct Answer: BSection: (none)Explanation

QUESTION 88You work in a medium-sized company .The network performance of your company has slowed to the point thatusers are complaining. In order to resolve this problem, You are asked to determinewhat the users might be doing to cause the slowdown. Which two types of network services or applicationsmost likely cause slowdown? (Choose two.)

A. social networking web sitesB. blogs and other online browsingC. PC-based VoIP servicesD. online video sites

Correct Answer: CDSection: (none)Explanation

QUESTION 89Before a workstation is able to exchange HTTP packets with a web server, what must occur?

A. An ICMP connection must be established between the workstation and its default gateway.B. An ICMP connection must be established between the workstation and the web server.C. A UDP connection must be established between the workstation and the web server.D. A TCP connection must be established between the workstation and the web server.

Correct Answer: D

Page 49: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Section: (none)Explanation

QUESTION 90Choose from the following three that are found in a TCP header, but not in a UDP header? (Choose three.)

A. window sizeB. destination portC. sequence numberD. acknowledgment number

Correct Answer: ACDSection: (none)Explanation

QUESTION 91Match the corresponding commands and functions. (Not all options are used.)1.ping 10.0.0.12.ping 127.0.0.13.tracert4.ipconfig/all5.arp -a6.telnet

A. displays PC network configurationII. displays the list of routers on a path to a network destination III.tests VTY configurationIV. tests TCP/IP protocol stack

B. displays IP to MAC address mappings on a Windows PCC. I-4,II-3,III-6,IV-2,V-5D. I-4,II-3,III-1,IV-6,V-5E. I-4,II-3,III-6,IV-5,V-2F. I-4,II-3,III-5,IV-6,V-2

Correct Answer: ASection: (none)Explanation

QUESTION 92Choose from the following two advantages of Layer 2 Ethernet switches over hubs. (Choose two.)

A. filtering frames based on MAC addressesB. increasing the size of broadcast domainsC. decreasing the number of collision domainsD. allowing simultaneous frame transmissions

Correct Answer: ADSection: (none)Explanation

QUESTION 93Data is divided into smaller pieces for transmission when files are transferred between a host and an FTPserver. After these pieces reach the destination host, they should be reassembled to

Page 50: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

reconstruct the original file. What is used for the reassembly of these pieces into the correct order?

A. the TTL in the IP headerB. the sequence number in the TCP headerC. the Start Frame Delimiter in the 802.3 PreambleD. the frame check sequence in the Ethernet frame trailer

Correct Answer: BSection: (none)Explanation

QUESTION 94On the basis of the exhibit below. After adding host A to the network, Host A is unable to communicate on thenetwork. A ping issued on the host to address 127.0.0.1 fails.What is the problem?

A. The remote host at 127.0.0.1 is unreachable.B. The default gateway is incorrect.C. The IP address of host A is incorrect.D. The TCP/IP protocols are not loaded.

Correct Answer: DSection: (none)Explanation

QUESTION 95Attaching an Ethernet cable to a PC NIC and then attaching to a switch port. The PC power is turned on andthe switch port link LED becomes green. Which two conditions does the link lightindicate? (Choose two.)

A. Layer 2 communication has been established between the PC and switch.

Page 51: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

B. Traffic is being sent from the switch to the PC.C. If flashing, the green LED indicates port speed of 100 Mb/s.D. The Layer 1 media is functioning between the PC and switch.

Correct Answer: ADSection: (none)Explanation

QUESTION 96Match the corresponding terms and OSI layer.(Not all options are used.)1.bits2.packets3.UDP4.IP addresses5.segments6.MAC addresses7.windowing8.routing9.switching

A. Network LayerII.Transprot Layer

B. I(2,4,9),II(5,7,3)C. I(1,4,9),II(5,3,7)D. I(1,4,8),II(2,7,3)E. I(2,4,8),II(5,7,3)

Correct Answer: DSection: (none)Explanation

QUESTION 97Three of the following are types of flow control. Which are them? (Choose three.)

A. windowingB. bufferingC. cut-throughD. congestion avoidance

Correct Answer: ABDSection: (none)Explanation

QUESTION 98The following exhibit displays every device attached to the network.How many collision domains are shown in this network?

Page 52: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. 3B. 6C. 9D. 15

Correct Answer: DSection: (none)Explanation

QUESTION 99For the following Layer 4 protocols, which one is used for a Telnet connection?

A. UDPB. TCPC. ICMPD. DNS

Correct Answer: BSection: (none)Explanation

QUESTION 100Look at the following exhibit. To interconnect the devices, which types of cables are needed? (Choose three.)

Page 53: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. rollover cableB. V.35 cableC. crossover cableD. straight-through cable

Correct Answer: ACDSection: (none)Explanation

QUESTION 101Look at the following exhibit. You are a network administrator for certways. You have added Host A to thenetwork. A certain kind of cable should be used between P4S-S2 and host A. Which isit?

A. console cableB. crossover cableC. rollover cableD. straight-through cable

Correct Answer: D

Page 54: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Section: (none)Explanation

QUESTION 102From which of the following does a small network get its IP network address?

A. Internet Service Provider (ISP)B. Internet Architecture Board (IAB)C. Internet Domain Name Registry (IDNR)D. Internet Assigned Numbers Authority (IANA)

Correct Answer: ASection: (none)Explanation

QUESTION 103You are a network administrator for certways. By using the Ethernet interfaces as shown in the graphic, youconnect PC hosts certwaysA and certwaysB directly. You ping certwaysB fromcertwaysA, and fails. You are required to enable the connectivity between the two hosts. What can be done?(Choose two.)

A. A default gateway needs to be set on each host.B. The subnet masks should be set to 255.255.255.0.C. A crossover cable should be used in place of the straight-through cable.D. The hosts must be reconfigured to use private IP addresses for direct connections of this type.

Correct Answer: BCSection: (none)Explanation

QUESTION 104Part of the certways network is shown below:Please study the exhibit shown above carefully, how many collision domains are shown

Page 55: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. threeB. twoC. fourD. one

Correct Answer: BSection: (none)Explanation

QUESTION 105What is a necessary to allow host A to ping host B according to the exhibit?

A. a straight-through cable connecting the switchesB. a crossover cable connecting the switchesC. a router connected to the switches with straight-through cablesD. a CSU/DSU connected to the switches with straight-through cables

Correct Answer: CSection: (none)Explanation

QUESTION 106

Page 56: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

You work as a network technician for the P4S company. The displayed wire scheme is terminated at each endwith an RJ-45 connector. Which type of cables does the wire diagram represent?

A. a rollover cableB. an Ethernet straight-through cableC. a serial crossover cableD. an Ethernet crossover cable

Correct Answer: DSection: (none)Explanation

QUESTION 107Study the exhibit carefully. P4S-Host A is forwarding a packet to P4S-Host B for the first time. Whichdestination MAC address will be used by P4S-Host A in the ARP request?

Page 57: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. 255.255.255.255B. 00-17-94-61-18-b0C. 00-19-d3-2d-c3-b2D. ff-ff-ff-ff-ff-ff

Correct Answer: DSection: (none)Explanation

QUESTION 108The following exhibit shows a planned network. Which three descriptions are true about the areas and devicesin the network plan? (Choose three.)

A. Network Device A is a switch.B. Area 2 contains a Layer 2 deviceC. Network Device B is a hub.D. Area 1 contains a Layer 2 device.

Correct Answer: ACDSection: (none)Explanation

QUESTION 109Refer to the graphic. Workstation A in the Sales location is communicating with the server in the Productionlocation. What will be the source MAC address of the frames received by workstation Afrom the server?

Page 58: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. the MAC address of router interface e0B. the MAC address of the server network interfaceC. the MAC address of host AD. the MAC address of router interface e1

Correct Answer: ASection: (none)Explanation

QUESTION 110All devices will be connected through Ethernet according to the exhibit from labeled A to E . Which threedevice-to-device configurations most likely require the use of a crossover connection?(Choose three.)

Page 59: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. exhibit AB. exhibit BC. exhibit CD. exhibit DE. exhibit E

Correct Answer: ADESection: (none)Explanation

QUESTION 111Which two statements best describe the interface configuration according to the exhibit? (Choose two.)

Page 60: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. The encapsulation in use on this interface is PPP.B. This interface is connected to a LAN.C. The address mask of this interface is 255.255.255.0.D. The default serial line encapsulation is in use on this interface.

Correct Answer: ACSection: (none)Explanation

QUESTION 112Refer to the exhibit. What could be possible causes for the "Serial0/0 is down" interface status? (Choose two.)

A. A Layer 1 problem exists.

Page 61: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

B. A protocol mismatch exists.C. The bandwidth is set too low.D. An incorrect cable is being used.

Correct Answer: ADSection: (none)Explanation

QUESTION 113The certways network topology exhibit is shown below:Please study the exhibit carefully. A technician is troubleshooting a host connectivity problem. The host isunable to ping a server connected to Switch certwaysA. Based on the result of the testing, what could be theproblem?

A. A remote physical layer problem exists.B. The host NIC is not functioning.C. TCP/IP has not been correctly installed on the host.D. A local physical layer problem exists.

Correct Answer: DSection: (none)Explanation

QUESTION 114Examine the following options carefully, which line from the output of the show ip interface command indicatesthat there is a Layer 1 problem?

A. Serial0/1 is up, line protocol is upB. Serial0/1 is up, line protocol is downC. Serial0/1 is down, line protocol is downD. Serial0/1 is administratively down, line protocol is down

Correct Answer: CSection: (none)Explanation

Page 62: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

QUESTION 115What does flow control accomplish?

A. to ensure data is retransmitted if an acknowledgment is not receivedB. to reassemble segments in the correct order at the destination deviceC. to provide a means for the receiver to govern the amount of data sent by the senderD. to regulate the size of each segment

Correct Answer: CSection: (none)Explanation

QUESTION 116For the following transport layer protocols, which one is most suitable for the transport of VoIP data?

A. HTTPB. UDPC. RIPD. OSPF

Correct Answer: BSection: (none)Explanation

QUESTION 117Which three statements correctly describe the operation of a full-duplex Ethernet network? (Choose three.)

A. There are no collisions in full-duplex mode.B. A dedicated switch port is required for each full-duplex node.C. Ethernet hub ports are preconfigured for full-duplex mode.D. The host network card and the switch port must be capable of operating in full-duplex mode.

Correct Answer: ABDSection: (none)Explanation

QUESTION 118According to the following exhibit. Which two output fields will be helpful when you determine if a broadcaststorm has occurred? (Choose two.)

Page 63: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. collisionsB. no bufferC. dribble conditionD. ignored

Correct Answer: BDSection: (none)Explanation

QUESTION 119You are a network technician at P4S, study the exhibitcarefully. The ports displayed are the only active ports on the P4S-S. The MAC address table is displayed in itsentirety. TheEthernet frame presented reaches the P4S-S.When receiving this frame, which two operations will the P4S-S perform? (Choose two.)

Page 64: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. The MAC address of 0000.00aa.aaaa will be added to the MAC address table.B. The MAC address of 0000.00dd.dddd will be added to the MAC address table.C. The frame will be forwarded out port fa0/3 only.D. The frame will be forwarded out fa0/1, fa0/2, and fa0/3.

Correct Answer: ADSection: (none)Explanation

QUESTION 120Which two characteristics belong to Telnet? (Choose two.)

A. It sends data in clear text format.B. It is no longer supported on Cisco network devices.C. It is more secure than SSH.D. It requires that the destination device be configured to support Telnet connections.

Correct Answer: ADSection: (none)Explanation

QUESTION 121Which error condition could be removed at once when

Page 65: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

troubleshooting a LAN interface operating in full duplex mode?

A. dribble conditionB. giantsC. collisionsD. no buffers

Correct Answer: CSection: (none)Explanation

QUESTION 122Refer to the exhibit.P4S-PCA is sending packets to the FTP server. Consider the packets as they leave P4S-RA interface Fa0/0forwards P4S-RB.Drag the correct frame and packet address to their place in the table.

Page 66: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate
Page 67: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A.B.C.D.

Correct Answer: Section: (none)Explanation

Explanation/Reference:Answer & ExplanationCorrect Answer

ExplanationsNo more information available

QUESTION 123Choose from the following two statements that describe the operation of the CSMA/CD access method.(Choose two.)

A. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.B. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.C. The use of hubs to enlarge the size of collision domains is one way to improve the operation of the CSMA/

Page 68: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

CD access method.D. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all

stations have equal priority to transmit data.

Correct Answer: ADSection: (none)Explanation

QUESTION 124Topic - Implement a small switched network.

Select the appropriate media, cables, ports, and connectors to connect switches to other network devices andhostsExplain the technology and media access control method for Ethernet technologies Explain network segmentation and basic traffic management concepts Explain the operation of Cisco switches and basic switching concepts Perform, save and verify initial switch configuration tasks including remote access management Verify network status and switch operation using basic utilities (including: ping, traceroute,telnet,SSH,arp,ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate ports) Identify, prescribe, and resolve common switched network media issues, configuration issues, autonegotiation,and switch hardware failures

A.B.C.D.

Correct Answer: Section: (none)Explanation

Explanation/Reference:

QUESTION 125You are a network administrator for the P4S company, study the exhibit carefully. Your company has justconfigured a Catalyst 2950 switch for remote management by pasting into the console theconfiguration commands displayed in the exhibit. However, a Telnet session is not able to be successfullyestablished from a remote host. How to fix this problem?

Page 69: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. Change the fifth line to ip route 0.0.0.0 0.0.0.0 192.168.17.1.B. Change the first line to interface fastethernet 0/1.C. Change the fifth line to ip default-gateway 192.168.17.241.D. Change the sixth line to line con 0.

Correct Answer: CSection: (none)Explanation

QUESTION 126You are a network administrator at P4S, study the exhibit below carefully. You substitute the NIC in a desktopPC with a new NIC. The NIC in the PC configuration is set to "100 MbHalf." Now the PC has intermittent connectivity and loss of communication so you start troubleshooting on theswitch. According to the switch output displayed, which is the most likely cause of the problem?

A. Fast Ethernet is incompatible with a megabit NIC.B. The counters were not cleared after the hardware was replaced.C. The switch is set to full-duplex.D. Input flow control is off.

Correct Answer: CSection: (none)Explanation

QUESTION 127The following graphic displays the topology and switching table. Host P4S-B forwards a frame to Host P4S-C.What would the switch do with the frame?

Page 70: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. send an ARP request for Host P4S-CB. send the frame out all ports except port 0/2C. send an ICMP Host Unreachable message to Host P4S-BD. record the destination MAC address in the switching table and send the frame directly to Host P4S-C

Correct Answer: BSection: (none)Explanation

QUESTION 128You work as a network technician for P4S Ltd. Study the exhibit carefully. After the power-on self test (POST),the system LED of a Cisco 2950 switch becomes amber.What is the status of theswitch?

Page 71: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. The switch has experienced an internal problem but data can still be forwarded at a slower rate.B. The POST was successful.C. POST failed and there is a problem that prevents the operating system of the switch from being loaded.D. The switch passed POST, but all the switch ports are busy.

Correct Answer: CSection: (none)Explanation

QUESTION 129As it is shown in the following exhibit, P4S-SWA receives the frame with the addressing. Based on thecommand output shown, how will P4S-SWA handle this frame?

A. It will drop the frame.B. It will flood the frame out all ports.C. It will forward the frame out port Fa0/3 only.D. It will flood the frame out all ports except Fa0/3.

Correct Answer: DSection: (none)Explanation

QUESTION 130Which of the following command will set the default gateway to 192.168.12.1 on a Cisco switch?

A. P4S-SW(config)# ip route-default 192.168.12.1B. P4S-SW(config)# ip route 192.168.12.1 0.0.0.0C. P4S-SW(config)# ip default-gateway 192.168.12.1D. P4S-SW(config)# ip default-network 192.168.12.1

Correct Answer: CSection: (none)

Page 72: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Explanation

QUESTION 131Study the exhibit carefully. Two 2950 switches use a straight-through cable to connect through ports fa0/24.What can be concluded about this network according to the output provided in theexhibit and the information that is given?

A. An IP address and default gateway must be configured on each switch.B. The switches do not share the same VTP domain.C. Port fa0/24 must be configured as a trunk in order for the switches to share neighbor information.D. The switches are cabled incorrectly.

Correct Answer: DSection: (none)Explanation

QUESTION 132Refer to the exhibit. The two connected ports on the P4S-S are not turning orange or green. What would be themost effective steps to troubleshoot this physical layer problem? (Choose three.)

Page 73: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. Ensure that the Ethernet encapsulations match on the interconnected P4S-R and P4S-S ports.B. Ensure that cables A and B are straight-through cables.C. Reseat all cables.D. Ensure the P4S-S has power.

Correct Answer: BCDSection: (none)Explanation

QUESTION 133What does it indicate when the system LED is amber on a Cisco Catalyst 2950 series switch?

A. The system is not powered up.B. The system is malfunctioning.C. The system is forwarding traffic.D. The system is powered up and operational.

Correct Answer: BSection: (none)Explanation

QUESTION 134The following output was displayed on a certways device:Study the exhibit above. Switch-certways1 needs to send data to host with a MAC address of 00b0.d056.efa4.What will Switch-certways1 do with this data?

A. certways1 will send an ARP request out all its ports except the port from which the data originated.B. certways1 will flood the data out all of its ports except the port from which the data originated.

Page 74: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

C. certways1 will drop the data because it does not have an entry for that MAC address.D. None of the above

Correct Answer: BSection: (none)Explanation

QUESTION 135The following graphic displays the topology and MAC address table. Host P4S-A sends a data frame to hostP4S-D. When receiving the frame from host P4S-A, what will the P4S-SWA do?

A. The P4S-SWA will add the source address and port to the MAC address table and forward the frame tohost P4S-D.

B. The P4S-SWA will flood the frame out of all ports except for port Fa0/3.C. The P4S-SWA will add the destination address of the frame to the MAC address table and forward the

frame to host P4S-D.D. The P4S-SWA will discard the frame and send an error message back to host P4S-A.

Correct Answer: ASection: (none)Explanation

QUESTION 136The part of certways network is shown below:According to the diagram, which of the following is true about the internetwork?

Page 75: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. certways2 is the root bridge.B. Spanning Tree is not running.C. No collisions can occur in traffic between certwaysB and certwaysC.D. certwaysD and certways Server 1 are in the same network.E. If Fa0/0 is down on certways-R, Pass4usreA cannot access certways Server 1

Correct Answer: ESection: (none)Explanation

QUESTION 137Topic- Implement an IP addressing scheme and IP services to meet network requirements for a small branchoffice.

Describe the need and role of addressing in a network " Create and apply an addressing scheme to a networkAssign and verify valid IP addresses to hosts, servers, and networking devices in a LAN environment Explain the basic uses and operation of NAT in a small network connecting to one ISP Describe and verify DNS operationDescribe the operation and benefits of using private and public IP addressing Enable NAT for a small network with a single ISP and connection using SDM and verify operation using CLIand pingConfigure, verify and troubleshoot DHCP and DNS operation on a router.(including: CLI/SDM) Implement static and dynamic addressing services for hosts in a LAN environment Identify and correct IP addressing issues

A.B.C.D.

Page 76: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Correct Answer: Section: (none)Explanation

Explanation/Reference:

QUESTION 138Match the corresponding command sequence and configure an IP address on a serial interface.(Not all optionsare used)1.P4S# interface s0/02.P4S(config)# interface s0/03.P4S(config-if)# no shutdown4.P4S(config-if)# enable interface5.P4S(config)# ip address 172.16.20.21 255.255.255.06.P4S(config-if)# ip address 10.8.5.255 255.255.252.07.P4S(config-if)# ip address 198.18.2.63 255.255.255.2248.P4S(config-if)# description T1 to WAN9.P4S(config)# banner motd! T1 to WAN!10.P4S# configure terminal

A. enable the interfaceII.label the interfaceIII.enter global configuration modeIV.enter interface configuration mode

B. configure the interface IP addressC. I-3,II-8,III-10,IV-2,V-6D. I-3,II-8,III-10,IV-1,V-6E. I-3,II-9,III-10,IV-2,V-5F. I-3,II-9,III-10,IV-1,V-5

Correct Answer: ASection: (none)Explanation

QUESTION 139Look at the following exhibit. The diagram is provided by the certways network support staff as a recommendedconfiguration for the first phase of a four-phase network expansion project. Theentire network expansion will have over 1000 users on 14 network segments. The following IP address spacehas been allocated for this network:192.168.1.1 through 192.168.5.255192.168.100.1 through 198.168.100.255There are three problems with this design. What are them? (Choose three.)

Page 77: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. The router-to-router connection is wasting address space.B. AREA 2 could use a mask of /25 to conserve IP address space.C. The AREA 1 IP address space is inadequate for the number of users.D. The AREA 3 IP address space is inadequate for the number of users.

Correct Answer: ABCSection: (none)Explanation

QUESTION 140Refer to the exhibit. Host P4S-A needs to send data to Host P4S-B. Which Layer 2 and Layer 3 destinationaddresses will be used to send the data from Host P4S-A to Host P4S-B?

Page 78: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. 192.168.24.1 and 0007.0e56.ab2eB. 192.168.60.5 and 0007.0e56.ab2eC. 192.168.24.2 and 0007.0e84.acefD. 192.168.60.5 and 0011.43da.2c98

Correct Answer: BSection: (none)Explanation

QUESTION 141You are a network technician at P4S. Study the exhibitabove carefully, as the first step in verifying a local host configuration, you perform the ipconfig/all command ona computer.Answer the following questions by using the results of the command. You can successfully ping to the IPaddress of the primary DNS server configured on the computer. What can you determine concerning thenetwork?

Page 79: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. The names of all of the routers in the path can be resolved by the configured DNS serversB. The DNS server is able to resolve domain names to IP addresses.C. The router with the address 172.16.3.2 has the correct route to the 10.0.0.0 networkD. The router with the address 172.16.236.1 has a route it can use to reach network of the DNS server

Correct Answer: DSection: (none)Explanation

QUESTION 142What can be drawn about traffic on the router interface from the statement "The only UDP port allowed on thisrouter interface is 53." issued by the network manager?

A. DNS traffic is allowed.B. Telnet traffic is allowed.C. RIP traffic is allowed.D. SMTP traffic is allowed.

Correct Answer: ASection: (none)Explanation

QUESTION 143Please study the exhibit, and answer the following question. Choose from the following the subnet broadcastaddress of the LAN connected to P4S-R.

A. 192.168.200.15B. 192.168.200.31C. 192.168.200.63

Page 80: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

D. 192.168.200.127

Correct Answer: BSection: (none)Explanation

QUESTION 144Choose from the following two statements that describe the IP address 10.16.3.65/23? (Choose two.)

A. The subnet address is 10.16.3.0 255.255.254.0.B. The broadcast address of the subnet is 10.16.3.255 255.255.254.0.C. The lowest host address in the subnet is 10.16.2.1 255.255.254.0.D. The last valid host address in the subnet is 10.16.2.254 255.255.254.0

Correct Answer: BCSection: (none)Explanation

QUESTION 145According to the following exhibit. A customer is not able to reach any web sites on the Internet, but others inthe department have no problem. What most likely causes this problem?

A. A DHCP server address is not reachable by the PC.B. IP routing is not enabled.C. A DNS server address is not reachable by the PC.D. NAT has not been configured on the router that connects to the Internet.

Page 81: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Correct Answer: CSection: (none)Explanation

QUESTION 146Look at the following exhibit. The network is designed to provide the most efficient use of IP address space in anetwork expansion. Each circle defines a network segment and the number of usersrequired on that segment. An IP subnetwork number and default gateway address are displayed for eachsegment.There are three problems with the network design. What are the problems? (Choose three.)

A. Network 10.1.2.0/25 requires more user address space.B. Network 10.1.3.128/25 requires more user address space.C. Interface fa0/3 has an incorrect IP address.D. Interface fa0/1 has an invalid IP address for the subnet on which it resides.

Correct Answer: ACDSection: (none)Explanation

QUESTION 147

Page 82: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Two of the following describe private IP addresses. Which are them? (Choose two.)

A. a scheme to conserve public addressesB. addresses that can be routed through the public InternetC. addresses that cannot be routed through the public InternetD. addresses chosen by a company to communicate with the Internet

Correct Answer: ACSection: (none)Explanation

QUESTION 148Which of the following is the subnet address of 172.16.159.159/22?

A. 172.16.0.0B. 172.16.156.0C. 172.16.128.0D. 172.16.159.0

Correct Answer: BSection: (none)Explanation

QUESTION 149Tom works as a network technician for the P4S company. He is tasked to design a small network withredundancy according to the exhibit below which presents this design with all hostsconfigured in the same VLAN. What conclusions could be drawn from this design?

Page 83: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. The connection between switches should be a trunk.B. This design will function as intended.C. The router will not accept the addressing scheme.D. The router interfaces must be encapsulated with the 802.1Q protocol.

Correct Answer: CSection: (none)Explanation

QUESTION 150The P4S company has required a 300-workstation expansion of its network. These workstations will beinstalled in a single broadcast domain. However, each workstation needs to have its owncollision domain. The expansion will be as cost-effective as possible while still satisfying the requirements.Which three options can correctly fulfill the request? (Choose three).

A. one IP subnet with a mask of 255.255.254.0B. seven 48-port hubsC. seven 48-port switchesD. one router interface

Correct Answer: ACDSection: (none)Explanation

QUESTION 151As the certways network administrator, you need to assigned an IP address of 172.16.112.1/20 to an Ethernetport on router certways-R, what is the maximum number of hosts allowed on thisLAN subnet?

A. 4096B. 2046C. 4094D. 8190

Correct Answer: CSection: (none)Explanation

QUESTION 152Look at the following exhibit. Some value should be displayed in Box 1 of the ipconfig output of host A. What isit?

Page 84: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. 172.18.14.5B. 172.18.14.6C. 192.168.1.254D. 192.168.1.10

Correct Answer: CSection: (none)Explanation

QUESTION 153Look at the following exhibit. The internetwork uses subnets of the address 192.168.1.0 with a subnet mask of255.255.255.224. RIP version 1 is the routing protocol it uses.Which of the followingaddress could be assigned to the FastEthernet interface on P4S-RA?

A. 192.168.1.31

Page 85: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

B. 192.168.1.64C. 192.168.1.190D. 192.168.1.127

Correct Answer: CSection: (none)Explanation

QUESTION 154Which is the correct order about the DHCP message types as they would occur between a DHCP client and aDHCP server.1.DHCPACK2.DHCPOFFER3.DHCPDISCOVER4.DHCPQUEST

A. Step 1II.Step 2III.Step 3IV.Step 4

B. I-1;II-3;III-2;IV-4C. I-3;II-2;III-4;IV-1D. I-4;II-2;III-1;IV-3E. I-1;II-3;III-4;IV-2

Correct Answer: BSection: (none)Explanation

QUESTION 155Look at the pictrue

Page 86: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A.B.C.D.

Correct Answer: Section: (none)Explanation

Explanation/Reference:Answer & ExplanationCorrect Answer

Page 87: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

ExplanationsThis question tests some technology about NAT.

QUESTION 156Based on the following exhibit. The host in P4S-R2 sends a request for an HTML document to the server inP4S-R3. Which of the following addresses will be the source IP address of the packet asit leaves the P4S-R2?

Page 88: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. 10.1.2.8B. 10.1.0.6C. 10.1.0.14D. 10.1.1.16

Correct Answer: DSection: (none)Explanation

QUESTION 157Which of the following are types of flow control? (Choose three.)

A. cut-throughB. load balancingC. congestion avoidanceD. bufferingE. windowing

Correct Answer: CDESection: (none)Explanation

Explanation/Reference:

QUESTION 158Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server?

A. brute forceB. Trojan horse

Page 89: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

C. denial of serviceD. reconnaissance

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 159A network administrator has subnetted the 172.16.0.0 network using a subnet mask of 255.255.255.192. Aduplicate IP address of 172.16.2.120 has accidentally been configured on a workstation in the network. Thetechnician must assign this workstation a new IP address within that same subnetwork. Which address shouldbe assigned to the workstation?

A. 172.16.2.127B. 172.16.2.80C. 172.16.2.128D. 172.16.1.64E. 172.16.1.80F. 172.16.2.64

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:A subnet mask of 255.255.255.192 (/26) will provide us with 4 subnet (2 usable) each with 62 usable hosts pernetwork. So in our example the four networks will be:

172.16.2.1-62172.16.2.65-126172.16.2.129-190172.16.2.193-254

Since we know that the host must be in the same IP subnet as 172.16.2.120, only choice C is correct.

QUESTION 160From where does a small network get its IP network address?

A. Internet Architecture Board (IAB)B. Internet Assigned Numbers Authority (IANA)C. Internet Domain Name Registry (IDNR)D. Internet Service Provider (ISP)

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:Normally a small network will be assigned a number of IP addresses from their ISP, or in some cases, such asDSL and cable modem, a single dynamic IP address will be assigned by the ISP. Only very large networksrequiring a large IP block (normally more than a /20) will register with IANA, RIPE, or ARIN (American Registry

Page 90: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

of Internet Numbers) to obtain their IP addresses.

QUESTION 161What are two advantages of Layer 2 Ethernet switches over hubs? (Choose two.)

A. increasing the size of broadcast domainsB. allowing simultaneous frame transmissionsC. filtering frames based on MAC addressesD. increasing the maximum length of UTP cabling between devicesE. decreasing the number of collision domains

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:Explanation:The advantages of Layer 2 switches over hub are: switch allows not only simultaneous frame transmissions,data amplification and modification, but can also filter frames and fragments.

QUESTION 162What are two characteristics of Telnet? (Choose two.)

A. It is more secure than SSH.B. It requires that the destination device be configured to support Telnet connections.C. It requires an enterprise license in order to be implemented.D. It is no longer supported on Cisco network devices.E. It sends data in clear text format.

Correct Answer: BESection: (none)Explanation

Explanation/Reference:

QUESTION 163Which command is used on a Cisco router to reach the global configuration mode?

A. Router# configure terminalB. Router# setupC. Router> enableD. Router# interfaceE. Router# router

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 164The command ip route 192.168.100.160 255.255.255.224 192.168.10.2 20 was issued on a router. No routingprotocols or other static routes are configured on the router. Which statement is true about this command?

Page 91: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. The interface with IP address 192.168.10.2 is on this router.B. The number 20 indicates the number of hops to the destination network.C. Packets that are destined for host 192.168.100.190 will be sent to 192.168.10.2.D. The command sets a gateway of last resort for the router.E. The command creates a static route for all IP traffic with the source address 192.168.100.180.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 165Which two practices help secure the configuration utilities on wireless access points from unauthorized access?(Choose two.)

A. configuring traffic filteringB. changing the default SSID valueC. configuring a new administrator passwordD. changing the mixed mode setting to single modeE. assigning a private IP address to the AP

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:

QUESTION 166Which three statements are true about the operation of a full-duplex Ethernet network? (Choose three.)

A. There are no collisions in full-duplex mode.B. A dedicated switch port is required for each full-duplex node.C. Ethernet hub ports are preconfigured for full-duplex mode.D. In a full-duplex environment, the host network card must check for the availability of the network media

before transmitting.E. The host network card and the switch port must be capable of operating in full-duplex mode.

Correct Answer: ABESection: (none)Explanation

QUESTION 167Which commands display information about the Cisco IOS software version currently running on a router?(Choose three.)

A. show running-configB. show stacksC. show versionD. show flash

Page 92: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

E. show protocolsF. show IOS

Correct Answer: ACDSection: (none)Explanation

QUESTION 168After the shutdown command has been issued on the serial 0/0 interface, what will be displayed when the showinterface serial 0/0 command is issued by the administrator?

A. Serial0/0 is administratively down, line protocol is downB. Serial0/0 is down, line protocol is downC. Serial0/0 is up, line protocol is downD. Serial0/0 is administratively down, line protocol is administratively downE. Serial0/0 is up, line protocol is upF. Serial0/0 is down, line protocol is up

4Cisco 640-822 Exam

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 169From where does a small network get its IP network address?

A. Internet Assigned Numbers Authority (IANA)B. Internet Architecture Board (IAB)C. Internet Service Provider (ISP)D. Internet Domain Name Registry (IDNR)

Correct Answer: CSection: (none)Explanation

Explanation/Reference: 25Cisco 640-822 Exam

QUESTION 170Which IP address is a private address?

A. 12.0.0.1B. 168.172.19.39C. 172.20.14.36D. 172.33.194.30E. 192.169.42.34

Correct Answer: CSection: (none)

Page 93: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Explanation

QUESTION 171A network administrator has subnetted the 172.16.0.0 network using a subnet mask of 255.255.255.192. Aduplicate IP address of 172.16.2.120 has accidentally been configured on a workstation in the network. Thetechnician must assign this workstation a new IP address within that same subnetwork. Which address shouldbe assigned to the workstation?

A. 172.16.1.80B. 172.16.2.80C. 172.16.1.64D. 172.16.2.64E. 172.16.2.127F. 172.16.2.128

Correct Answer: BSection: (none)Explanation

QUESTION 172What does the "Inside Global" address represent in the configuration of NAT?

A. the summarized address for all of the internal subnetted addressesB. the MAC address of the router used by inside hosts to connect to the InternetC. a globally unique, private IP address assigned to a host on the inside networkD. a registered address that represents an inside host to an outside network

Correct Answer: DSection: (none)Explanation

QUESTION 173 26Cisco 640-822 Exam

How does TCP differ from UDP? (Choose two.)

A. TCP provides best effort delivery.B. TCP provides synchronized communication.C. TCP segments are essentially datagrams.D. TCP provides sequence numbering of packets.E. TCP uses broadcast delivery.

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:

QUESTION 174Which protocol uses a connection-oriented service to deliver files between end systems?

Page 94: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. TFTPB. DNSC. FTPD. SNMPE. RIP

Correct Answer: CSection: (none)Explanation

QUESTION 175SW-C has just been added to the network shown in the graphic.

What is the purpose of assigning a default gateway to this switch?

A. allows connectivity to Router B from the switch promptB. allows console port connectivity to the switch from Host AC. allows connectivity to remote network devices from Host B 30

Cisco 640-822 ExamD. allows the switch to pass traffic between Host A and Host B

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 176An administrator is working with the 192.168.4.0 network, which has been subnetted with a /26 mask. Whichtwo addresses can be assigned to hosts within the same subnet? (Choose two.)

A. 192.168.4.61B. 192.168.4.63C. 192.168.4.67D. 192.168.4.125E. 192.168.4.128F. 192.168.4.132

Correct Answer: CDSection: (none)

Page 95: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Explanation

QUESTION 177An administrator is in the process of changing the configuration of a router. What command will allow theadministrator to check the changes that have been made prior to saving the new configuration?

A. Router# show startup-configB. Router# show current-configC. Router# show running-configD. Router# show memoryE. Router# show flashF. Router# show processes

Correct Answer: CSection: (none)Explanation

QUESTION 178Which form of NAT maps multiple private IP addresses to a single registered IP address by using differentports?

A. static NATB. dynamic NATC. overloadingD. overlappingE. port loading

Correct Answer: CSection: (none)Explanation

QUESTION 179Which command can be used to determine the type of cable attached to the Serial 0/0 interface on a router?

A. show interfaces serial 0/0B. show running-configC. show versionD. show controllers serial 0/0

32Cisco 640-822 Exam

E. show ip interfaceF. show line serial 0/0

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 180What is the purpose of a default route?

Page 96: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. It is a route to be used when the routing protocol fails.B. It is a route configured by an ISP that sends traffic into a corporate network.C. It is a route used when a packet is destined for a remote network that is not listed in the routing table.D. It is a route manually configured for a specific remote network for which a routing protocol is not configured.E. It is used to send traffic to a stub network.

Correct Answer: CSection: (none)Explanation

QUESTION 181Which two of these functions do routers perform on packets? (Choose two.)

A. examine the Layer 2 headers of inbound packets and use that information to determine the next hops forthe packets

B. update the Layer 2 headers of outbound packets with the MAC addresses of the next hopsC. examine the Layer 3 headers of inbound packets and use that information to determine the next hops for

the packetsD. examine the Layer 3 headers of inbound packets and use that information to determine the complete paths

along which the packets will be routed to their ultimate destinationsE. update the Layer 3 headers of outbound packets so that the packets are properly directed to valid next hopsF. update the Layer 3 headers of outbound packets so that the packets are properly directed to their ultimate

destinations

Correct Answer: BCSection: (none)Explanation

QUESTION 182What happens when computers on a private network attempt to connect to the Internet through a Cisco routerrunning PAT?

33Cisco 640-822 Exam

A. The router uses the same IP address but a different TCP source port number for each connection.B. An IP address is assigned based on the priority of the computer requesting the connection.C. The router selects an address from a pool of one-to-one address mappings held in the lookup table.D. The router assigns a unique IP address from a pool of legally registered addresses for the duration of the

connection.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 183What is the result of adding this command to a router that is already configured for dynamic routing?

ip route 0.0.0.0 0.0.0.0 192.168.1.2

Page 97: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. It configures the router as a firewall, blocking all packets from IP address 192.168.1.2.B. It configures the router to block routing updates from being sent to IP address 192.168.1.2.C. It configures the router to drop all packets for which the destination network is unknown.D. It configures the router to send all packets to IP address 192.168.1.2.E. It configures the router to send all packets to IP address 192.168.1.2 if the packets match no other entry in

the routing table.

Correct Answer: ESection: (none)Explanation

QUESTION 184Which of the following commands will configure a default route to any destination network not found in therouting table?

A. Router(config)# ip default-route 0.0.0.0 255.255.255.255 s0B. Router(config)# ip route 0.0.0.0 255.255.255.255 s0C. Router(config)# ip default-route 0.0.0.0 s0D. Router(config)# ip route 0.0.0.0 0.0.0.0 s0E. Router(config)# ip route any any e0

Correct Answer: DSection: (none)Explanation

Explanation/Reference: 34Cisco 640-822 Exam

QUESTION 185The command ip route 192.168.100.160 255.255.255.224 192.168.10.2 20 was issued on a router. No routingprotocols or other static routes are configured on the router. Which statement is true about this command?

http://www.gratisexam.com/

A. The interface with IP address 192.168.10.2 is on this router.B. The command sets a gateway of last resort for the router.C. Packets that are destined for host 192.168.100.190 will be sent to 192.168.10.2.D. The number 20 indicates the number of hops to the destination network.E. The command creates a static route for all IP traffic with the source address 192.168.100.180.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

Page 98: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

QUESTION 186Which Layer 4 protocol is used for a Telnet connection?

A. IPB. TCPC. UDPD. ICMPE. DNS

Correct Answer: BSection: (none)Explanation

QUESTION 187Which two statements are correct regarding Cisco PAT implementation? (Choose two.)

A. primarily a security featureB. implemented to conserve public IP addressesC. requires at least two public addresses to operateD. can only be used between a private network and the InternetE. provides address connectivity between public and private addresses

Correct Answer: BESection: (none)Explanation

QUESTION 188If an ethernet port on a router was assigned an IP address of 172.16.112.1/20, what is the maximum number ofhosts allowed on this subnet?

A. 1024B. 2046C. 4094D. 4096E. 8190

Correct Answer: CSection: (none)Explanation

Explanation/Reference: 35Cisco 640-822 Exam

QUESTION 189The network manager has requested a 300-workstation expansion of the network. The workstations are to beinstalled in a single broadcast domain, but each workstation must have its own collision domain. The expansionis to be as cost-effective as possible while still meeting the requirements.Which three items will adequately fulfillthe request? (Choose three).

A. one IP subnet with a mask of 255.255.254.0B. two IP subnets with a mask of 255.255.255.0

Page 99: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

C. seven 48-port hubsD. seven 48-port switchesE. one router interfaceF. seven router interfaces

Correct Answer: ADESection: (none)Explanation

QUESTION 190The network manager states, "The only UDP port allowed on this router interface is 53." From the statement,what can be concluded about traffic on the router interface?

A. DNS traffic is allowed.B. RIP traffic is allowed.C. SMTP traffic is allowed.D. Telnet traffic is allowed.

Correct Answer: ASection: (none)Explanation

QUESTION 191What is the subnet address of 172.16.159.159/22?

A. 172.16.0.0B. 172.16.128.0C. 172.16.156.0D. 172.16.159.0E. 172.16.159.128F. 172.16.192.0

Correct Answer: CSection: (none)Explanation

QUESTION 192Which of the following describe private IP addresses? (Choose two.)

A. addresses chosen by a company to communicate with the InternetB. addresses that cannot be routed through the public InternetC. addresses that can be routed through the public InternetD. a scheme to conserve public addressesE. addresses licensed to enterprises or ISPs by an Internet registry organization

Correct Answer: BDSection: (none)Explanation

Explanation/Reference: 36

Page 100: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Cisco 640-822 Exam

QUESTION 193Which two statements describe the IP address 10.16.3.65/23? (Choose two.)

A. The subnet address is 10.16.3.0 255.255.254.0.B. The lowest host address in the subnet is 10.16.2.1 255.255.254.0.C. The last valid host address in the subnet is 10.16.2.254 255.255.254.0D. The broadcast address of the subnet is 10.16.3.255 255.255.254.0.E. The network is not subnetted.

Correct Answer: BDSection: (none)Explanation

QUESTION 194What are two effects on network performance of configuring a switch to store an entire frame before forwardingit to the destination? (Choose two.)

A. increase in switch operating speedB. increased latencyC. filtering of all frame errorsD. filtering of collision fragments onlyE. propagation of corrupted or damaged framesF. decreased latency

Correct Answer: BCSection: (none)Explanation

QUESTION 195What are two characteristics of Telnet? (Choose two.)

A. It sends data in clear text format.B. It is no longer supported on Cisco network devices.C. It is more secure than SSH.D. It requires an enterprise license in order to be implemented.E. It requires that the destination device be configured to support Telnet connections.

Correct Answer: AESection: (none)Explanation

QUESTION 196What is the purpose of flow control?

A. to ensure data is retransmitted if an acknowledgment is not receivedB. to reassemble segments in the correct order at the destination deviceC. to provide a means for the receiver to govern the amount of data sent by the senderD. to regulate the size of each segment

Page 101: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Correct Answer: CSection: (none)Explanation

QUESTION 197Which statements are true regarding ICMP packets? (Choose two.)

A. They acknowledge receipt of TCP segments. 37Cisco 640-822 Exam

B. They guarantee datagram delivery.C. They can provide hosts with information about network problems.D. They are encapsulated within IP datagrams.E. They are encapsulated within UDP datagrams.

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:

QUESTION 198Which of the following are types of flow control? (Choose three.)

A. bufferingB. cut-throughC. windowingD. congestion avoidanceE. load balancing

Correct Answer: ACDSection: (none)Explanation

QUESTION 199What must occur before a workstation can exchange HTTP packets with a web server?

A. A UDP connection must be established between the workstation and its default gateway.B. A UDP connection must be established between the workstation and the web server.C. A TCP connection must be established between the workstation and its default gateway.D. A TCP connection must be established between the workstation and the web server.E. An ICMP connection must be established between the workstation and its default gateway.F. An ICMP connection must be established between the workstation and the web server.

Correct Answer: DSection: (none)Explanation

QUESTION 200When files are transferred between a host and an FTP server, the data is divided into smaller pieces fortransmission. As these pieces arrive at the destination host, they must be reassembled to reconstruct the

Page 102: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

original file. What provides for the reassembly of these pieces into the correct order?

A. the TTL in the IP headerB. the frame check sequence in the Ethernet frame trailerC. the sequence number in the TCP headerD. the Start Frame Delimiter in the 802.3 PreambleE. the acknowledgement number in the segment header

Correct Answer: CSection: (none)Explanation

QUESTION 201Which of the following is the signaling standard that is responsible for managing the connection andmaintaining status between the router and the local Frame Relay switch?

A. BECNB. CIRC. DLCID. FECNE. LMIF. PVC

Correct Answer: ESection: (none)Explanation

QUESTION 202What technology should be used when a router that connects to a LAN has only one WAN interface, butmultiple virtual circuits are needed?

A. ATMB. DSLC. ADSLD. CableE. Frame Relay

Correct Answer: ESection: (none)Explanation

QUESTION 203What are two recommended ways of protecting network device configuration files from outside network securitythreats? (Choose two.)

39Cisco 640-822 Exam

A. Allow unrestricted access to the console or VTY ports.B. Use a firewall to restrict access from the outside to the network devices.C. Always use Telnet to access the device command line because its data is automatically encrypted.

Page 103: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

D. Use SSH or another encrypted and authenticated transport to access device configurations.E. Prevent the loss of passwords by disabling password encryption.

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:

QUESTION 204What are two recommended ways of protecting network device configuration files from outside network securitythreats? (Choose two.)

A. Allow unrestricted access to the console or VTY ports.B. Use a firewall to restrict access from the outside to the network devices.C. Always use Telnet to access the device command line because its data is automatically encrypted.D. Use SSH or another encrypted and authenticated transport to access device configurations.E. Prevent the loss of passwords by disabling password encryption.

Correct Answer: BDSection: (none)Explanation

QUESTION 205At which layer of the OSI model does the protocol that provides the information displayed by the show cdpneighbors command operate?

A. physicalB. data linkC. networkD. transportE. application

Correct Answer: BSection: (none)Explanation

QUESTION 206Which two statements best describe the wireless security standard that is defined by WPA?

40Cisco 640-822 Exam

(Choose two.)

A. It specifies use of a static encryption key that must be changed frequently to enhance security.B. It requires use of an open authentication method.C. It specifies the use of dynamic encryption keys that change each time a client establishes a connection.D. It requires that all access points and wireless devices use the same encryption key.E. It includes authentication by PSK.

Correct Answer: CE

Page 104: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Section: (none)Explanation

Explanation/Reference:

QUESTION 207What is one reason that WPA encryption is preferred over WEP?

A. A WPA key is longer and requires more special characters than the WEP key.B. The access point and the client are manually configured with different WPA key values.C. WPA key values remain the same until the client configuration is changed.D. The values of WPA keys can change dynamically while the system is used.

Correct Answer: DSection: (none)Explanation

QUESTION 208Which encryption type does WPA2 use?

A. AES-CCMPB. PPK via IVC. PSKD. TKIP/MIC

Correct Answer: ASection: (none)Explanation

QUESTION 209Which two practices help secure the configuration utilities on wireless access points from unauthorized access?(Choose two.)

A. assigning a private IP address to the APB. changing the default SSID valueC. configuring a new administrator passwordD. changing the mixed mode setting to single modeE. configuring traffic filtering

Correct Answer: BCSection: (none)Explanation

QUESTION 210Why would a network administrator configure port security on a switch?

A. to prevent unauthorized Telnet access to a switch portB. to limit the number of Layer 2 broadcasts on a particular switch portC. to prevent unauthorized hosts from accessing the LAND. to protect the IP and MAC address of the switch and associated ports

Page 105: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

E. to block unauthorized access to the switch management interfaces over common TCP ports

Correct Answer: CSection: (none)Explanation

QUESTION 211Which command will set the default gateway to 192.168.12.1 on a Cisco switch?

A. Switch(config)# ip default-network 192.168.12.1B. Switch(config)# ip route-default 192.168.12.1C. Switch(config)# ip default-gateway 192.168.12.1D. Switch(config)# ip route 192.168.12.1 0.0.0.0

Correct Answer: CSection: (none)Explanation

QUESTION 212A network administrator is having difficulty in establishing a serial link between a Cisco router and a router fromanother vendor. Both routers are configured for HDLC encapsulation. Which statements are true regarding thisconfiguration? (Choose two.)

A. The Cisco HDLC frame uses a proprietary "Type" field that may not be compatible with equipment of othervendors.

B. HDLC requires a clock rate to be configured on the routers at both ends of the serial link.C. PPP encapsulation is recommended for serial links between equipment from multiple vendors.D. Usernames must be configured at both ends of the HDLC serial linkE. The HDLC vendor type must be enabled on the Cisco router.F. There is a mismatch in the HDLC authentication password configurations.

Correct Answer: ACSection: (none)Explanation

QUESTION 213Which of the following protocols uses both TCP and UDP ports?

A. FTPB. SMTPC. Telnet

42Cisco 640-822 Exam

D. DNS

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

Page 106: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

QUESTION 214On a live network, which commands will verify the operational status of router interfaces? (Choose two.)

A. Router# show interfacesB. Router# show ip protocolsC. Router# debug interfaceD. Router# show ip interface briefE. Router# show start

Correct Answer: ADSection: (none)Explanation

QUESTION 215What is the result of starting a new router that has no files saved in NVRAM?

A. The router starts up in global configuration mode.B. The router starts up in user EXEC mode.C. The router starts up in privileged EXEC mode.D. The router starts up in setup mode.E. The router starts up in IP configuration mode.F. The router starts up in RX-boot mode.

Correct Answer: DSection: (none)Explanation

QUESTION 216Which of the following correctly pairs the dotted decimal subnet mask with the correct number of binary bits thatrepresent the subnet mask?

A. 255.255.255.192 and /25B. 255.255.255.248 and /28C. 255.255.255.224 and /26D. 255.255.255.248 and /27E. 255.255.255.240 and /28F. 255.255.255.240 and /16

Correct Answer: ESection: (none)Explanation

QUESTION 217A host has had a NIC card installed. The NIC can run in either half or full-duplex mode. The host is connectedto a hub that is located in a wiring closet. The network administrator notes that the NIC is only communicating inhalf-duplex mode. Which action could be taken to enable full-duplex operation?

48Cisco 640-822 Exam

A. Replace the host NIC.

Page 107: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

B. Replace the hub with a Fast Ethernet switch.C. Replace the cable between the PC and hub port.D. Install a second NIC card in the host and connect it to another port on the hub.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 218Which two options will help to solve the problem of a network that is suffering a broadcast storm? (Choosetwo.)

A. a bridgeB. a routerC. a hubD. a Layer 3 switch

49Cisco 640-822 Exam

E. an access point

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:

QUESTION 219During a router boot sequence, what is the basic function of the configuration register?

A. holds packet buffers for the routerB. controls how the router bootsC. starts and maintains the routerD. holds the router run-time configurationE. verifies that all router components are operational

Correct Answer: BSection: (none)Explanation

QUESTION 220What are two common TCP applications? (Choose two.)

A. TFTPB. SMTPC. SNMPD. FTPE. DNS

Correct Answer: BD

Page 108: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Section: (none)Explanation

QUESTION 221A network engineer needs to configure a branch office for 82 hosts. What is the most efficient use of a subnetmask?

A. 255.255.255.128B. 255.255.255.192C. 255.255.255.224D. 255.255.255.248

Correct Answer: ASection: (none)Explanation

Explanation/Reference: 50Cisco 640-822 Exam

QUESTION 222When configuring NAT, the Internet interface is considered to be what?

A. localB. insideC. globalD. outside

Correct Answer: DSection: (none)Explanation

QUESTION 223Which layer of the OSI model is responsible for segmenting data from a sending host that enables large files tobe broken down into smaller segments to prevent transmission errors?

A. sessionB. presentationC. applicationD. transport

Correct Answer: DSection: (none)Explanation

QUESTION 224What starting binary pattern indicates an address range evenly split between network and host size?

A. 01xxxxxxB. 0xxxxxxxC. 10xxxxxxD. 110xxxxx

Page 109: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Correct Answer: CSection: (none)Explanation

QUESTION 225On a Cisco switch, which protocol determines if an attached VoIP phone is from Cisco or from another vendor?

A. RTPB. TCPC. CDPD. UDP

Correct Answer: CSection: (none)Explanation

QUESTION 226If a host experiences intermittent issues that relate to congestion within a network while remaining connected,what could cause congestion on this LAN?

A. half-duplex operationB. broadcast storms

51Cisco 640-822 Exam

C. network segmentationD. multicasting

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 227Which layer of the OSI model controls the reliability of communications between netork devices using flowcontrol, sequencing and acknowledgments?

A. PhysicalB. Data-linkC. TransportD. Network

Correct Answer: CSection: (none)Explanation

QUESTION 228Which two characteristics describe the access layer of the hierarchical network design model? (Choose two.)

A. layer 3 support

Page 110: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

B. port securityC. redundant componentsD. VLANsE. PoE

Correct Answer: ABSection: (none)Explanation

QUESTION 229A switch has 48 ports and 4 VLANs. How many collision and broadcast domains exist on the switch (collision,broadcast)?

A. 4, 48B. 48, 4C. 48, 1D. 1, 48E. 4, 1

Correct Answer: BSection: (none)Explanation

QUESTION 230Which address type does a switch use to make selective forwarding decisions?

A. source IP addressB. destination IP addressC. source and destination IP addressD. source MAC addressE. destination MAC address

52Cisco 640-822 Exam

Correct Answer: ESection: (none)Explanation

Explanation/Reference:

QUESTION 231What are two characteristics of segmenting a network with a router? (Choose two.)

A. a router processes data more quickly than switchesB. filtering can occur based on layer 3 informationC. A router decreases the number of collision domains.D. adding a router to the network decreases latencyE. broadcasts are not forwarded across the router

Correct Answer: CESection: (none)

Page 111: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Explanation

QUESTION 232How can you ensure that only the MAC address of a server is allowed by switch port Fa0/1?

A. Configure port Fa0/1 to accept connections only from the static IP address of the server.B. Configure the server MAC address as a static entry of port security.C. Use a proprietary connector type on Fa0/1 that is incomputable with other host connectors.D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the

server IP address.

Correct Answer: BSection: (none)Explanation

QUESTION 233Which one of the following IP addresses is the last valid host in the subnet using mask 255.255.255.224?

A. 192.168.2.63B. 192.168.2.62C. 192.168.2.61D. 192.168.2.60E. 192.168.2.32

Correct Answer: BSection: (none)Explanation

QUESTION 234A network administrator has been assigned an IP address space of 192.168.1.0/24 for a network with threesegments. The first segment needs to support 60 hosts. The second segment needs to support 45 hosts. Thethird segment needs to support 30 hosts. Which two statements describe this choice? (Choose two.)

A. The assigned address will not provide enough IP address space for the required number of hosts.B. The assigned address represents private IP address space.C. User IP addresses must be translated to public IP addresses when accessing the Internet.D. User IP addresses must be translated to private IP addresses when communicating to hosts on other

network segments.E. This assignment will compromises network security.

53Cisco 640-822 Exam

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:

QUESTION 235Which statement is true for PPP?

Page 112: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. cannot be configured on asynchronous linksB. uses LCP for establishing and configuring different network layer protocolsC. uses a family of NCPs for establishing, configuring, and testing the data-link connectionD. has an authentication phase that is performed before the network layer protocol phase

Correct Answer: DSection: (none)Explanation

QUESTION 236Which statement is true for DSL?

A. DSL is backward-compatible with analog voice.B. DSL transmission occurs within a frequency range of 330 Hz and 3.3 kHz.C. The DSLAM is installed at the customer site.D. Very-high-data-rate DSL is an example of SDSL.

Correct Answer: ASection: (none)Explanation

QUESTION 237What type of technology do DSLAMs incorporate?

A. CSMA/CAB. CSMA/CDC. cell switchingD. packet switchingE. time-division multiplexing

Correct Answer: ESection: (none)Explanation

QUESTION 238When should the "clock rate" command be used on a Cisco router's interface?

A. During diagnostic functions such as a loopback testB. When the router is directly connected to another Cisco routerC. When the router is connected to a Frame Relay switchD. When the interface is connected to a CSU/DSU

57Cisco 640-822 Exam

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 239

Page 113: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Which tool can provide a secure communication between two devices over the Internet?

A. IDSB. IPSC. VPND. Anti-virusE. GRE

Correct Answer: CSection: (none)Explanation

QUESTION 240How many hosts are available for 192.168.1.1/28?

A. 14B. 15C. 16D. 17E. 18

Correct Answer: ASection: (none)Explanation

QUESTION 241Which subnet mask provides the most efficient use of a Class C address space for a company that requires 10subnets and 12 hosts per subnet?

A. 255.255.255.192B. 255.255.255.248C. 255.255.255.0D. 255.255.255.224E. 255.255.255.252F. 255.255.255.240

Correct Answer: FSection: (none)Explanation

QUESTION 242The network administrator is using a Windows PC application that is called putty.exe for remote communicationto a switch for network troubleshooting. Which two protocols could be used during this communication?(Choose two).

A. SNMPB. HTTPC. TelnetD. RMONE. SSH

Page 114: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Correct Answer: CESection: (none)Explanation

Explanation/Reference: 58Cisco 640-822 Exam

QUESTION 243Which type of address does a Layer 2 switch use to make forwarding decisions?

A. source MAC addressB. destination MAC addressC. source IP addressD. destination IP addressE. source and destination IP address

Correct Answer: BSection: (none)Explanation

QUESTION 244Which two characteristics apply to Layer 2 switches? (Choose two.)

A. increases the number of collision domainsB. decreases the number of collision domainsC. implements VLAND. decreases the number of broadcast domainsE. uses the IP address to make decisions for forwarding data packets

Correct Answer: ACSection: (none)Explanation

QUESTION 245Which three statements about switch microsegmentations are correct? (Choose three)

A. microsegmentation increases bandwidth availability.B. Implementing a bridge creates microsegmentation.C. microsegmentation uses half-duplex operation.D. microsegmentation eliminates collisions.E. each device on a network segment is connected directly to a switch port.F. microsegmentation limits the number of segments on a network.

Correct Answer: ADESection: (none)Explanation

QUESTION 246A switch receives a frame on one of its ports. There is no entry in the MAC address table for the destinationMAC address. What will the switch do with the frame?

Page 115: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. drop the frameB. forward it out of all ports except the one that received itC. forward it out of all portsD. store it until it learns the correct port

Correct Answer: BSection: (none)Explanation

QUESTION 247A network administrator cannot connect to a remote router by using SSH. Part of the show

59Cisco 640-822 Exam

interfaces command is shown.

router#show interfacesSerial0/1/0 is up, line protocol is down

At which OSI layer should the administrator begin troubleshooting?

A. physicalB. data linkC. networkD. transport

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 248Which solution should be deployed to provide a secure connection over a shared infrastructure?

A. firewallB. IPSC. routerD. VPN

Correct Answer: DSection: (none)Explanation

QUESTION 249After issuing the copy run start command, you make several changes to your lab router and realize that youwere referencing a list of bad IP addresses to make these changes. Which command is most efficient toresolve your mistakes?

A. erase flashB. restart

Page 116: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

C. renewD. erase nvramE. reloadF. erase start

Correct Answer: ESection: (none)Explanation

QUESTION 250You run the command debug ip rip on your router and notice this entry:

08:08:30: RIP: build update entries08:08:30: network 192.168.10.0 metric 16

What is this information telling you?

A. It provides the administrative distance for this route.B. The route has exceeded its maximum hop count.C. There are 16 hops to reach this route.D. It establishes the route update timer parameter

60Cisco 640-822 Exam

E. The route will be flushed in 16 seconds.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 251You do not have access to a network server and need to back up a Cisco IOS image. Which utility can you useto achieve this goal?

A. tftpB. ftpC. httpD. xmodemE. rcp

Correct Answer: DSection: (none)Explanation

Explanation/Reference: 84Cisco 640-822 Exam

QUESTION 252Which command would you use to view how much space has been consumed in NVRAM?

A. show NVRAM

Page 117: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

B. show flashC. show versionD. show running-configE. show startup-config

Correct Answer: ESection: (none)Explanation

QUESTION 253The ip helper-address command does what?

A. assigns an IP address to a hostB. resolves an IP address from a DNS serverC. relays a DHCP request across networksD. resolves an IP address overlapping issue

Correct Answer: CSection: (none)Explanation

QUESTION 254Which command excludes seven host addresses from a DHCP pool that has a 255.255.255.192 mask?

A. router(config)#ip dhcp excluded-address 192.168.7.0 192.168.7.6B. router(config)#ip dhcp excluded-address 192.168.7.121 192.168.7.127C. router(config)#ip dhcp excluded-address 192.168.7.159 192.168.7.165D. router(config)#ip dhcp excluded-address 192.168.7.193 192.168.7.198

Correct Answer: CSection: (none)Explanation

QUESTION 255What is the last usable address of the network 10.10.64.0 255.255.252.0?

A. 10.10.64.254B. 10.10.67.254C. 10.10.66.254D. 10.10.65.254

Correct Answer: BSection: (none)Explanation

QUESTION 256Which of these is a routed protocol?

A. RIPB. UDP

Page 118: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

C. IPD. HTTP

85Cisco 640-822 Exam

E. IGRP

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 257What is the best practice when assigning IP addresses in a small office of six hosts?

A. Use a DHCP server that is located at the headquarters.B. Use a DHCP server that is located at the branch office.C. Assign the addresses by using the local CDP protocol.D. Assign the addresses statically on each node.

Correct Answer: DSection: (none)Explanation

QUESTION 258What does administrative distance refer to?

A. the cost of a link between two neighboring routersB. the advertised cost to reach a networkC. the cost to reach a network that is administratively setD. a measure of the trustworthiness of a routing information source

Correct Answer: DSection: (none)Explanation

QUESTION 259What is the most efficient subnet mask for a small branch office with seven hosts?

A. 255.255.255.0B. 255.255.255.248C. 255.255.255.240D. 255.255.255.224

Correct Answer: CSection: (none)Explanation

QUESTION 260If you enter show interfaces serial 0/0 and receive the message "Serial0/0 is up, line protocol is down," what arethree possible causes? (Choose three.)

Page 119: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. No cable is attached to the interface.B. The clock rate is not set.C. No keepalive messages are received.D. The interface is shut down.E. No loopback address is set.F. There is a mismatch in the encapsulation type.

Correct Answer: BCFSection: (none)Explanation

QUESTION 261 86Cisco 640-822 Exam

Which two commands will display the current IP address and basic Layer 1 and 2 status of an interface?(Choose two.)

A. router#show versionB. router#show ip interfaceC. router#show protocolsD. router#show controllersE. router#show running-config

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:

QUESTION 262When files are transferred between a host and an FTP server, the data is divided into smaller pieces fortransmission. As these pieces arrive at the destination host, they must be reassembled to reconstruct theoriginal file. What provides for the reassembly of these pieces into the correct order?

A. the TTL in the IP headerB. the frame check sequence in the Ethernet frame trailerC. the sequence number in the TCP headerD. the Start Frame Delimiter in the 802.3 PreambleE. the acknowledgement number in the segment header

Correct Answer: CSection: (none)Explanation

QUESTION 263What TCP message does a host send to establish a connection with a destination host?

A. EstablishB. Request open

Page 120: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

C. SYND. ISNE. ACKF. HELLO

Correct Answer: CSection: (none)Explanation

QUESTION 264What process is used to establish a connection-oriented virtual circuit between two communicating hosts?

A. flow controlB. sequencingC. windowingD. three-way handshakeE. duplexing

Correct Answer: DSection: (none)Explanation

Explanation/Reference: 87Cisco 640-822 Exam

QUESTION 265A workstation has just resolved a browser URL to the IP address of a server. What protocol will the workstationnow use to determine the destination MAC address to be placed into frames directed toward the server?

A. HTTPB. DNSC. DHCPD. RARPE. ARP

Correct Answer: ESection: (none)Explanation

QUESTION 266Which transport layer protocol provides best-effort delivery service with no acknowledgment receipt required?

A. HTTPB. IPC. TCPD. TelnetE. UDP

Correct Answer: ESection: (none)Explanation

Page 121: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

QUESTION 267If the hubs in the graphic were replaced by switches,

what would be virtually eliminated?

88Cisco 640-822 Exam

A. broadcast domainsB. repeater domainsC. Ethernet collisionsD. signal amplificationE. Ethernet broadcasts

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 268An Ethernet cable is attached to a PC NIC and then attached to a switch port. The PC power is turned on andthe switch port link LED turns green. The link light indicates what two conditions? (Choose two.)

A. Layer 2 communication has been established between the PC and switch.B. The PC has received a DHCP address.C. Traffic is being sent from the switch to the PC.D. If flashing, the green LED indicates port speed of 100 Mb/s.E. The Layer 1 media is functioning between the PC and switch.F. The switch port is functioning as a half-duplex connection.

Page 122: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Correct Answer: AESection: (none)Explanation

QUESTION 269A new LAN segment is allocated the network number 172.16.0.0/25. What range of addresses are available forhosts on that network?

A. 172.16.0.1 through 172.16.0.254B. 172.16.0.1 through 172.16.0.126C. 172.16.0.129 through 172.16.0.254D. 172.16.0.1 through 172.16.1.254

98Cisco 640-822 Exam

E. 172.16.1.1 through 172.16.1.126F. 172.16.1.1 through 172.16.1.254

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 270A PC is attached to the console port of a new Cisco router. The router is powered on. If the PC has beenconfigured correctly for a console connection, what will the router display after it powers up?

A. Router>B. an option to execute the show running-config commandC. a series of prompts to run various POST testsD. the option to enter initial system configuration information

Correct Answer: DSection: (none)Explanation

QUESTION 271A Cisco router has received a frame on an interface that is connected to a local network segment. The routerhas de-encapsulated the frame. What step is next in processing the packet?

A. The router uses ARP to determine the MAC address of the next-hop router.B. The router encapsulates the packet into a frame appropriate for the outbound interface.C. The router searches the routing table to determine where to forward the packet.D. The router adds a frame to the packet with the next hop destination MAC address.

Correct Answer: CSection: (none)Explanation

QUESTION 272What two actions must a router take in order to route incoming packets? (Choose two.)

Page 123: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

A. Identify the destination network address of each packet.B. Identify the source network address of each packet.C. Validate sources of routing information.D. Inspect the routing table to select the best path to the destination network address.E. Verify the receipt of routed packets by the next hop router.F. Inspect the ARP table to verify a legitimate source MAC address for each packet.

Correct Answer: ADSection: (none)Explanation

QUESTION 273What is the effect of using the service password-encryption command?

A. Only the enable password will be encrypted.B. Only the enable secret password will be encrypted.C. Only passwords configured after the command has been entered will be encrypted.D. It will encrypt the secret password and remove the enable secret password from the configuration.E. It will encrypt all current and future passwords.

Correct Answer: ESection: (none)Explanation

Explanation/Reference: 99Cisco 640-822 Exam

QUESTION 274Which transport layer protocol is used for critical Voice over IP services?

A. ARPB. ICMPC. TCPD. UDPE. VLAN

Correct Answer: DSection: (none)Explanation

QUESTION 275A company wants to provide streaming video services to its customers and sales prospects. Which twocharacteristics of the network are the most critical to achieving this goal? (Choose two.)

A. addressingB. authenticationC. bandwidthD. latencyE. securityF. windowing

Page 124: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Correct Answer: CDSection: (none)Explanation

QUESTION 276The performance of the network at a medium-sized business has slowed to the point that users arecomplaining. In order to address the problem, the network administrator needs to determine what the usersmight be doing to cause the slowdown. Which two types of network services or applications are the most likelycause of the slowdown? (Choose two.)

A. online auction sitesB. instant messaging and chat room servicesC. social networking web sitesD. blogs and other online browsingE. PC-based VoIP servicesF. online video sites

Correct Answer: EFSection: (none)Explanation

QUESTION 277What service do DNS servers provide?

A. Given an IP address, DNS servers determine the name of the host that is sought.B. They resolve domain names to IP addresses.C. They run a spell check on host names to ensure accurate routing.D. They map individual hosts to their specific IP addresses.E. They provide names for network resources such as printers and servers.

100Cisco 640-822 Exam

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 278Which two protocols does DNS use from the TCP/IP layer? (Choose two.)

A. ARPB. ICMPC. IPD. SCTPE. TCPF. UDP

Correct Answer: EFSection: (none)Explanation

Page 125: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

QUESTION 279Three access points have been installed and configured to cover a small office. What term defines the wirelesstopology?

A. BSSB. IBSSC. ESSD. SSID

Correct Answer: CSection: (none)Explanation

QUESTION 280A single 802.11g access point has been configured and installed in the center of a square office. A few wirelessusers are experiencing slow performance and drops while most users are operating at peak efficiency. Whatare three likely causes of this problem? (Choose three.)

A. mismatched TKIP encryptionB. null SSIDC. cordless phonesD. mismatched SSIDE. metal file cabinetsF. antenna type or direction

Correct Answer: CEFSection: (none)Explanation

QUESTION 281Which method of connecting a small office/home office to an ISP uses existing telephone lines?

A. DSLB. cableC. serialD. CSU/DSU

Correct Answer: ASection: (none)Explanation

Explanation/Reference: 101Cisco 640-822 Exam

QUESTION 282What is the purpose of the switchport command?Switch(config-if)# switchport port-security maximum 1Switch(config-if)# switchport port-security mac-address 0018.DE8B.4BF8

A. It ensures that only the device with the MAC address 0018.DE8B.4BF8 will be able to connect to the port

Page 126: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

that is being configured.B. It informs the switch that traffic destined for MAC address 0018.DE8B.4BF8 should only be sent to the port

that is being configured.C. It will act like an access list and the port will filter packets that have a source or destination MAC of

0018.DE8B.4BF8.D. The switch will shut down the port of any traffic with source MAC address of 0018.DE8B.4BF8.

Correct Answer: ASection: (none)Explanation

QUESTION 283When the Wi-Fi logo appears on a wireless access point or client adapter, it signifies which two of these?(Choose two.)

A. The Wi-Fi Alliance has tested this device and determined that it meets IEEE WLAN standards.B. The IEEE certifies that the device is in compliance with its wireless fidelity requirements.C. The access point or client adapter has been manufactured by the Wireless Fidelity company.D. The Wi-Fi Alliance has verified that the device can interoperate with other devices using the same

standards.E. The manufacturer of the equipment has paid the Wi-Fi Alliance to market its products.

Correct Answer: ADSection: (none)Explanation

QUESTION 284Refer to the exhibit. What two facts can be determined from the WLAN diagram? (Choose two.)

102

Page 127: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Cisco 640-822 Exam

A. The area of overlap of the two cells represents a basic service set (BSS).B. The network diagram represents an extended service set (ESS).C. Access points in each cell must be configured to use channel 1.D. The area of overlap must be less than 10% of the area to ensure connectivity.E. The two APs should be configured to operate on different channels.

Correct Answer: BESection: (none)Explanation

Explanation/Reference:

QUESTION 285Which two devices can interfere with the operation of a wireless network because they operate on similarfrequencies? (Choose two.)

A. copierB. microwave ovenC. toasterD. cordless phoneE. IP phoneF. AM radio

Correct Answer: BDSection: (none)Explanation

QUESTION 286Which wireless LAN design ensures that a mobile wireless client will not lose connectivity when moving fromone access point to another?

A. using adapters and access points manufactured by the same companyB. recommended overlap in cell coverage is 15 to 20%C. configuring all access points to use the same channelD. utilizing MAC address filtering to allow the client MAC address to authenticate with the surrounding APs

Correct Answer: BSection: (none)Explanation

QUESTION 287What is the purpose of an IDS?

A. perform stateful firewall functionsB. block suspicious network activity from entering the networkC. detect malicious traffic and send alerts to a management stationD. hide the private IP addressing structure from outside attackers

Correct Answer: C

Page 128: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Section: (none)Explanation

QUESTION 288Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server?

A. denial of serviceB. brute force

103Cisco 640-822 Exam

C. reconnaissanceD. Trojan horse

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 289A host computer has the IP address 192.168.43.139 and netmask 255.255.255.240. On which logical IPnetwork does this host reside?

A. 192.168.0.0/26B. 192.168.0.0/28C. 192.168.43.0/28D. 192.168.43.64/28E. 192.168.43.112/28F. 192.168.43.128/28

Correct Answer: FSection: (none)Explanation

QUESTION 290What source and destination information can be found in the data link layer?

A. URLB. IP addressC. port numberD. MAC address

Correct Answer: DSection: (none)Explanation

QUESTION 291Which transport layer protocol is best suited for the transport of VoIP data?

A. RIPB. UDP

Page 129: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

C. TCPD. OSPFE. HTTP

Correct Answer: BSection: (none)Explanation

QUESTION 292When troubleshooting a LAN interface operating in full duplex mode, which error condition can be immediatelyruled out?

A. giantsB. no buffersC. collisionsD. ignoredE. dribble condition

104Cisco 640-822 Exam

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 293Which statement is correct regarding the configuration of a serial link on a Cisco router?

A. Cisco routers are DCE devices.B. The clock rate command is a requirement for DCE interfaces.C. The bandwidth command guarantees maximum bandwidth during congestion.D. If the clock rate command is configured, then the bandwidth command is required.E. If the bandwidth command is configured, then the clock rate command is required.

Correct Answer: BSection: (none)Explanation

QUESTION 294How many simultaneous Telnet sessions does a Cisco router support by default?

A. 1B. 2C. 3D. 4E. 5F. 6

Correct Answer: ESection: (none)

Page 130: For Full Set of Questions please visit: ... · traceroute,telnet,SSH,arp, ipconfig), SHOW DEBUG commands Implement and verify basic security for a switch (port security, deactivate

Explanation

QUESTION 295Which Layer 1 devices can be used to enlarge the area covered by a single LAN segment? (Choose two.)

A. switchB. routerC. NICD. hubE. repeaterF. RJ-45 transceiver

Correct Answer: DESection: (none)Explanation

Explanation/Reference: 119Cisco 640-822 Exam

QUESTION 296WAN data link encapsulation types include which of the following? (Choose two.)

A. T1B. Frame RelayC. DSLD. PPPE. ISDN

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:

http://www.gratisexam.com/