post 2

6
 Título : Post Examen CCNA 2 1) Router CK1 is configured with an inbound ACL. When are packets processed in this inbound access list?  Before they are routed to an outbound interface Correcto 2) Information from each data channel is allocated bandwidth based on short, preassigned time slots, regardless of whether there is data to transmit. Time-division multiplexing Correcto 3) An extended access list needs to be applied to a RDP router. What three pieces of information can be used in an extended access list to filter traffic? (Choose three)  Source IP Address and destination IP address Correcto  Protocol Correcto  TCP or UDP port numbers Correcto 4) The RDP administrator is implementing access control lists in the RDP network. What are two reasons that the RDP network administrator would use access lists? (Choose two.)  To filter traffic as it passes through a router Correcto  To control VTY access into a router  Correcto 5) Many RDP routers are configured using access lists. Which of the following are benefits provided with access control lists (ACLs)? (Select all that apply)  ACLs identify interesting traffic for DDR Correcto  ACLs provide IP route filtering. Correcto 6) Router CK1 is configured using a named ACL. Which of the following answer choices are correct characteristics of named access list? (Select a ll that apply)  You can delete individual statements in a named access list  Correcto  Named access lists must be specified as standard or extended Correcto  You can use the ip access-list command to create named access lists  Correcto 7) A standard IP access list is applied to an Ethernet interface of router CK1 . What does this standard access list filter on?  The source address Correcto 8) You are securing a network for RDP and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?

Upload: jose-pedro

Post on 10-Jul-2015

19 views

Category:

Documents


0 download

TRANSCRIPT

5/10/2018 Post 2 - slidepdf.com

http://slidepdf.com/reader/full/post-2-55a0c6a311c36 1/5

 

Título : Post Examen CCNA 2

1) Router CK1 is configured with an inbound ACL. When are packets

processed in this inbound access list?

 Before they are routed to an outbound interface Correcto

2) Information from each data channel is allocated bandwidth based on short,

preassigned time slots, regardless of whether there is data to transmit.

Time-division multiplexing Correcto

3) An extended access list needs to be applied to a RDP router. What three

pieces of information can be used in an extended access list to filter traffic?

(Choose three)

 Source IP Address and destination IP address Correcto

 Protocol Correcto

 TCP or UDP port numbers Correcto

4) The RDP administrator is implementing access control lists in the RDP

network. What are two reasons that the RDP network administrator would

use access lists? (Choose two.)

 To filter traffic as it passes through a router Correcto

 To control VTY access into a router Correcto

5) Many RDP routers are configured using access lists. Which of the

following are benefits provided with access control lists (ACLs)? (Select all

that apply)

 ACLs identify interesting traffic for DDR Correcto

 ACLs provide IP route filtering. Correcto

6) Router CK1 is configured using a named ACL. Which of the following

answer choices are correct characteristics of named access list? (Select all

that apply)

 You can delete individual statements in a named access list 

 

Correcto

 Named access lists must be specified as standard or extended Correcto

 You can use the ip access-list command to create named access lists Correcto

7) A standard IP access list is applied to an Ethernet interface of router

CK1 . What does this standard access list filter on?

 The source address Correcto

8) You are securing a network for RDP and want to apply an ACL (access

control list) to an interface of a router. Which one of the following

commands would you use?

5/10/2018 Post 2 - slidepdf.com

http://slidepdf.com/reader/full/post-2-55a0c6a311c36 2/5

 

 ip access-group 101 out Correcto

9) Which wild card mask will enable a network administrator to permit

access to the Internet for only hosts that are assigned an address in the

range 192.168.8.0 through 192.168.15.255?

 0.0.7.255 Correcto

10) The RDP network is subnetted using 29 bits for the subnet mask. Whichwild card mask should be used to configure an extended access list to

permit or deny access to an entire subnetwork?

 0.0.0.7 Correcto

11) Which IP address and wildcard mask would you use in your ACL to block

all the hosts in the subnet 192.168.16.43/28?

 192.168.16.32 0.0.0.15 Correcto

12) Which of the following access list statements would deny traffic from aspecific host?

 Router(config)# access-list 1 deny 172.16.4.13 0.0.0.0 Correcto

13) For security reasons, the RDP network administrator needs to prevent

pings into the corporate networks from hosts outside the internetwork.

Using access control lists, which protocol should be blocked?

 ICMP Correcto

14) What are the general recommendations regarding the placement of 

access control lists? (Choose two)

 Extended ACLs should be placed as close as possible to the source of traffic to be

denied. Correcto

 Standard ACLs should be placed as close as possible to the destination of traffic

to be denied. Correcto

15) Which of the following are characteristics of named access lists?

(Choose three)

 When created, they must be specified as standard or extended. Correcto

 They are created with the ip access-list command. Correcto

16) What are two reasons that the RDP network administrator would use

access lists on a router? (Choose two.)

 To filter traffic as it passes through a router Correcto

 To control vty access into a router Correcto

5/10/2018 Post 2 - slidepdf.com

http://slidepdf.com/reader/full/post-2-55a0c6a311c36 3/5

 

17) Creates and combines multiple channels on a single line. Bandwidth is

allocated for information from each data channel based on the signal frequency

of the traffic.

Frequency-division multiplexing

18) Which two statements accurately describe data-link protocols in a WAN?

(Choose two.)

Many data link layer protocols use a framing mechanism similar to HDLC. CorrectoData link layer protocols define how data is encapsulated for transmission to remote

sites, and also the mechanisms for transferring the resulting frames to establish the

connection across the communication line from the sending to the receiving

device. Correcto

19) Which three statements accurately describe WANs? (Choose three.)

WANs connect devices that are separated by wide geographic areas. Correcto

WANs use the services of carriers such as telephone companies, cable companies,

satellite systems, and network providers. Correcto

WANs use serial connections of various types to provide access to

bandwidth. Correcto

20) Which three communications needs do WANs address? (Choose three.)

Organizations often want to share information with other organizations across large

distances. Correcto

A department needs to share data files with a remote department

 

Correcto

Students need to do research for classes by accessing library indexes and

publications located in other parts of their country and in other parts of the

world. Correcto

21) Which two statements accurately describe the difference between LANs and

WANs? (Choose two.)

A LAN transmits data faster than a WAN.

While a LAN connects computers, peripherals, and other devices in a single building

or other small geographic area, a WAN transmits data across broad geographic

distances. Correcto

22) At which OSI level do WAN protocols describe how to provide electrical,

mechanical, operational, and functional connections to the services of a

communications service provider?

Layer 1 Correcto

23) At which OSI level do WAN protocols define encapsulation of data for

transmission toward a remote location and the mechanisms for transferring the

resulting frames?

Layer 2 Correcto

5/10/2018 Post 2 - slidepdf.com

http://slidepdf.com/reader/full/post-2-55a0c6a311c36 4/5

 

24) In analog lines, they convert the digital signal of the sending device into

analog format for transmission over an analog line and then convert the signal

back to digital form so that the receiving device can receive and process the

network signal.

Modems (DSU/CSU) Correcto

25) While troubleshooting a network connectivity problem, a RPD technician

observes steady link lights on both the workstation NIC and the switch port towhich the workstation is connected. However, when the ping command is issued

from the workstation, the output message "Request timed out." is displayed. At

which layer of the 7-layer OSI model does the problem most likely exist?

The network layer 

26) They provide internetworking and WAN access interface ports.

Routers Correcto

27) Provide a text-based connection for the configuration and troubleshooting

of the router

Management ports

28) Are made through a WAN interface on a router to a service provider to a

distant site or to the Internet

WAN interfaces

29) Allow the router to connect to the LAN media through Ethernet or some

other LAN technology such as Token Ring or ATM

LAN interfaces

30) WANs use these to provide access.

Other networking devices

31) How many bits are contained in each field of an IPv6 address?

 16 Correcto

32) Which option is a valid IPv6 address?

 2004:1:25A4:886F::1 Correcto

33) What is known as "one-to-nearest" addressing in IPv6?

 anycast Correcto

34) Select the valid IPv6 addresses. (Choose all apply)

 :: Correcto

 ::192:168:0:1 Correcto

5/10/2018 Post 2 - slidepdf.com

http://slidepdf.com/reader/full/post-2-55a0c6a311c36 5/5

 

 2002:c0a8:101::42 Correcto

 2003:dead:beef:4dad:23:46:bb:101 Correcto

35) Which two statements describe characteristics of IPv6 unicast

addressing? (Choose two.)

 Link-local addresses start with FE00:/12.

 There is only one loopback address and it is ::1. Correcto

36) What is the function of the Cisco IOS command ip nat inside source

static 10.1.1.5 172.35.16.5?

 It creates a one-to-one mapping between an inside local address and an inside

global address.

37) Which of the following commands would be applied to a WAN interface,

but not on LAN Interface? (Choose all that apply)

 encapsulation PPP Correcto

 no shutdown Correcto

38) Of the following choices below, only three could be used as WAN

encapsulation methods, as opposed to LAN encapsulation. Which three are

they? (Choose three)

 HDLC Correcto

 Frame Relay Correcto

 PPP Correcto

39) What can the RDP network administrator utilize by using PPP (Point to

Point Protocol) as the Layer 2 encapsulation? (Choose three)

 Compression Correcto

 Authentication Correcto

 Multilink support 

 

Correcto

40) You are configuring the serial interface of your Cisco router; which of 

the following are valid encapsulation types you can use? (Select all that

apply)

 HDLC Correcto

 PPP Correcto

 Frame Relay Correcto