post 2
TRANSCRIPT
5/10/2018 Post 2 - slidepdf.com
http://slidepdf.com/reader/full/post-2-55a0c6a311c36 1/5
Título : Post Examen CCNA 2
1) Router CK1 is configured with an inbound ACL. When are packets
processed in this inbound access list?
Before they are routed to an outbound interface Correcto
2) Information from each data channel is allocated bandwidth based on short,
preassigned time slots, regardless of whether there is data to transmit.
Time-division multiplexing Correcto
3) An extended access list needs to be applied to a RDP router. What three
pieces of information can be used in an extended access list to filter traffic?
(Choose three)
Source IP Address and destination IP address Correcto
Protocol Correcto
TCP or UDP port numbers Correcto
4) The RDP administrator is implementing access control lists in the RDP
network. What are two reasons that the RDP network administrator would
use access lists? (Choose two.)
To filter traffic as it passes through a router Correcto
To control VTY access into a router Correcto
5) Many RDP routers are configured using access lists. Which of the
following are benefits provided with access control lists (ACLs)? (Select all
that apply)
ACLs identify interesting traffic for DDR Correcto
ACLs provide IP route filtering. Correcto
6) Router CK1 is configured using a named ACL. Which of the following
answer choices are correct characteristics of named access list? (Select all
that apply)
You can delete individual statements in a named access list
Correcto
Named access lists must be specified as standard or extended Correcto
You can use the ip access-list command to create named access lists Correcto
7) A standard IP access list is applied to an Ethernet interface of router
CK1 . What does this standard access list filter on?
The source address Correcto
8) You are securing a network for RDP and want to apply an ACL (access
control list) to an interface of a router. Which one of the following
commands would you use?
5/10/2018 Post 2 - slidepdf.com
http://slidepdf.com/reader/full/post-2-55a0c6a311c36 2/5
ip access-group 101 out Correcto
9) Which wild card mask will enable a network administrator to permit
access to the Internet for only hosts that are assigned an address in the
range 192.168.8.0 through 192.168.15.255?
0.0.7.255 Correcto
10) The RDP network is subnetted using 29 bits for the subnet mask. Whichwild card mask should be used to configure an extended access list to
permit or deny access to an entire subnetwork?
0.0.0.7 Correcto
11) Which IP address and wildcard mask would you use in your ACL to block
all the hosts in the subnet 192.168.16.43/28?
192.168.16.32 0.0.0.15 Correcto
12) Which of the following access list statements would deny traffic from aspecific host?
Router(config)# access-list 1 deny 172.16.4.13 0.0.0.0 Correcto
13) For security reasons, the RDP network administrator needs to prevent
pings into the corporate networks from hosts outside the internetwork.
Using access control lists, which protocol should be blocked?
ICMP Correcto
14) What are the general recommendations regarding the placement of
access control lists? (Choose two)
Extended ACLs should be placed as close as possible to the source of traffic to be
denied. Correcto
Standard ACLs should be placed as close as possible to the destination of traffic
to be denied. Correcto
15) Which of the following are characteristics of named access lists?
(Choose three)
When created, they must be specified as standard or extended. Correcto
They are created with the ip access-list command. Correcto
16) What are two reasons that the RDP network administrator would use
access lists on a router? (Choose two.)
To filter traffic as it passes through a router Correcto
To control vty access into a router Correcto
5/10/2018 Post 2 - slidepdf.com
http://slidepdf.com/reader/full/post-2-55a0c6a311c36 3/5
17) Creates and combines multiple channels on a single line. Bandwidth is
allocated for information from each data channel based on the signal frequency
of the traffic.
Frequency-division multiplexing
18) Which two statements accurately describe data-link protocols in a WAN?
(Choose two.)
Many data link layer protocols use a framing mechanism similar to HDLC. CorrectoData link layer protocols define how data is encapsulated for transmission to remote
sites, and also the mechanisms for transferring the resulting frames to establish the
connection across the communication line from the sending to the receiving
device. Correcto
19) Which three statements accurately describe WANs? (Choose three.)
WANs connect devices that are separated by wide geographic areas. Correcto
WANs use the services of carriers such as telephone companies, cable companies,
satellite systems, and network providers. Correcto
WANs use serial connections of various types to provide access to
bandwidth. Correcto
20) Which three communications needs do WANs address? (Choose three.)
Organizations often want to share information with other organizations across large
distances. Correcto
A department needs to share data files with a remote department
Correcto
Students need to do research for classes by accessing library indexes and
publications located in other parts of their country and in other parts of the
world. Correcto
21) Which two statements accurately describe the difference between LANs and
WANs? (Choose two.)
A LAN transmits data faster than a WAN.
While a LAN connects computers, peripherals, and other devices in a single building
or other small geographic area, a WAN transmits data across broad geographic
distances. Correcto
22) At which OSI level do WAN protocols describe how to provide electrical,
mechanical, operational, and functional connections to the services of a
communications service provider?
Layer 1 Correcto
23) At which OSI level do WAN protocols define encapsulation of data for
transmission toward a remote location and the mechanisms for transferring the
resulting frames?
Layer 2 Correcto
5/10/2018 Post 2 - slidepdf.com
http://slidepdf.com/reader/full/post-2-55a0c6a311c36 4/5
24) In analog lines, they convert the digital signal of the sending device into
analog format for transmission over an analog line and then convert the signal
back to digital form so that the receiving device can receive and process the
network signal.
Modems (DSU/CSU) Correcto
25) While troubleshooting a network connectivity problem, a RPD technician
observes steady link lights on both the workstation NIC and the switch port towhich the workstation is connected. However, when the ping command is issued
from the workstation, the output message "Request timed out." is displayed. At
which layer of the 7-layer OSI model does the problem most likely exist?
The network layer
26) They provide internetworking and WAN access interface ports.
Routers Correcto
27) Provide a text-based connection for the configuration and troubleshooting
of the router
Management ports
28) Are made through a WAN interface on a router to a service provider to a
distant site or to the Internet
WAN interfaces
29) Allow the router to connect to the LAN media through Ethernet or some
other LAN technology such as Token Ring or ATM
LAN interfaces
30) WANs use these to provide access.
Other networking devices
31) How many bits are contained in each field of an IPv6 address?
16 Correcto
32) Which option is a valid IPv6 address?
2004:1:25A4:886F::1 Correcto
33) What is known as "one-to-nearest" addressing in IPv6?
anycast Correcto
34) Select the valid IPv6 addresses. (Choose all apply)
:: Correcto
::192:168:0:1 Correcto
5/10/2018 Post 2 - slidepdf.com
http://slidepdf.com/reader/full/post-2-55a0c6a311c36 5/5
2002:c0a8:101::42 Correcto
2003:dead:beef:4dad:23:46:bb:101 Correcto
35) Which two statements describe characteristics of IPv6 unicast
addressing? (Choose two.)
Link-local addresses start with FE00:/12.
There is only one loopback address and it is ::1. Correcto
36) What is the function of the Cisco IOS command ip nat inside source
static 10.1.1.5 172.35.16.5?
It creates a one-to-one mapping between an inside local address and an inside
global address.
37) Which of the following commands would be applied to a WAN interface,
but not on LAN Interface? (Choose all that apply)
encapsulation PPP Correcto
no shutdown Correcto
38) Of the following choices below, only three could be used as WAN
encapsulation methods, as opposed to LAN encapsulation. Which three are
they? (Choose three)
HDLC Correcto
Frame Relay Correcto
PPP Correcto
39) What can the RDP network administrator utilize by using PPP (Point to
Point Protocol) as the Layer 2 encapsulation? (Choose three)
Compression Correcto
Authentication Correcto
Multilink support
Correcto
40) You are configuring the serial interface of your Cisco router; which of
the following are valid encapsulation types you can use? (Select all that
apply)
HDLC Correcto
PPP Correcto
Frame Relay Correcto