diskov2
DESCRIPTION
If you can't upload, pls don't download!TRANSCRIPT
![Page 1: Diskov2](https://reader034.vdocuments.net/reader034/viewer/2022042623/54f6c1cf4a7959123e8b4ac1/html5/thumbnails/1.jpg)
Refer to the exhibit. What effect will the commands have when entered on R2?
They will prevent all simultaneous in-band connections.
They will permit an unlimited number of in-band connections.
They will permit a maximum of five simultaneous in-band connections.
They will permit a minimum of four simultaneous in-band connections with a different password on each connection.
A network technician wants to restore a backup copy of the saved configuration file on a router from a TFTP server. After restoring the file from the TFTP server, the technician reloads the router and finds that it still has the old configuration file instead of the restored file. What could have caused this?
The technician entered the command delete flash: before reloading the router.
The technician entered the command boot system rom before reloading the router.
The technician entered the command erase startup-config before reloading the router. The technician failed to enter the command copy running-config startup-config before reloading the router.
What is the primary function of the NOC at a large ISP?
installing equipment at a customer site
setting up customer accounts and passwords
monitoring and testing customer network connections
entering customer requirements in an order-tracking database
![Page 2: Diskov2](https://reader034.vdocuments.net/reader034/viewer/2022042623/54f6c1cf4a7959123e8b4ac1/html5/thumbnails/2.jpg)
Refer to the exhibit. The Transfer > Capture Text feature available through HyperTerminal has been used to capture the running configuration on a router. The startup-configuration has been erased from the router followed by the issuing of the reload command. The startup-config is restored by using the captured file, but all interfaces on the router are shown as administratively down. What could cause this problem?
The enable password was incorrectly entered.
The configuration register was not set to 0x2142.
The enable secret password was incorrectly entered.
The no shutdown command must be entered under each interface section in the file being sent. The captured file should have restored the running configuration not the startup configuration.
![Page 3: Diskov2](https://reader034.vdocuments.net/reader034/viewer/2022042623/54f6c1cf4a7959123e8b4ac1/html5/thumbnails/3.jpg)
Refer to the exhibit. Which routing protocol would likely be used to distribute routes between these routers?
RIP
BGP
OSPF
EIGRP
Refer to the exhibit. If the show cdp neighbors command is issued on RTB, which devices will appear in the output if all devices use the Cisco IOS and have CDP enabled?
RTA, RTC
RTA, RTC, Sw2
RTA, RTC, Sw1, Sw2, Sw3
RTA, RTC, Sw1, Sw2, Sw3, PC1, PC2
Which scenario may require the use of a crossover UTP cable?
connecting a host to a hub
connecting a host to a switch
connecting a router to a switch
connecting a switch to another switch
![Page 4: Diskov2](https://reader034.vdocuments.net/reader034/viewer/2022042623/54f6c1cf4a7959123e8b4ac1/html5/thumbnails/4.jpg)
Refer to the exhibit. Host H1 is sending a datagram to host H2 across the Internet. NAT will be configured on RTRC. Which address is considered the inside local address?
10.1.1.1
10.1.1.6
209.165.201.2
209.165.201.17
209.165.200.226
What is a characteristic of a scalable network?
100% uptime
redundant links
easy expansion
multiple backup devices
Which type of WAN connection uses packet-switched connections?
T1
E1
ISDN
Frame Relay
![Page 5: Diskov2](https://reader034.vdocuments.net/reader034/viewer/2022042623/54f6c1cf4a7959123e8b4ac1/html5/thumbnails/5.jpg)
What is an SLA?
a tool to diagnose basic network connectivity issues
a survey to obtain initial information about customer problems
a program that shares remote desktops to diagnose customer issues
an entry-level position that provides technicians with valuable experience
a contract that defines expectations between an organization and a service vendor
Refer to the exhibit. What could be two possible causes for the Serial0/0/0 interface status? (Choose two.)
A Layer 3 issue exists.
The bandwidth is set too high.
An incorrect cable is being used.
A loopback address must be set.
The reliability setting is too low for the interface.
A defective serial interface cable was used.
Which statement correctly describes the operation of DNS?
It uses a local HOSTS file to resolve URLs to IP addresses for internal devices.
It uses a distributed hierarchy of servers to resolve hostnames to IP addresses.
It references a central file that maps hostnames to IP addresses for all Internet hosts.
It uses a single layer of interconnected peer servers to manage hostname-to-IP-address mappings.
Which statement is true about UDP?
![Page 6: Diskov2](https://reader034.vdocuments.net/reader034/viewer/2022042623/54f6c1cf4a7959123e8b4ac1/html5/thumbnails/6.jpg)
UDP has less overhead than TCP has.
UDP provides windowing and flow control.
UDP uses acknowledgments for reliable delivery.
UDP uses sessions to keep track of conversations
A Catalyst switch is used as a temporary replacement for another switch that needs to be repaired. About a minute after the switch has started, the SYST LED on the front of the switch transitions from blinking green to amber. What is the meaning of the amber SYST LED?
The switch has no configuration file in NVRAM.
The switch has failed POST and must be sent for service.
The switch is functioning properly.
The switch is in half-duplex mode.
What is a characteristic of the EIGRP routing protocol?
It has a hop count limitation that makes it suitable only for small, simple networks that consist of fewer than 15 hops.
It does not include subnet mask information in routing updates.
It builds the topology table based on all of the advertisements from its neighbors.
It maintains a full database of distant routers and the methods by which they interconnect.
![Page 7: Diskov2](https://reader034.vdocuments.net/reader034/viewer/2022042623/54f6c1cf4a7959123e8b4ac1/html5/thumbnails/7.jpg)
Refer to the exhibit. What is the possible reason that a technician is unable to telnet into the HQ router and make configuration changes?
A password is required for vty 0.
A password for line con 0 is required.
All five virtual interfaces must be configured before Telnet is possible.
The service password-encryption command is preventing Telnet access.
Why are port numbers included in the TCP header of a segment?
to indicate the correct router interface that should be used to forward a segment
to identify which switch ports should receive or forward the segment
to determine which Layer 3 protocol should be used to encapsulate the data
to enable a receiving host to forward the data to the appropriate application
to allow the receiving host to assemble the packet in the proper order
A network engineer has been asked to design a new structured cable system. What should be the first step in the project?
Obtain an accurate floor plan.
Identify all potential sources of EMI.
Sketch the proposed network design.
Determine the locations of all network devices.
![Page 8: Diskov2](https://reader034.vdocuments.net/reader034/viewer/2022042623/54f6c1cf4a7959123e8b4ac1/html5/thumbnails/8.jpg)
Which protocol allows encryption of any application layer protocol?
FTP
FTPS
HTTPS
IPsec
Telnet
1 How many host addresses may be assigned on each subnetwork when using the 130.68.0.0 network
address with a subnet mask of 255.255.248.0?
30
256
2046
2048
4094
4096
2
Refer to the exhibit. The network administrator uses the command below to configure a default
route on RTB:
RTB(config)# ip route 0.0.0.0 0.0.0.0 fa0/0
A ping issued from PC3 is successful to RTB. However, echo request packets arrive at PC1 but
![Page 9: Diskov2](https://reader034.vdocuments.net/reader034/viewer/2022042623/54f6c1cf4a7959123e8b4ac1/html5/thumbnails/9.jpg)
the echo replies do not make it back to PC3. What will fix this problem?
RTA must be configured to forward packets to the 192.168.2.0 network.
The ip route command needs to be edited so that the next hop address is 10.1.1.5.
The ip route command needs to be edited so that the 192.168.2.1 address is the next hop address.
The ip route command should be removed from the RTB router configuration.
Another default route should be configured on RTA with a next hop address of 10.1.1.6.
3
Refer to the exhibit. A NOC technician at an ISP enters the command c:\ping 209.165.201.7. What
are two reasons to use this command? (Choose two.)
map the path to 209.165.201.7
test reachability to 209.165.201.7
locate connectivity problems along the route to 209.165.201.7
identify ISPs that interconnect the NOC and remote host with IP 209.165.201.7
measure the time that packets take to reach 209.165.201.7 and return to the technician's workstation
4 For the assignment of permissions to files and folders, what does the "principle of least privilege" imply?
No user has more privileges than any other user.
Permissions to files are given based on seniority.
Users only have access to resources that are necessary for their jobs.
Users should be given no access to computer resources until they ask.
5 What is the primary function of a Level 1 support technician in an ISP help desk department with
multiple levels of customer support?
to install hardware replacements for the customer
to accompany an on-site technician to provide additional technical support
to diagnose and document the symptoms of hardware, software, and system problems
to design network enhancements that support the new technology requirements of the customer
6 A user reports being unable to access the Internet. The help desk technician employs a bottom-up
![Page 10: Diskov2](https://reader034.vdocuments.net/reader034/viewer/2022042623/54f6c1cf4a7959123e8b4ac1/html5/thumbnails/10.jpg)
approach to troubleshooting. The technician first has the user check the patch cable connection from
the PC to the wall, and then has the user verify that the NIC has a green link light. What will the
technician have the user do next?
Enter an IP address into the WWW browser address bar to see if DNS is at fault.
Use traceroute to identify the device along the path to the ISP that may be at fault.
Verify the IP address, subnet, and gateway settings using ipconfig on the PC.
Connect to the user home router to check firewall settings for blocked TCP ports.
7 What is the primary function of the NOC at a large ISP?
installing equipment at a customer site
setting up customer accounts and passwords
monitoring and testing customer network connections
entering customer requirements in an order-tracking database
8
Refer to the graphic. Which command will configure a static route on Router A to direct traffic
from LAN A that is destined for LAN C?
RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.5.2
RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.3.2
RouterA(config)# ip route 192.168.5.0 255.255.255.0 192.168.3.2
RouterA(config)# ip route 192.168.3.0 255.255.255.0 192.168.3.1
RouterA(config)# ip route 192.168.3.2 255.255.255.0 192.168.4.0
9
![Page 11: Diskov2](https://reader034.vdocuments.net/reader034/viewer/2022042623/54f6c1cf4a7959123e8b4ac1/html5/thumbnails/11.jpg)
Refer to the exhibit. A network administrator is troubleshooting the serial connection
between R1 and R2. There is no communication between R1 and R2. Based on the output of
the show ip interface brief command, what is the cause of the problem?
There is a misconfiguration of IP addresses.
There is a mismatch of encapsulation methods.
The no shutdown command should be issued on R2.
The routing protocols are not compatible.
10 What is a feature of PAT?
It maps IP addresses to URLs.
It displays private IP addresses to public networks.
It sends acknowledgments of received packets.
It allows multiple hosts on a single LAN to share globally unique IP addresses.
11 A company is developing an Internet store for its website. Which protocol should be used to
transfer credit card information from customers to the company web server?
FTPS
HTTP
HTTPS
WEP2
TFTP
12 How does a switch interface that uses sticky port security handle MAC addresses?
The addresses are configured manually and are saved in the running configuration.
They are configured manually and are not saved in the running configuration.
![Page 12: Diskov2](https://reader034.vdocuments.net/reader034/viewer/2022042623/54f6c1cf4a7959123e8b4ac1/html5/thumbnails/12.jpg)
They are configured dynamically and are saved in the running configuration.
They are configured dynamically and are not saved in the running configuration.
13
Refer to the exhibit. Which two IP addresses could be assigned to the hosts in
the diagram? (Choose two.)
192.168.65.31
192.168.65.32
192.168.65.35
192.168.65.60
192.168.65.63
192.168.65.64
14
![Page 13: Diskov2](https://reader034.vdocuments.net/reader034/viewer/2022042623/54f6c1cf4a7959123e8b4ac1/html5/thumbnails/13.jpg)
Refer to the exhibit. Which type of physical cable connection is used for the connection between
the Cisco 1841 routers R1 and R2?
USB
console DB-9
serial cable
LAN crossover UTP
LAN straight-through UTP
15 What is the purpose of the routing process?
to encapsulate data that is used to communicate across a network
to select the paths that are used to direct traffic to destination networks
to convert a URL name into an IP address
to provide secure Internet file transfer
to forward traffic on the basis of MAC addresses
16 What occurs during a static NAT translation?
Multiple local addresses are mapped to one global address.
The host device is configured with a permanent outside global address.
A one-to-one mapping is created between an inside local and outside global address.
The router is forced to return the inside global address to the address pool when a session ends.
17
![Page 14: Diskov2](https://reader034.vdocuments.net/reader034/viewer/2022042623/54f6c1cf4a7959123e8b4ac1/html5/thumbnails/14.jpg)
Refer to the exhibit. What two conclusions can be drawn about router RTB? (Choose two.)
The router is connected to a router named Boise.
Router RTB is connected to a Cisco 1841 router.
Router RTB is directly connected to two other routers.
The IP address of the router interface that is connected to router RTB is 192.168.2.6.
The RTB router is connected to two Cisco devices by FastEthernet links.
18 Why is the OSI model useful in network design and assessment?
It combines specific networking tasks into a complex format.
It defines the four lower layers, which standardize applications supported within the model.
It is used during troubleshooting to focus on the entire networking process instead of a single layer.
It divides networking communications into multiple processes that are smaller and more manageable.
19 Which statement correctly describes the operation of DNS?
It uses a local HOSTS file to resolve URLs to IP addresses for internal devices.
It uses a distributed hierarchy of servers to resolve hostnames to IP addresses.
It references a central file that maps hostnames to IP addresses for all Internet hosts.
It uses a single layer of interconnected peer servers to manage hostname-to-IP-address mappings.
![Page 15: Diskov2](https://reader034.vdocuments.net/reader034/viewer/2022042623/54f6c1cf4a7959123e8b4ac1/html5/thumbnails/15.jpg)
20 Which type of WAN connection uses packet-switched connections?
T1
E1
ISDN
Frame Relay
21
Refer to the exhibit. While configuring the serial interface of a router, the network administrator sees the
highlighted error message. What is the reason for this?
The serial interface is administratively down.
The serial interface is already configured with an IP address.
The network administrator has attempted to configure the serial interface with a broadcast address
The same IP address has been configured on another interface.
22
![Page 16: Diskov2](https://reader034.vdocuments.net/reader034/viewer/2022042623/54f6c1cf4a7959123e8b4ac1/html5/thumbnails/16.jpg)
Refer to the exhibit. The Transfer > Capture Text feature available through HyperTerminal has been
used to capture the running configuration on a router. The startup-configuration has been erased from
the router followed by the issuing of the reload command. The startup-config is restored by using
the captured file, but all interfaces on the router are shown as administratively down.
What could cause this problem?
The enable password was incorrectly entered.
The configuration register was not set to 0x2142.
The enable secret password was incorrectly entered.
The no shutdown command must be entered under each interface section in the file being sent.
The captured file should have restored the running configuration not the startup configuration.
23
![Page 17: Diskov2](https://reader034.vdocuments.net/reader034/viewer/2022042623/54f6c1cf4a7959123e8b4ac1/html5/thumbnails/17.jpg)
Refer to the exhibit. Users have been experiencing very poor performance rates to the Internet.
The technician notices a higher than normal CRC count on the FastEthernet 0/0 interface that
connects to the LAN. What is the most likely cause of the high value?
The FastEthernet 0/0 interface is misconfigured in half-duplex mode.
Too many collisions are occurring on the LAN.
Too many packets smaller than 64 bytes are on the network.
Excessive noise is on the line.
The FastEthernet0/0 interface is configured with the wrong encapsulation type.
24 Which technology is used for WAN connections and delivers up to 1.544 Mb/s of symmetrical bandwidth?
DSL
dialup
T1 line
T3 line
25 Which protocol allows encryption of any application layer protocol?
FTP
FTPS
HTTPS
IPsec
![Page 18: Diskov2](https://reader034.vdocuments.net/reader034/viewer/2022042623/54f6c1cf4a7959123e8b4ac1/html5/thumbnails/18.jpg)
Telnet
26 Which scenario may require the use of a crossover UTP cable?
connecting a host to a hub
connecting a host to a switch
connecting a router to a switch
connecting a switch to another switch
27 Which question provides troubleshooting information about a problem at Layer 1 or Layer 2
of the OSI model?
Can the server be reached through Telnet?
Is there a firewall that is configured on the PC?
Is there a link light on the network card?
What addresses are configured in the TCP/IP settings?
28
Refer to the exhibit. Which routing protocol would likely be used to distribute routes between
these routers?
RIP
BGP
OSPF
EIGRP
![Page 19: Diskov2](https://reader034.vdocuments.net/reader034/viewer/2022042623/54f6c1cf4a7959123e8b4ac1/html5/thumbnails/19.jpg)
29 A hacker attempts to reach confidential information that is stored on a server inside the corporate
network. A network security solution inspects the entire packet, determines that it is a threat, and
blocks the packet from entering the inside network. Which security measure protected the network?
an IDS
an IPS
a host-based firewall
Anti-X software
30
Refer to the exhibit. Host H1 is sending a datagram to host H2 across the Internet. NAT will be
configured on RTRC. Which address is considered the inside local address?
10.1.1.1
10.1.1.6
209.165.201.2
209.165.201.17
209.165.200.226
![Page 20: Diskov2](https://reader034.vdocuments.net/reader034/viewer/2022042623/54f6c1cf4a7959123e8b4ac1/html5/thumbnails/20.jpg)