p4s-pdf3

Upload: aditya-lodha

Post on 04-Jun-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 p4s-PDF3

    1/148

    1

    Topic 5Ciscos Wireless Technologies (12 questions)

  • 8/13/2019 p4s-PDF3

    2/148

    2

  • 8/13/2019 p4s-PDF3

    3/148

    3

  • 8/13/2019 p4s-PDF3

    4/148

    4

  • 8/13/2019 p4s-PDF3

    5/148

    5

  • 8/13/2019 p4s-PDF3

    6/148

    6

  • 8/13/2019 p4s-PDF3

    7/148

    7

  • 8/13/2019 p4s-PDF3

    8/148

    8

    Topic 6Identify Network Security (6 questions)

  • 8/13/2019 p4s-PDF3

    9/148

    9

  • 8/13/2019 p4s-PDF3

    10/148

    10

  • 8/13/2019 p4s-PDF3

    11/148

    11

  • 8/13/2019 p4s-PDF3

    12/148

    12

    Topic 7NAT and ACLs(37 questions)

  • 8/13/2019 p4s-PDF3

    13/148

    13

  • 8/13/2019 p4s-PDF3

    14/148

    14

  • 8/13/2019 p4s-PDF3

    15/148

    15

  • 8/13/2019 p4s-PDF3

    16/148

    16

  • 8/13/2019 p4s-PDF3

    17/148

  • 8/13/2019 p4s-PDF3

    18/148

    18

    Answer :

  • 8/13/2019 p4s-PDF3

    19/148

    19

  • 8/13/2019 p4s-PDF3

    20/148

    20

  • 8/13/2019 p4s-PDF3

    21/148

    21

  • 8/13/2019 p4s-PDF3

    22/148

  • 8/13/2019 p4s-PDF3

    23/148

    23

  • 8/13/2019 p4s-PDF3

    24/148

    24

  • 8/13/2019 p4s-PDF3

    25/148

    25

  • 8/13/2019 p4s-PDF3

    26/148

    26

  • 8/13/2019 p4s-PDF3

    27/148

    27

  • 8/13/2019 p4s-PDF3

    28/148

    28

  • 8/13/2019 p4s-PDF3

    29/148

  • 8/13/2019 p4s-PDF3

    30/148

    30

  • 8/13/2019 p4s-PDF3

    31/148

    31

  • 8/13/2019 p4s-PDF3

    32/148

    32

  • 8/13/2019 p4s-PDF3

    33/148

    33

  • 8/13/2019 p4s-PDF3

    34/148

    34

  • 8/13/2019 p4s-PDF3

    35/148

    35

  • 8/13/2019 p4s-PDF3

    36/148

    36

  • 8/13/2019 p4s-PDF3

    37/148

    37

  • 8/13/2019 p4s-PDF3

    38/148

    38

  • 8/13/2019 p4s-PDF3

    39/148

    39

  • 8/13/2019 p4s-PDF3

    40/148

    40

  • 8/13/2019 p4s-PDF3

    41/148

    41

  • 8/13/2019 p4s-PDF3

    42/148

    42

  • 8/13/2019 p4s-PDF3

    43/148

    43

  • 8/13/2019 p4s-PDF3

    44/148

    44

  • 8/13/2019 p4s-PDF3

    45/148

    45

  • 8/13/2019 p4s-PDF3

    46/148

    46

    Topic 8Implement and verify WAN links (26 questions)

  • 8/13/2019 p4s-PDF3

    47/148

    47

  • 8/13/2019 p4s-PDF3

    48/148

    48

  • 8/13/2019 p4s-PDF3

    49/148

    49

  • 8/13/2019 p4s-PDF3

    50/148

    50

  • 8/13/2019 p4s-PDF3

    51/148

    51

  • 8/13/2019 p4s-PDF3

    52/148

    52

  • 8/13/2019 p4s-PDF3

    53/148

    53

  • 8/13/2019 p4s-PDF3

    54/148

    54

  • 8/13/2019 p4s-PDF3

    55/148

    55

  • 8/13/2019 p4s-PDF3

    56/148

    56

  • 8/13/2019 p4s-PDF3

    57/148

    57

  • 8/13/2019 p4s-PDF3

    58/148

    58

  • 8/13/2019 p4s-PDF3

    59/148

    59

  • 8/13/2019 p4s-PDF3

    60/148

    60

  • 8/13/2019 p4s-PDF3

    61/148

    61

  • 8/13/2019 p4s-PDF3

    62/148

    62

  • 8/13/2019 p4s-PDF3

    63/148

    63

  • 8/13/2019 p4s-PDF3

    64/148

    64

  • 8/13/2019 p4s-PDF3

    65/148

    65

  • 8/13/2019 p4s-PDF3

    66/148

    66

  • 8/13/2019 p4s-PDF3

    67/148

    67

  • 8/13/2019 p4s-PDF3

    68/148

    68

  • 8/13/2019 p4s-PDF3

    69/148

    69

    Topic 9Network Case (18 questions)

  • 8/13/2019 p4s-PDF3

    70/148

    70

  • 8/13/2019 p4s-PDF3

    71/148

    71

  • 8/13/2019 p4s-PDF3

    72/148

    72

  • 8/13/2019 p4s-PDF3

    73/148

    73

  • 8/13/2019 p4s-PDF3

    74/148

    74

  • 8/13/2019 p4s-PDF3

    75/148

    75

  • 8/13/2019 p4s-PDF3

    76/148

    76

  • 8/13/2019 p4s-PDF3

    77/148

    77

  • 8/13/2019 p4s-PDF3

    78/148

    78

  • 8/13/2019 p4s-PDF3

    79/148

    79

  • 8/13/2019 p4s-PDF3

    80/148

    80

  • 8/13/2019 p4s-PDF3

    81/148

    81

  • 8/13/2019 p4s-PDF3

    82/148

    82

  • 8/13/2019 p4s-PDF3

    83/148

    83

  • 8/13/2019 p4s-PDF3

    84/148

    84

  • 8/13/2019 p4s-PDF3

    85/148

    85

  • 8/13/2019 p4s-PDF3

    86/148

    86

  • 8/13/2019 p4s-PDF3

    87/148

    87

  • 8/13/2019 p4s-PDF3

    88/148

    88

  • 8/13/2019 p4s-PDF3

    89/148

    89

  • 8/13/2019 p4s-PDF3

    90/148

    90

  • 8/13/2019 p4s-PDF3

    91/148

    91

  • 8/13/2019 p4s-PDF3

    92/148

    92

  • 8/13/2019 p4s-PDF3

    93/148

    93

  • 8/13/2019 p4s-PDF3

    94/148

    94

  • 8/13/2019 p4s-PDF3

    95/148

    95

  • 8/13/2019 p4s-PDF3

    96/148

    96

  • 8/13/2019 p4s-PDF3

    97/148

    97

  • 8/13/2019 p4s-PDF3

    98/148

    98

  • 8/13/2019 p4s-PDF3

    99/148

    99

  • 8/13/2019 p4s-PDF3

    100/148

    100

  • 8/13/2019 p4s-PDF3

    101/148

    101

  • 8/13/2019 p4s-PDF3

    102/148

    102

  • 8/13/2019 p4s-PDF3

    103/148

  • 8/13/2019 p4s-PDF3

    104/148

    104

  • 8/13/2019 p4s-PDF3

    105/148

    105

  • 8/13/2019 p4s-PDF3

    106/148

    106

  • 8/13/2019 p4s-PDF3

    107/148

    107

  • 8/13/2019 p4s-PDF3

    108/148

    108

  • 8/13/2019 p4s-PDF3

    109/148

    109

  • 8/13/2019 p4s-PDF3

    110/148

    110

    Topic 10Update (32 questions)

  • 8/13/2019 p4s-PDF3

    111/148

  • 8/13/2019 p4s-PDF3

    112/148

    112

  • 8/13/2019 p4s-PDF3

    113/148

    113

  • 8/13/2019 p4s-PDF3

    114/148

    114

  • 8/13/2019 p4s-PDF3

    115/148

    115

  • 8/13/2019 p4s-PDF3

    116/148

    116

  • 8/13/2019 p4s-PDF3

    117/148

    117

  • 8/13/2019 p4s-PDF3

    118/148

    118

  • 8/13/2019 p4s-PDF3

    119/148

    119

  • 8/13/2019 p4s-PDF3

    120/148

  • 8/13/2019 p4s-PDF3

    121/148

    121

  • 8/13/2019 p4s-PDF3

    122/148

    122

  • 8/13/2019 p4s-PDF3

    123/148

    123

  • 8/13/2019 p4s-PDF3

    124/148

    124

  • 8/13/2019 p4s-PDF3

    125/148

    125

  • 8/13/2019 p4s-PDF3

    126/148

    126

  • 8/13/2019 p4s-PDF3

    127/148

    127

  • 8/13/2019 p4s-PDF3

    128/148

  • 8/13/2019 p4s-PDF3

    129/148

    129

  • 8/13/2019 p4s-PDF3

    130/148

    130

  • 8/13/2019 p4s-PDF3

    131/148

    131

    Answer :B DThis question is to examine the differences between RIPv1 and RIPv2.

    RIPv1A classful distance vector routing protocol

    Does not support VLSM

    Routing updates are broadcast

    Support auto-summarization.RIPv2

    A classless distance vector routing protocol

    Support VLSM

    Routing updates are multicastSupport manual route summarization.

  • 8/13/2019 p4s-PDF3

    132/148

    132

    Answer: BThis question is to examine the use of ACL.

    According to the information provided in the exhibit, 172.16.16.0 can reach SVR by using SSH. SVR can reach 172.16.16.0 by using telnet.

    So the correct answer is B.

  • 8/13/2019 p4s-PDF3

    133/148

    133

    This question is to examine the show version command.

    By using the show version command, you can display information such as Cisco IOS software version, hardware platform, flash and

    memory size.

    So the correct answer is D.

    This question is to examine the DHCP-related knowledge.

    To display address conflicts found by a Dynamic Host Configuration Protocol (DHCP) server when addresses are offered to the client, use

    the show ip dhcp conflict command in privileged EXEC mode.The server uses ping to detect conflicts. The client uses gratuitous Address Resolution Protocol (ARP) to detect clients. If an address

    conflict is detected, the address is removed from the pool and the address is not assigned until an administrator resolves the conflict.

    The correct answer is A..

  • 8/13/2019 p4s-PDF3

    134/148

    134

    This question is to examine the BPDU Guard

    To prevent loops from occurring in a network, the PortFast mode is supported only on nontrunking access ports because these portstypically do not transmit or receive BPDUs. The most secure implementation of PortFast is to enable it only on ports that connect end

    stations to switches. Because PortFast can be enabled on nontrunking ports connecting two switches, spanning tree loops can occur

    because BPDUs are still being transmitted and received on those ports.

    The PortFast BPDU guard feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on thatport. When the BPDU guard feature is enabled on the switch, spanning tree shuts down PortFast-configured interfaces that receive BPDUs,

    instead of putting them into the spanning tree blocking state. In a valid configuration, PortFast-configured interfaces do not receive

    BPDUs. If a PortFast-configured interface receives a BPDU, an invalid configuration exists, such as connection of an unauthorized device.

    The BPDU guard feature provides a secure response to invalid configurations because the administrator must manually put the interfaceback in service.So the correct answer is D.

    This question is to check the trunking protocol.

    IGP is an interior gateway protocol and also a routing protocol, such as OSPF and EIGRP.

    802.1q and ISL are trunking protocols which can be used to carry the traffic of multiple VLANs over a single link. ISL is a Cisco proprietaryprotocol.

    802.3u (100Base-T) is 100 Mbps Ethernet standard.Andswer B D

  • 8/13/2019 p4s-PDF3

    135/148

    135

    This question is to examine the data link layer protocols.

    LAPB: Link Access Procedure Balanced for x.25PPP: Point-to-Point Protocol

    HDLC: High-Level Data Link Control

    Frame-relay and the three protocols above are data link layer protocols. HDLC is the default serial encapsulation protocol.The correct answer is C.

    This question is to examine the command show arp.

    The show arp command is used to check the corresponding relationship between IP address and MAC address of a device.

    So the correct answer is B.

  • 8/13/2019 p4s-PDF3

    136/148

    136

    This question is to examine the CDP protocol configuration.

    Cisco Discovery Protocol (CDP) is primarily used to obtain protocol addresses of neighboring devices and discover the platform of those

    devices.

    The cdp run command is used to enable CDP globally on the router.To enable CDP on an interface, use the cdp enable command.The correct answer is C.

    This question is to examine the STP protocol.STP (802.1d) is used to prevent Layer 2 loops.

    802.1q is a Frame Relay protocol which belongs to VLAN.SAP is a concept of the OSI model.

    So the correct answers are A and D.

  • 8/13/2019 p4s-PDF3

    137/148

    137

    This question is to examine the concept of the private IP address.

    Class A: 10.0.0.0 --10.255.255.255

    Class B: 172.16.0.0--172.31.255.255

    Class C: 192.168.0.0--192.168.255.255The three classes of addresses shown above cannot be used on the Internet, they can only be used for the interior LAN addressing

    scheme. Because of the practical exhaustion of the IPv4 address space, private IP addresses are generated to save the address resources.

    The correct answer is C.

    This question is to examine the OSI model.

    Two hosts are communicating through Internet. The communication process includes encapsulation and de-encapsulation.

    From down to top, de-encapsulation is required.

    From top to down, encapsulation is required.So the correct answer is C.

  • 8/13/2019 p4s-PDF3

    138/148

    138

    This question is to examine the IP addressing scheme.

    According to this question, we can know that the real examination point is the valid IP address range of the 192.168.5.32/28 network,which is 192.168.5.33~192.168.5.46.

    The correct answer is C.

    This question is to examine the static route-related concept.

    ip route 172.16.3.0 255.255.255.0 192.168.2.4

    This is a static route configuration command. 172.16.3.0 is the destination network, 192.168.2.4 is the next hop.

    The administrative distance is not configured, so the default administrative distance is used.The correct answers are A and D.

  • 8/13/2019 p4s-PDF3

    139/148

    139

    This question is to examine the Cisco IOS management.

    Prior to backing up an IOS image to a TFTP server, the following actions should be taken:

    Ensure the accessibility between the TFTP server and the device.Use the show version command to examine the IOS information to ensure that the network server has adequate space for the IOS image.

    So we choose A, C, D.

    This question is to examine the trace route command.When checking the network connectivity, we often use the ping command or the trace route command. And the trace route command can

    also trace the network path of Internet routers that packets take as they are forwarded from your computer to a destination address.The correct answer is C.

  • 8/13/2019 p4s-PDF3

    140/148

    140

    This question is to examine the network addressing scheme.

    When designing a network, Cisco recommends three layers structure: Core Layer, Convergence Layer and Access Layer. IP addresses willbe assigned to different subnets.

    The benefits by doing this are: ease of management and troubleshooting, reducing routing table entries and router's burden after

    continuous IP addresses are summarized.The correct answers are A and D.

    This question is to examine QoS.

    Quality of Service is a network security mechanism, which is used to resolve the network delay problem. This mechanism is essential to

    multimedia application. When the network is overloaded, QoS will prevent a possible delay in the important data transmission and ensure

    the efficient operation of the network.

    The correct answer is B.

  • 8/13/2019 p4s-PDF3

    141/148

    141

    This question is to examine the OSI reference model.

    The Application layer is responsible for identifying and establishing the availability of the intended communication partner and determining

    whether sufficient resources for the intended communication exist.The correct answer is D.

    This question is to examine the use of NAT.

    A global address pool is defined here.

    ip nat pool pool_name start-ip end-ip IP prefix-length number

    According to this question, the subnet mask is /21.The correct answer is A.

  • 8/13/2019 p4s-PDF3

    142/148

    142

    This question is to examine the show ip arp command.

    To display the Address Resolution Protocol (ARP) cache, where SLIP addresses appear as permanent ARP table entries, use the show iparp EXEC command.

    Age in minutes of the cache entry. A hyphen (-) means the address is local.The correct answer is B.

    This question is to examine the concept of the distance vector routing protocol.After a distance-vector routing protocol is started on each router, the routing tables are updated with all route information gathered from

    neighbor routers and send periodic updates regardless of topology changes. For example, RIP updates are sent every 30 seconds by

    default. The correct answers are A and D.

  • 8/13/2019 p4s-PDF3

    143/148

    143

    This question is to examine the ARP working principle.When Host A doesn'tknowthe MAC address of Host B,the ARP request will be broadcast so that all hosts on the LAN can see this

    request. If the IP is not local,the router will check its routing table to see whether there is a route to the destination network.If there is

    ,the router will reply with its own MAC address.

    So C is correct.

    This question is to examine the MAC address structure.The MAC address is expressed as a 48-bit hexadecimal number. The first 24-bit number is to identify the vendor/manufacturer, also calledOUI. The latter 24-bit is assigned by the vendor.The correct answer is C.

  • 8/13/2019 p4s-PDF3

    144/148

  • 8/13/2019 p4s-PDF3

    145/148

    145

    This question is to examine the layer 2 port security.According to the exhibit, we know that the port security is configured to restrict the interface in the event of a violation. So A is wrong.

    The port security should be enabled on the interface, not globally.So the correct answers are B and D.

  • 8/13/2019 p4s-PDF3

    146/148

    146

    This question is to examine the IP addressing scheme.In the serial port network, only two IP addresses can be assigned. In order to save IP addresses, we often use the /30 subnet mask.

    So the correct answer is D.

  • 8/13/2019 p4s-PDF3

    147/148

  • 8/13/2019 p4s-PDF3

    148/148