WAN Final
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
The following commands were entered on a router: Router(config)# access-list 2 deny 172.16.5.24 Router(config)# access-list 2 permit any The ACL is correctly applied to an interface. What can be concluded about this set of commands? | show 🗑
|
||||
show | The second ACL is applied to the interface, replacing the first.
🗑
|
||||
Which two statements are correct about extended ACLs? (Choose two) | show 🗑
|
||||
Which benefit does an extended ACL offer over a standard ACL? | show 🗑
|
||||
show | 1. An implicit deny any rejects any packet that does not match any ACL statement.
2. A packet can either be rejected or forwarded as directed by the statement that is matched.
3. Each statement is checked only until a match is detected or until the end
🗑
|
||||
show | the ability to edit the ACL and add additional statements in the middle of the list without removing and re-creating the list
🗑
|
||||
Which two statements are true regarding the significance of the access control list wildcard mask 0.0.0.7? (Choose two.) | show 🗑
|
||||
Where should a standard access control list be placed? | show 🗑
|
||||
show | by source IP address
🗑
|
||||
show | 1. Names can be used to help identify the function of the ACL.
2. Certain complex ACLs, such as reflexive ACLs, must be defined with named ACLs.
🗑
|
||||
Which two statements are true regarding the following extended ACL? (Choose two.) access-list 101 deny tcp 172.16.3.0 0.0.0.255 any eq 20 access-list 101 deny tcp 172.16.3.0 0.0.0.255 any eq 21 access-list 101 permit ip any any | show 🗑
|
||||
Which statement about standard ACLs is true? | show 🗑
|
||||
Which three parameters can ACLs use to filter traffic? (Choose three.) | show 🗑
|
||||
By default, how is IP traffic filtered in a Cisco router? | show 🗑
|
||||
A network admin needs to allow tfc through the forward rtr for sessions that originate from within the company net, but the admin must block tfc for sessions that originate outside the network of the company. What type of ACL is most appropriate? | show 🗑
|
||||
show | 172.16.16.0 0.0.7.255
🗑
|
||||
Which three items must be configured before a dynamic ACL can become active on a router? (Choose three.) | show 🗑
|
||||
show | 1. Extended ACLs are created in int config mode.
2. Standard IP ACLs are numbered 1 to 99, and extended ACLs are numbered 100 to 199.
🗑
|
||||
show | Because ACLs are executed in order, they should be organized from the most specific condition to the most general.
🗑
|
||||
show | 1. All tfc outbound is denied.
2. Only tfc originating from the rtr is allowed outbound.
🗑
|
||||
Which solutions can be implemented with ACLs? (Choose two.) | show 🗑
|
||||
show | Description: Represents an IP address and mask pair of 0.0.0.0 255.255.255.255
🗑
|
||||
Cmd: show running-config | show 🗑
|
||||
Cmd: show access-list | show 🗑
|
||||
Cmd: host | show 🗑
|
||||
show | Description: Indicates whether any ACLs are set on a rtr
🗑
|
||||
Which IP add and w/c mask test for hosts from an entire subnet of net 192.168.12.0 using a 29-bit mask? | show 🗑
|
||||
show | Named ACL
🗑
|
||||
show | Dynamic
🗑
|
||||
What type of ACL should the net admin implement to limit Internet tfc during peak hours of the day? | show 🗑
|
||||
show | An ACL that allows IP tfc for sessions originating from inside the network while denying tfc for sessions originating from the outside.
🗑
|
||||
Which ACL checks only the source address. | show 🗑
|
||||
show | Extended
🗑
|
||||
Which ACL checks protocols and port numbers | show 🗑
|
||||
show | Standard
🗑
|
||||
show | Standard
🗑
|
||||
show | Extended
🗑
|
||||
Refer to the following config. Which statement best describes tfc on the net? acc-l 199 deny tcp 178.15.0.0. 0.0.255.255 any eq 23 acc-l 199 permit ip any any | show 🗑
|
||||
What are two Layer 2 WAN technologies that can provide secure remote connections between corporate branch offices? (Choose two.) | show 🗑
|
||||
Which two OSI Layer 1 specifications does DOCSIS define for a cable Internet connection? (Choose two.) | show 🗑
|
||||
show | copper
🗑
|
||||
show | cable
🗑
|
||||
What are two characteristics of a PPPoE configuration on a Cisccustomer router? (Choose two.) | show 🗑
|
||||
show | MAC
🗑
|
||||
show | PPPoE
🗑
|
||||
show | QoS
🗑
|
||||
show | Municipal Wi-Fi
🗑
|
||||
show | To accommodate the PPPoE headers
🗑
|
||||
show | DOCSIS
🗑
|
||||
Which two network components does a teleworker require to connect remotely and securely from home to the corporate network? (Choose two.) | show 🗑
|
||||
In which layer of the TCP/IP protocol model does IPsec apply security to network data? | show 🗑
|
||||
show | S-CDMA
🗑
|
||||
show | ADSL signals can distort voice transmissions.
🗑
|
||||
Which technology provides a secure connection between a SOHO and the headquarters office? | show 🗑
|
||||
What are two characteristics of a PPPoE configuration on a Cisco customer router? (Choose two.) | show 🗑
|
||||
show | DSL is not a shared medium.
🗑
|
||||
show | 1. increased difficulty of tracking task progress
2. the need to implement a new management style
🗑
|
||||
Which DSL technology provides higher downstream bandwidth to the user than upstream bandwidth? | show 🗑
|
||||
show | an encrypted VPN tunnel
🗑
|
||||
show | satellite
🗑
|
||||
show | WiMax
🗑
|
||||
What functionality is required on routers to provide remote workers with VoIP and videoconferencing capabilities? | show 🗑
|
||||
show | cable
🗑
|
||||
show | 1. It uses a wide band of frequencies.
2. It offers sustained speeds of 128 kbps or more.
🗑
|
||||
show | Dialup.
🗑
|
||||
show | Channel bandwidths
🗑
|
||||
show | 1. ADSL typically has a higher download bandwidth than upload.
2. DSL speed can exceed the speed of a typical T1.
3. Transfer rates vary according to the length of the local loop.
🗑
|
||||
show | 1. Microfilter
2. DSL Transceiver
🗑
|
||||
Which techniques can be used to secure the traffic sent over a VPN connection? (Choose two.) | show 🗑
|
||||
show | Authentication
🗑
|
||||
show | Data integrity.
🗑
|
||||
What VPN characteristic protects the contents of messages from interception by unauthenticated or unauthorized sources? | show 🗑
|
||||
show | Data integrity.
🗑
|
||||
What VPN characteristic ensures that communicating peers are who they say they are? | show 🗑
|
||||
What VPN characteristic uses encapsulation and encryption? | show 🗑
|
||||
Which is an example of a tunneling protocol developed by Cisco? | show 🗑
|
||||
show | Carrier Protocol
🗑
|
||||
show | Encapsulating protocol.
🗑
|
||||
show | Passenger protocol
🗑
|
||||
Which type of tunneling protocol uses IPX, AppleTalk, IPV4 and IPV6? | show 🗑
|
||||
Which type of tunneling protocol uses GRE, IPSec, L2F, PPTP, L2TP? | show 🗑
|
||||
show | Carrier Protocol
🗑
|
||||
show | Symmetric
🗑
|
||||
show | Asymmetric
🗑
|
||||
Which algorithm has encryption and decryption use different keys? | show 🗑
|
||||
Which algorithm uses DES, 3DES and AES? | show 🗑
|
||||
Which algorithm uses RSA? | show 🗑
|
||||
Which algorithm uses shared secret key cryptography? | show 🗑
|
||||
show | 802.16
🗑
|
||||
What do cable providers typically deploy to sp high-speed transmissions of data to SOHO cable modems? | show 🗑
|
||||
show | 64
🗑
|
||||
show | 16
🗑
|
||||
show | Enter the interface programming mode for each IPv6 interface and enable IPng RIP.
🗑
|
||||
show | PAT uses unique source port numbers to distinguish between translations.
🗑
|
||||
What are two benefits of NAT? (Choose two.) | show 🗑
|
||||
What type of NAT should a network administrator use to ensure that a web server on the inside network is always available to the outside network? | show 🗑
|
||||
show | Because entries can be cached for long periods of time, the supervisor wants to prevent decisions being made based on old data.
🗑
|
||||
show | Use tunneling to encapsulate the IPv6 traffic in the IPv4 protocol.
🗑
|
||||
show | 1. Clients can be assigned an IP address from a predefined DHCP pool for a finite lease period.
2. DHCP provides clients with an IP address, subnet mask, default gateway and domain name.
🗑
|
||||
Refer to the following config: R1(config)# ip dhcp pool 10.10.10.10 What does the string 10.10.10.10 after the ip dhcp pool command specify? | show 🗑
|
||||
show | 1. DHCP messages use UDP as a transport protocol.
2. The DHCPOFFER message is sent by the DHCP server after receiving a DHCPDISCOVER message from a client.
3. DHCP uses ports 67 and 68.
🗑
|
||||
show | One day.
🗑
|
||||
Which NAT characteristic provides one-to-one fixed mappings of local and global addresses? | show 🗑
|
||||
Which NAT characteristic assigns the translated address of IP hosts from a pool of public adresses? | show 🗑
|
||||
show | NAT with Overload
🗑
|
||||
Which NAT characteristic assigns unique source port numbers of an inside global address on a session-by-session basis? | show 🗑
|
||||
Which NAT characteristic allows an external host to establish sessions with an internal host? | show 🗑
|
||||
show | Static NAT
🗑
|
||||
Which statement accurately describes the RIPng routing protocol? | show 🗑
|
||||
Which methods of assigning an IPv6 address to an int are automatic and can be used in conjunction with each other? | show 🗑
|
||||
What IPv6 command specifies the DNS server used by the router? | show 🗑
|
||||
show | ipv6 hostname
🗑
|
||||
What IPv6 command configures a global IPv6 adress? | show 🗑
|
||||
show | ipv6 unicast-routing
🗑
|
||||
show | ipv6 router rip name
🗑
|
||||
show | 1. 2031:0:300::C0:8000:130B
2. 2031:0:0300:0:0:C0:8000:130B
3. 2031::300:0:0:0C0:8000:130B
🗑
|
||||
What combination of IP address and wildcard mask should be used to specify only the last 8 addresses in the subnet 192.168.3.32/28? | show 🗑
|
||||
show | data link
🗑
|
||||
show | 1. transport layer
2. application layer
🗑
|
||||
When gathering symptoms for troubleshooting a network problem, which step could result in getting an external administrator involved in the process? | show 🗑
|
||||
Encapsulation errors from mismatched WAN protocols on a serial link between two routers indicate a problem at which OSI layer? | show 🗑
|
||||
Which troubleshooting approach is suggested for dealing with a complex problem that is suspected of being caused by faulty network cabling? | show 🗑
|
||||
show | physical
🗑
|
||||
show | application
🗑
|
||||
Which two statements are true concerning logical networking models? (Choose two.) | show 🗑
|
||||
show | 1. Record the information about the devices discovered in the entire network, including the remote locations.
2. Transfer any information about the devices from the network configuration table that corresponds to a component of the topology diagram.
🗑
|
||||
show | incorrect clock rate
🗑
|
||||
show | The jabber in the data center indicates a local physical layer problem. Use the protocol analyzer to determine the source of the jabber, and then check for a recent NIC driver update or bad cabling.
🗑
|
||||
A technician has been asked to make several changes to the configuration and topology of a network and then determine the outcome of the changes. What tool can be used to determine the overall effect caused by the changes? | show 🗑
|
||||
A technician has been asked to troubleshoot an existing switched network but is unable to locate documentation for the VLAN configuration. Which troubleshooting tool allows the technician to map and discover VLAN and port assignments? | show 🗑
|
||||
Which two pieces of information are typically found on a logical network diagram? (Choose two.) | show 🗑
|
||||
show | 1. information about the network design
2. expected performance under normal operating conditions
🗑
|
||||
Which three approaches should be used when attempting to gather data from users for troubleshooting? (Choose three.) | show 🗑
|
||||
Information about which OSI layers of connected Cisco devices can be verified with the show cdp neighbors command? | show 🗑
|
||||
show | A physical diagram.
🗑
|
||||
In which type of diagram will you find an IP address and subnet? | show 🗑
|
||||
In which type of diagram will you find a connection type? | show 🗑
|
||||
In which type of diagram will you find a device ID? | show 🗑
|
||||
In which type of diagram will you find the OS version? | show 🗑
|
||||
In which type of diagram will you find the device type and model? | show 🗑
|
||||
show | A logical diagram.
🗑
|
||||
show | A physical diagram.
🗑
|
||||
show | High CPU utilization.
🗑
|
||||
A net admin receives the output "S0 is ip, line protocol is down" from the show int s0 cmd. At what layer is the problem most likely being caused? | show 🗑
|
||||
show | Both users and app layer processes interact with software apps that contain a communications component in the OSI model.
🗑
|
||||
Which protocols can be involved in network layer problems? (Choose three.) | show 🗑
|
||||
Which port is associated with FTP? | show 🗑
|
||||
show | 80
🗑
|
||||
show | 110
🗑
|
||||
show | 25
🗑
|
||||
Which port is associated with SNMP? | show 🗑
|
||||
show | 23
🗑
|
||||
show | top-down
🗑
|
||||
show | 1. What does work?
2. When did you first notice the problem?
3. When did the problem first occur?
🗑
|
||||
show | Cable analyser
🗑
|
||||
show | 1. Network configuration tables.
2. Network topology diagrams.
3. End-system configuration tables.
🗑
|
||||
show | 1. Determine the types of data to be collected and evaluated.
2. Identify the devices and ports to be monitored.
3. Determine the duration for baseline testing to establish a typical picture of the network .
🗑
|
||||
show | Making a backup of configurations.
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
evilfrosty
Popular Computers sets