Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

WAN Final

        Help!  

Question
Answer
The following commands were entered on a router: Router(config)# access-list 2 deny 172.16.5.24 Router(config)# access-list 2 permit any The ACL is correctly applied to an interface. What can be concluded about this set of commands?   show
🗑
show The second ACL is applied to the interface, replacing the first.  
🗑
show 1. Extended ACLs evaluate the source and destination addresses. 2. Port numbers can be used to add greater definition to an ACL.  
🗑
Which benefit does an extended ACL offer over a standard ACL?   show
🗑
Which three statements describe ACL processing of packets? (Choose three.)   show
🗑
Which feature will require the use of a named ACL rather than a numbered ACL?   show
🗑
Which two statements are true regarding the significance of the access control list wildcard mask 0.0.0.7? (Choose two.)   show
🗑
Where should a standard access control list be placed?   show
🗑
show by source IP address  
🗑
Which two statements are true regarding named ACLs? (Choose two.)   show
🗑
show 1. FTP traffic originating from network 172.16.3.0/24 is denied. 2. Web traffic originating from 172.16.3.0 is permitted.  
🗑
Which statement about standard ACLs is true?   show
🗑
show 1. protocol suite 2. source address 3. destination address  
🗑
By default, how is IP traffic filtered in a Cisco router?   show
🗑
A network admin needs to allow tfc through the forward rtr for sessions that originate from within the company net, but the admin must block tfc for sessions that originate outside the network of the company. What type of ACL is most appropriate?   show
🗑
A technician is creating an ACL and needs a way to indicate only the subnet 172.16.16.0/21. Which combination of network address and wildcard mask will accomplish the desired task?   show
🗑
show 1. extended ACL 2. authentication 3. Telnet connectivity  
🗑
show 1. Extended ACLs are created in int config mode. 2. Standard IP ACLs are numbered 1 to 99, and extended ACLs are numbered 100 to 199.  
🗑
show Because ACLs are executed in order, they should be organized from the most specific condition to the most general.  
🗑
What occurs if the network admin applies an IP ACL that has no permit statement outbound on an int? (Choose two.)   show
🗑
Which solutions can be implemented with ACLs? (Choose two.)   show
🗑
Cmd : Any   show
🗑
show Description: Reveals the ACLs and interface assignments on a rtr  
🗑
Cmd: show access-list   show
🗑
show Description: Substitutes for the 0.0.0.0 mask.  
🗑
Cmd: show ip int   show
🗑
show 192.168.12.84 0.0.0.7  
🗑
show Named ACL  
🗑
An admin wants to implement lock-and-key access to a host within the company net for specific users who are connecting from outside the company network. What type of ACL would best suit the situation?   show
🗑
show Time-based ACL  
🗑
Which statement correctly descripes a reflexive ACL?   show
🗑
show Standard  
🗑
show Extended  
🗑
Which ACL checks protocols and port numbers   show
🗑
Which ACL permits/denies only entire protocols based on network address   show
🗑
Which ACL uses access list numbers 1 to 99   show
🗑
Which ACL checks source and destination address   show
🗑
show 1. All FTP tfc from net 178.15.0.0. will be permitted. 2. Telnet will not be permitted from any hosts on net 178.15.0.0 to any destination.  
🗑
What are two Layer 2 WAN technologies that can provide secure remote connections between corporate branch offices? (Choose two.)   show
🗑
Which two OSI Layer 1 specifications does DOCSIS define for a cable Internet connection? (Choose two.)   show
🗑
Which medium is used for delivering data via DSL technology through PSTN?   show
🗑
show cable  
🗑
show 1. The PPP configuration is on the dialer interface. 2. The Ethernet interface does not have an IP address.  
🗑
DOCSIS specifies the ”???“ sub-layer as a Layer 2 requirement that defines either a deterministic access method, TDMA, or S-CDMA.   show
🗑
“???” creates a PPP tunnel through the DSL connection for the purpose of sending PPP frames.   show
🗑
What functionality is required on routers to provide remote workers with VoIP and videoconferencing capabilities?   show
🗑
show Municipal Wi-Fi  
🗑
show To accommodate the PPPoE headers  
🗑
show DOCSIS  
🗑
Which two network components does a teleworker require to connect remotely and securely from home to the corporate network? (Choose two.)   show
🗑
show Internet  
🗑
show S-CDMA  
🗑
How is voice traffic affected when the customer uses ADSL technology?   show
🗑
show VPN  
🗑
What are two characteristics of a PPPoE configuration on a Cisco customer router? (Choose two.)   show
🗑
show DSL is not a shared medium.  
🗑
show 1. increased difficulty of tracking task progress 2. the need to implement a new management style  
🗑
Which DSL technology provides higher downstream bandwidth to the user than upstream bandwidth?   show
🗑
Which networking technology will ensure reliable and secure remote access when a teleworker connects to a corporate network?   show
🗑
show satellite  
🗑
Which type of long distance telecommunication technology provides point-to-point connections and cellular access?   show
🗑
show QoS  
🗑
A company is looking for the least expensive broadband solution that provides at least 10 Mb/s download speed. The company is located 5 miles from the nearest provider. Which broadband solution would be appropriate?   show
🗑
show 1. It uses a wide band of frequencies. 2. It offers sustained speeds of 128 kbps or more.  
🗑
When accommodating a teleworker, which type of connection should be used when mobile access during traveling is required and broadband options are available?   show
🗑
When comparing DOCSIS and Euro-DOCSIS, what is the primary difference between the two specs?   show
🗑
show 1. ADSL typically has a higher download bandwidth than upload. 2. DSL speed can exceed the speed of a typical T1. 3. Transfer rates vary according to the length of the local loop.  
🗑
show 1. Microfilter 2. DSL Transceiver  
🗑
Which techniques can be used to secure the traffic sent over a VPN connection? (Choose two.)   show
🗑
show Authentication  
🗑
What VPN characteristic prevents tampering and alterations to dats while data travels between the source and destination?   show
🗑
What VPN characteristic protects the contents of messages from interception by unauthenticated or unauthorized sources?   show
🗑
What VPN characteristic uses hashes?   show
🗑
show Authentication  
🗑
show Data confidentiality.  
🗑
show GRE  
🗑
Which type of tunneling protocol uses frame relay, ATM, MPLS   show
🗑
show Encapsulating protocol.  
🗑
show Passenger protocol  
🗑
Which type of tunneling protocol uses IPX, AppleTalk, IPV4 and IPV6?   show
🗑
Which type of tunneling protocol uses GRE, IPSec, L2F, PPTP, L2TP?   show
🗑
show Carrier Protocol  
🗑
show Symmetric  
🗑
Which algorithm uses public key cryptography?   show
🗑
show Asymmetric  
🗑
show Symmetric  
🗑
show Asymmetric  
🗑
show Symmetric  
🗑
Which wireless std operates in both licensed and unlicensed bands of the spectrum from 2 to 6 GHz and allows for tx rates of 70 Mbps at a range of up to 50 km?   show
🗑
What do cable providers typically deploy to sp high-speed transmissions of data to SOHO cable modems?   show
🗑
show 64  
🗑
show 16  
🗑
show Enter the interface programming mode for each IPv6 interface and enable IPng RIP.  
🗑
show PAT uses unique source port numbers to distinguish between translations.  
🗑
What are two benefits of NAT? (Choose two.)   show
🗑
What type of NAT should a network administrator use to ensure that a web server on the inside network is always available to the outside network?   show
🗑
A technician has been told by a supervisor to always clear any dynamic translations before attempting to troubleshoot a failed NAT connection. Why has the supervisor issued these instructions?   show
🗑
A network administrator wants to connect two IPv6 islands. The easiest way is through a public network that uses only IPv4 equipment. What simple solution solves the problem?   show
🗑
Which statements are true about the DHCP server functions? (Choose two.)   show
🗑
Refer to the following config: R1(config)# ip dhcp pool 10.10.10.10 What does the string 10.10.10.10 after the ip dhcp pool command specify?   show
🗑
show 1. DHCP messages use UDP as a transport protocol. 2. The DHCPOFFER message is sent by the DHCP server after receiving a DHCPDISCOVER message from a client. 3. DHCP uses ports 67 and 68.  
🗑
If an admin chooses to avoid using NAT overload, what is the default timeout value for NAT translations?   show
🗑
Which NAT characteristic provides one-to-one fixed mappings of local and global addresses?   show
🗑
show Dynamic NAT  
🗑
show NAT with Overload  
🗑
show NAT with Overload  
🗑
Which NAT characteristic allows an external host to establish sessions with an internal host?   show
🗑
show Static NAT  
🗑
show 1. RPIng has a limit of 15 hops. 2. RIPng uses poison reverse.  
🗑
show 1. DHCPv6 2. Stateless autoconfiguration.  
🗑
show ip name-server  
🗑
What IPv6 command defines a static hostname-to-address mapping   show
🗑
What IPv6 command configures a global IPv6 adress?   show
🗑
show ipv6 unicast-routing  
🗑
show ipv6 router rip name  
🗑
Given 2031:0000:0300:0000:00C0:8000:130B, which options are equivalent representations of the full IPv6 address? (Choose 3.)   show
🗑
What combination of IP address and wildcard mask should be used to specify only the last 8 addresses in the subnet 192.168.3.32/28?   show
🗑
Excessive broadcasts are generally a symptom of a problem at which layer?   show
🗑
A network administrator has received complaints that users on a local LAN can retrieve e-mail from a remote e-mail server but are unable to open web pages. Services at which two layers of the OSI model should be investigated? (Choose two.)   show
🗑
show determining ownership  
🗑
show data link  
🗑
show bottom up  
🗑
show physical  
🗑
Users on the Internal LAN are unable to connect to the www server. The network administrator pings the server and verifies that NAT is functioning correctly. Which OSI layer should the administrator begin to troubleshoot next?   show
🗑
show 1. The top layer of the TCP/IP model combines the functions of the top three OSI layers. 2. The TCP/IP network access layer corresponds to the OSI physical and data link layers.  
🗑
Which two steps should be taken during the process of creating network documentation? (Choose two.)   show
🗑
What is one example of a physical layer problem?   show
🗑
Clients are reporting poor performance. Internet access and applications running across the WAN are performing normally. The net admin sees a continual broadcast of jabber on the app svr LAN in the data center on a protocol analyzer. Now what   show
🗑
show baselining tool  
🗑
A technician has been asked to troubleshoot an existing switched network but is unable to locate documentation for the VLAN configuration. Which troubleshooting tool allows the technician to map and discover VLAN and port assignments?   show
🗑
show 1. interface identifiers 2. DLCI for virtual circuits  
🗑
Which two components should be taken into consideration when establishing a network baseline? (Choose two.)   show
🗑
Which three approaches should be used when attempting to gather data from users for troubleshooting? (Choose three.)   show
🗑
show Layer 1, Layer 2, and Layer 3  
🗑
In which type of diagram will you find a cable type?   show
🗑
In which type of diagram will you find an IP address and subnet?   show
🗑
show A logical diagram.  
🗑
In which type of diagram will you find a device ID?   show
🗑
In which type of diagram will you find the OS version?   show
🗑
show A physical diagram.  
🗑
In which type of diagram will you find the routing protocols?   show
🗑
In which type of diagram will you find the connector type?   show
🗑
What is one symptom of a physical layer problem?   show
🗑
show Data link layer.  
🗑
show Both users and app layer processes interact with software apps that contain a communications component in the OSI model.  
🗑
show 1. EIGRP 2. IP 3. RIP  
🗑
Which port is associated with FTP?   show
🗑
show 80  
🗑
show 110  
🗑
Which port is associated with SMTP?   show
🗑
Which port is associated with SNMP?   show
🗑
Which port is associated with Telnet?   show
🗑
A technician has been asked to t/s a simple net problem that seems to be caused by software. Which t/s approach would you recommend?   show
🗑
show 1. What does work? 2. When did you first notice the problem? 3. When did the problem first occur?  
🗑
show Cable analyser  
🗑
show 1. Network configuration tables. 2. Network topology diagrams. 3. End-system configuration tables.  
🗑
What are the steps for establishing a net baseline? (Choose three.)   show
🗑
What is associated with the first step of correcting application layer problems?   show
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: evilfrosty
Popular Computers sets