Sunteți pe pagina 1din 7

Refer to the exhibit.

A network administrator configures a standard access control list on


Router1 to prohibit traffic from the 192.168.0.0/24 network from reaching the Internet.
The access control list also permits traffic from the 192.168.0.0/24 network to reach the
192.168.1.0/24 network. On which interface and in which direction should the access
control list be applied?
interface Fa0/0, inbound
interface Fa0/0, outbound
interface S0/0/0, inbound
interface S0/0/0, outbound

11
Refer to the exhibit. The corporate network that is shown has been assigned network 172.16.128.0/19 for
branch office LANs. If VLSM is used, what mask should be used for addressing hosts at Branch4 with m
waste from unused addresses?
/19
/20
/21
/22
/23
/24

Which two statements are true about IPv6 link local addresses? (Choose two.)
14 They begin with the 2000::/3 prefix.
They begin with the FE80::/10 prefix.
They are assigned by IANA to an organization.
They must be manually configured by the administrator.
They are assigned to a host by a stateless autoconfiguration process.
Refer to the exibit. A network technician has configured the Frame Relay network but is
unable to ping between R1 and R2. What set of commands must the technician issue to
fix this problem?
R2(config-if)# no frame-relay map ip 10.1.1.2 102 broadcast
R2(config-if)# frame-relay map ip 10.1.1.1 201 broadcast
R1(config-if)# no frame-relay map ip 10.1.1.2 201 broadcast
R1(config-if)# frame-relay map ip 10.1.1.1 102 broadcast
R2(config-if)# no frame-relay map ip 10.1.1.2 102 broadcast
R2(config-if)# frame-relay map ip 10.1.1.2 201 broadcast
R1(config-if)# no frame-relay map ip 10.1.1.1 201 broadcast
R1(config-if)# frame-relay map ip 10.1.1.2 102 broadcast

22
Refer to the exhibit. Every time the administrator reboots this router, the boot process ends in setup mode
is a possible problem?
There is insufficient RAM for the IOS to load on this router.
A password recovery process should be done on this router.
The bootstrap version and the version of the IOS are different.
The IOS image is damaged and must be reloaded using tftpdnld.
The configuration register is set to ignore the startup configuration.

Compared with IDS systems, what can IPS systems do to provide further protection of
computer systems?
detect potential attacks
stop the detected attack from executing
update OS patches for computer systems
scan computer systems for viruses and spyware

37 An administrator learns of an e-mail that has been received by a number of users in the company. This e-
appears to come from the office of the administrator. The e-mail asks the users to confirm their account a
password information. Which type of security threat does this e-mail represent?
cracking
phishing
phreaking
spamming

Which two statements describe IPv6 link-local addresses? (Choose two.)


40 They are not forwarded by routers.
They start with binary value of 001.
They are routable only within an organization.
The prefix must begin with hexadecimal FE8 – FEB.
They are assigned to an organization by a regional registry.
They make up a large part of the public IPv6 address space.

41 A network technician analyzes the network and notices late collisions. The collisions occur accompanied
jabber that originates from the server. What is the likely cause of the problem?
faulty switch port
web server CPU overload
faulty NIC in the web server
misconfiguration of web server services

45 What is tunneling?
using digital certificates to ensure that data endpoints are authentic
creating a hash to ensure the integrity of data as it traverses a network
using alternate paths to avoid access control lists and bypass security measures
encapsulating an entire packet within another packet for transmission over a network

48 Which configuration on the vty lines provides the best security measure for network administrators to rem
access the core routers at headquarters?
50
Refer to the exhibit. A network administrator is trying to connect R1 remotely to make configuration cha
Based on the exhibited command output, what will be the result when attempting to connect to R1?
failure to connect due to Telnet not being enabled
failure to connect due to incomplete configuration for Telnet
a successful connection and ability to make configuration changes
a successful connection but inability to make configuration changes because of the absence of an ena
secret password

S-ar putea să vă placă și