Documente Academic
Documente Profesional
Documente Cultură
11
Refer to the exhibit. The corporate network that is shown has been assigned network 172.16.128.0/19 for
branch office LANs. If VLSM is used, what mask should be used for addressing hosts at Branch4 with m
waste from unused addresses?
/19
/20
/21
/22
/23
/24
Which two statements are true about IPv6 link local addresses? (Choose two.)
14 They begin with the 2000::/3 prefix.
They begin with the FE80::/10 prefix.
They are assigned by IANA to an organization.
They must be manually configured by the administrator.
They are assigned to a host by a stateless autoconfiguration process.
Refer to the exibit. A network technician has configured the Frame Relay network but is
unable to ping between R1 and R2. What set of commands must the technician issue to
fix this problem?
R2(config-if)# no frame-relay map ip 10.1.1.2 102 broadcast
R2(config-if)# frame-relay map ip 10.1.1.1 201 broadcast
R1(config-if)# no frame-relay map ip 10.1.1.2 201 broadcast
R1(config-if)# frame-relay map ip 10.1.1.1 102 broadcast
R2(config-if)# no frame-relay map ip 10.1.1.2 102 broadcast
R2(config-if)# frame-relay map ip 10.1.1.2 201 broadcast
R1(config-if)# no frame-relay map ip 10.1.1.1 201 broadcast
R1(config-if)# frame-relay map ip 10.1.1.2 102 broadcast
22
Refer to the exhibit. Every time the administrator reboots this router, the boot process ends in setup mode
is a possible problem?
There is insufficient RAM for the IOS to load on this router.
A password recovery process should be done on this router.
The bootstrap version and the version of the IOS are different.
The IOS image is damaged and must be reloaded using tftpdnld.
The configuration register is set to ignore the startup configuration.
Compared with IDS systems, what can IPS systems do to provide further protection of
computer systems?
detect potential attacks
stop the detected attack from executing
update OS patches for computer systems
scan computer systems for viruses and spyware
37 An administrator learns of an e-mail that has been received by a number of users in the company. This e-
appears to come from the office of the administrator. The e-mail asks the users to confirm their account a
password information. Which type of security threat does this e-mail represent?
cracking
phishing
phreaking
spamming
41 A network technician analyzes the network and notices late collisions. The collisions occur accompanied
jabber that originates from the server. What is the likely cause of the problem?
faulty switch port
web server CPU overload
faulty NIC in the web server
misconfiguration of web server services
45 What is tunneling?
using digital certificates to ensure that data endpoints are authentic
creating a hash to ensure the integrity of data as it traverses a network
using alternate paths to avoid access control lists and bypass security measures
encapsulating an entire packet within another packet for transmission over a network
48 Which configuration on the vty lines provides the best security measure for network administrators to rem
access the core routers at headquarters?
50
Refer to the exhibit. A network administrator is trying to connect R1 remotely to make configuration cha
Based on the exhibited command output, what will be the result when attempting to connect to R1?
failure to connect due to Telnet not being enabled
failure to connect due to incomplete configuration for Telnet
a successful connection and ability to make configuration changes
a successful connection but inability to make configuration changes because of the absence of an ena
secret password