Sponsor

Advertisment

CCNA 3 Scaling Networks Chapter 1 v5.0 Exam Answers 2015 100%

Sunday, December 14, 2014

What are two benefits of extending access layer connectivity to users through a wireless medium? (Choose two.)
increased network management options
reduced costs*
increased flexibility*
increased bandwidth availability
decreased number of critical points of failure

A network engineer is reviewing a network design that uses a fixed configuration enterprise router that supports both LAN and WAN connections. However, the engineer realizes that the router does not have enough interfaces to support growth and network expansion. Which type of device should be used as a replacement?
a PoE device
another fixed configuration router
a modular router*
a Layer 3 switch

What are two functions of a router? (Choose two.)
It controls the flow of data via the use of Layer 2 addresses.
It increases the size of the broadcast domain.
It manages the VLAN database.
It determines the best path to send packets.*
It connects multiple IP networks.*

Which design feature will limit the size of a failure domain in an enterprise network?
the purchase of enterprise equipment that is designed for large traffic volume
the installation of redundant power supplies
the use of the building switch block approach*
the use of a collapsed core design

How can an enterprise network be designed to optimize bandwidth?
by installing devices with failover capabilities
by deploying a collapsed core model
by organizing the network to control traffic patterns*
by limiting the size of failure domains

As the network administrator you have been asked to implement EtherChannel on the corporate network. What does this configuration consist of?
grouping multiple physical ports to increase bandwidth between two switches*
providing redundant links that dynamically block or forward traffic
grouping two devices to share a virtual IP address
providing redundant devices to allow traffic to flow in the event of device failure

Which technology is required when switched networks are designed to include redundant links?
Spanning Tree Protocol*
virtual LANs
link aggregation
virtual private networks

Which statement describes a characteristic of Cisco Catalyst 2960 switches?
New Cisco Catalyst 2960-C switches support PoE pass-through.*
They are best used as distribution layer switches.
They do not support an active switched virtual interface (SVI) with IOS versions prior to 15.x.
They are modular switches.
9

Refer to the exhibit. Which devices exist in the failure domain when switch S3 loses power?
PC_3 and PC_2
AP_2 and AP_1
S4 and PC_2
PC_3 and AP_2*
S1 and S4
10 
Immediately after a router completes its boot sequence, the network administrator wants to check the routers configuration. From privileged EXEC mode, which of the following commands can the administrator use for this purpose? (Choose two.)
show flash
show startup-config*
show NVRAM
show version
show running-config*
11 
A network administrator is planning redundant devices and cabling in a switched network to support high availability. Which benefit will implementing the Spanning Tree Protocol provide to this design?
Redundant paths can be available without causing logical Layer 2 loops.*
Multiple physical interfaces can be combined into a single EtherChannel interface.
Faster convergence is available for advanced routing protocols.
Network access can be expanded to support both wired and wireless devices.
12 
Which two requirements must always be met to use in-band management to configure a network device? (Choose two.)
at least one network interface that is connected and operational*
a terminal emulation client
a direct connection to the console port
a direct connection to the auxiliary port
Telnet, SSH, or HTTP access to the device*
13
Place the options in the following order:
connectivity
- not scored -
identification
access remote networks
security
14 
In which situation would a network administrator install a Cisco Nexus Series or Cisco Catalyst 6500 Series switch to promote infrastructure scalability?
on a service provider network to promote integrated security, and simplified management
on a data center network to provide expansion and transport flexibility*
to enable virtual stacking of switches to provide cloud-managed access
on a campus LAN network as access layer switches
15 
Which statement describes a characteristic of Cisco Meraki switches?
They are service provider switches that aggregate traffic at the edge of the network.
They are cloud-managed access switches that enable virtual stacking of switches.*
They are campus LAN switches that perform the same functions as Cisco 2960 switches.
They promote infrastructure scalability, operational continuity, and transport flexibility.
16 
Why would a network administrator issue the show cdp neigbors command on a router?
to display router ID and other information about OSPF neighbors
to display device ID and other information about directly connected Cisco devices*
to display routing table and other information about directly connected Cisco devices
to display line status and other information about directly connected Cisco devices
17 
What is a characteristic of in-band device management?
It is used to monitor and make configuration changes to a network device over a network connection.*
It uses a direct connection to a console or AUX port.
It is used for initial configuration or when a network connection is unavailable.
It uses a terminal emulation client.
18 
Which two features of enterprise class equipment assists an enterprise network in maintaining 99.999 percent up-time? (Choose two.)
failure domains
services module
collapsed core
redundant power supplies*
failover capabilities*
Read more ...

CCNA 1 Chapter 10 v5.0 Exam Answers 2015 100%

Saturday, December 13, 2014

Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.)
physical layer
session layer*
transport layer
application layer* 
presentation layer*
data link layer

Which two tasks are functions of the presentation layer? (Choose two.)
compression*
addressing
encryption*
session control
authentication

Select three protocols that operate at the Application Layer of the OSI model. (Choose three.)
ARP
TCP
DSL
FTP* 
POP3* 
DHCP*

A manufacturing company subscribes to certain hosted services from their ISP. The services required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.)
FTP* 
HTTP*
DNS
SNMP
DHCP
SMTP*

What are two characteristics of peer-to-peer networks? (Choose two.)
scalable
one way data flow
decentralized resources*
centralized user accounts
resource sharing without a dedicated server*
6
What is an example of network communication that uses the client-server model?
A user uses eMule to download a file that is shared by a friend after the file location is determined.
A workstation initiates an ARP to find the MAC address of a receiving host.
A user prints a document by using a printer that is attached to a workstation of a coworker.
A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.*
7
What is an advantage for small organizations of adopting IMAP instead of POP?
Messages are kept in the mail servers until the client manually deletes them.*
When the user connects to a POP server, copies of the messages are kept in the mail server for a short time, but IMAP keeps them for a long time.
IMAP sends and retrieves email, but POP only retrieves email.
POP only allows the client to store messages in a centralized way, while IMAP allows distributed storage.

Which two actions are taken by SMTP if the destination email server is busy when email messages are sent? (Choose two.)
SMTP sends an error message back to the sender and closes the connection.
SMTP tries to send the messages at a later time.*
SMTP will discard the message if it is still not delivered after a predetermined expiration time.
SMTP periodically checks the queue for messages and attempts to send them again.*
SMTP sends the messages to another mail server for delivery.

Which application layer protocol uses message types such as GET, PUT, and POST?
DNS
DHCP
SMTP
HTTP*
POP3
10 
A DHCP-enabled client PC has just booted. During which two steps will the client PC use broadcast messages when communicating with a DHCP server? (Choose two.)
DHCPDISCOVER*
DHCPACK
DHCPOFFER
DHCPREQUEST*
DHCPNAK
11 
A user accessed the game site www.nogamename.com last week. The night before the user accesses the game site again, the site administrator changes the site IP address. What will be the consequence of that action for the user?
The user will not be able to access the site.
The user will access the site without problems.*
The user will have to modify the DNS server address on the local PC in order to access the site.
The user will have to issue a ping to this new IP address to be sure that the domain name remained the same.
12 
Which DNS server in the DNS hierarchy would be considered authoritative for the domain name records of a company named netacad?
.com
netacad.com*
mx.netacad.com
www.netacad.com
13 
Which three statements describe a DHCP Discover message? (Choose three.)
The source MAC address is 48 ones (FF-FF-FF-FF-FF-FF).
The destination IP address is 255.255.255.255.*
The message comes from a server offering an IP address.
The message comes from a client seeking an IP address. *
All hosts receive the message, but only a DHCP server replies.*
Only the DHCP server receives the message.
14 
Which phrase describes an FTP daemon?
a diagnostic FTP program
a program that is running on an FTP server*
a program that is running on an FTP client
an application that is used to request data from an FTP server
15 
What is true about the Server Message Block protocol?
Different SMB message types have a different format.
Clients establish a long term connection to servers.*
SMB messages cannot authenticate a session.
SMB uses the FTP protocol for communication.
16 
When would it be more efficient to use SMB to transfer files instead of FTP?
when downloading large files with a variety of formats from different servers
when a peer-to-peer application is required
when the host devices on the network use the Windows operating system
when downloading large numbers of files from the same server*
when uploading the same file to multiple remote servers
17 
Fill in the blank.
What is the acronym for the protocol that is used when securely communicating with a web server?     “HTTPS “​
Hypertext Transfer Protocol Secure (HTTPS)
is the protocol that is used for accessing or
posting web server information using a secure communication channel.
18
Fill in the blank.
Refer to the exhibit. What command was used to resolve  a given host name by querying the name servers?   “ nslookup ”
A user can manually query the name servers to resolve
a given host name using the nslookup command.​
Nslookup is both a command and a utility.​
19 
Question as presented:
Place the options in the following order:
end device address
– not scored –
authoritative name server
canonical name
mail exchange record
20 
Question as presented:
Place the options in the following order:
a message that is used to identify the explicit server and lease offer to accept
a message that is used to locate any available DHCP server on a network
– not scored –
a message that is used to suggest a lease to a client
a message that is used to acknowledge that the lease is successful
21 
Question as presented:
Place the options in the following order:
[+] no dedicated server is required 
[+] client and server roles are set on a per request basis 
[#] requires a specific user interface 
[#] a background service is required
[+] Order does not matter within this group.
[#] Order does not matter within this group.
22 
Open the PT Activity.

Perform the tasks in the activity instructions and then answer the question.
Which PC or PCs are sending FTP packets to the server?
PC_3
PC_1
PC_2*
PC_1 and PC_3

Read more ...

CCNA 4 R&S: Connecting Networks Chapter 9 v5.0 Exam Answers 2015 100%

Wednesday, December 10, 2014
1. Users are reporting longer delays in authentication and in accessing network resources during certain time periods of the week. What kind of information should network engineers check to find out if this situation is part of a normal network behavior?
syslog records and messages
the network performance baseline
debug output and packet captures
network configuration files
2. A team of engineers has identified a solution to a significant network problem. The proposed solution is likely to affect critical network infrastructure components. What should the team follow while implementing the solution to avoid interfering with other processes and infrastructure?
change-control procedures
one of the layered troubleshooting approaches
knowledge base guidelines
syslog messages and reports
3. After which step in the network troubleshooting process would one of the layered troubleshooting methods be used?
documenting symptoms
determining ownership
narrowing the scope
gathering symptoms from suspect devices
4. A user reports that the workstation cannot connect to a networked printer in the office in order to print a report created with word processing software. Which troubleshooting action by the helpdesk technician would follow the divide-and-conquer approach?
Ask the user to launch the web browser.
Ask the user to save the working document.
Ask the user to issue the ipconfig command.
Ask the user to unplug and reattach the network cable.
5. A network engineer is troubleshooting a network problem and can successfully ping between two devices. However, Telnet between the same two devices does not work. Which OSI layers should the administrator investigate next?
all of the layers
from the network layer to the application layer
from the network layer to the physical layer
only the network layer
6. Which troubleshooting method begins by examining cable connections and wiring issues?
top-down
bottom-up
substitution
divide-and-conquer
7.

Refer to the exhibit. Which two statements describe the results of entering these commands?(Choose two.)
R1 will send system messages of levels 0 (emergencies) to level 4 (warnings) to a server.
R1 will not send critical system messages to the server until the command debug all is entered.
R1 will reset all the warnings to clear the log.
R1 will output the system messages to the local RAM.
The syslog server has the IPv4 address 192.168.10.10.
8. An administrator is troubleshooting an Internet connectivity problem on a router. The output of the show interfaces gigabitethernet 0/0 command reveals higher than normal framing errors on the interface that connects to the Internet. At what layer of the OSI model is the problem likely occurring?
Layer 1
Layer 2
Layer 3
Layer 4
Layer 7
9. Users report that the new web site http://www.company1.biz cannot be accessed. The helpdesk technician checks and verifies that the web site can be accessed with http://www.company1.biz:90. Which layer in the TCP/IP model is involved in troubleshooting this issue?
application
transport
internet
network access
10. A user reports that after an OS patch of the networking subsystem has been applied to a workstation, it performs very slowly when connecting to network resources. A network technician tests the link with a cable analyzer and notices that the workstation sends an excessive number of frames smaller than 64 bytes and also other meaningless frames. What is the possible cause of the problem?
cabling faults
corrupted NIC driver
Ethernet signal attenuation
corrupted application installation
11. A network administrator is configuring SSH on a router. When verifying the configuration, the administrator notices that the SSH connection requests fail, but the Telnet connection requests from the same workstation are successful. Which two parts of the router configuration should be checked to try to locate the problem? (Choose two.)
The ip access-class command is missing.
The password is misconfigured on the console line.
The transport input command is incorrect on the vty lines.
A standard ACL is possibly blocking the workstation from access to the router.
An extended ACL that is referencing the port argument for SSH is misconfigured.
12. A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. The technician asks the caller to talk to nearby users to see if other machines are affected. The caller reports that several immediate neighbors in the same department have a similar problem and that they cannot ping each other. Those who are seated in other departments have connectivity. What should the technician check as the first step in troubleshooting the issue?
the power outlet to the PC that is used by the caller
the trunks between switches in the wiring closet
the status of the departmental workgroup switch in the wiring closet
the cable that connects the PC of the caller to the network jack
the cable connection between a PC and a network outlet that is used by a neighbor
13. After cables were reconnected to a switch in a wiring closet, several PCs that had been previously configured manually can no longer access resources outside the local network. The PC configurations were not altered in the process and resources on the local network can still be accessed. What is a possible cause of the problem?
The cabling to the PCs is faulty.
The PCs are no longer on the correct VLAN.
The DHCP server has been misconfigured.
The DNS configuration on the PCs is incorrect.
14.

Refer to the exhibit. On the basis of the output, which two statements about network connectivity are correct? (Choose two.)
There is connectivity between this device and the device at 192.168.100.1.
The connectivity between these two hosts allows for videoconferencing calls.
There are 4 hops between this device and the device at 192.168.100.1.
The average transmission time between the two hosts is 2 miliseconds.
This host does not have a default gateway configured.
15. Fill in the blank.
Use the ” ARP   ” cache to verify IPv4 address to Layer 2 Ethernet address mappings on a host computer.
16. Which two specialized troubleshooting tools can monitor the amount of traffic that passes through a switch? (Choose two.)
digital multimeter
TDR
NAM
portable network analyzer
DTX cable analyzer
17. A group of Windows PCs in a new subnet has been added to an Ethernet network. When testing the connectivity, a technician finds that these PCs can access local network resources but not the Internet resources. To troubleshoot the problem, the technician wants to initially confirm the IP address and DNS configurations on the PCs, and also verify connectivity to the local router. Which three Windows CLI commands and utilities will provide the necessary information? (Choose three.)
ipconfig
telnet
ping
arp -a
nslookup
tracert
netsh interface ipv6 show neighbor
18. A company is setting up a web site with SSL technology to protect the authentication credentials required to access the web site. A network engineer needs to verify that the setup is correct and that the authentication is indeed encrypted. Which tool should be used?
baselining tool
cable analyzer
protocol analyzer
fault-management tool
19. In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network?
Determine ownership.
Narrow the scope.
Gather information.
Document the symptoms.
Determine the symptoms.
20. A network technician is troubleshooting an email connection problem. Which question to the end-user will provide clear information to better define the problem?
How big are the emails you tried to send?
When did you first notice your email problem?
Is your email working now?
What kind of equipment are you using to send emails?
21. A network engineer issues the show cdp neighbor command on several network devices during the process of network documentation. What is the purpose of performing this command?
to obtain information about directly connected Cisco devices 
to check the networks that are advertised by the neighboring routers
to verify the network addresses that are attached to the network devices
to check the connectivity of PCs that are connected to the network devices
22.

Refer to exhibit. A network engineer is troubleshooting a WAN connectivity problem. A ping to a remote router is successful and an attempt to telnet to the same router displays the exhibited output. What does the output verify?
A Telnet password has not been configured on the remote router.
The transport layer is connecting successfully.
The web server service is password protected.
The remote router IPv6 address is incorrect.
23. When should a network performance baseline be measured?
after normal work hours to reduce possible interruptions
during normal work hours of an organization 
when a denial of service attack to the network is detected and blocked
immediately after the main network devices restarted
24. Which number represents the most severe level of syslog logging?
7
0
1
10
25.
Place the options in the following order: 
[+] CiscoView 
[+] What’s Up Gold 
[+] HP OpenviewBTO 
[#] SolarWinds LAN surveyor 
[#] CyberGauge software 
[*] Internet search engines 
[*] Cisco Tools & Resources web site
[+] Order does not matter within this group.
[#] Order does not matter within this group.
[*] Order does not matter within this group.

Read more ...

CCNA 4 R&S: Connecting Networks Chapter 8 v5.0 Exam Answers 2015 100%

Wednesday, December 10, 2014
1.

Refer to the exhibit. Which two conclusions can be drawn from the syslog message that was generated by the router? (Choose two.)
This message resulted from an unusual error requiring reconfiguration of the interface.
This message indicates that the interface should be replaced.
This message is a level 5 notification message.
This message indicates that service timestamps have been configured.
This message indicates that the interface changed state five times.
2. A network technician has issued the service timestamps log datetime command in the configuration of the branch router. Which additional command is required to include the date and time in logged events?
Branch1(config)# service timestamps log uptime
Branch1# clock set 08:00:00 05 AUG 2013
Branch1(config)# service timestamps debug datetime
Branch1# copy running-config startup-config
3.

Refer to the exhibit. From what location have the syslog messages been retrieved?
syslog server
syslog client
router RAM
router NVRAM
4.

Refer to the exhibit. What does the number 17:46:26.143 represent?
the time passed since the syslog server has been started
the time when the syslog message was issued
the time passed since the interfaces have been up
the time on the router when the show logging command was issued
5. What are SNMP trap messages?
messages that are used by the NMS to query the device for data
unsolicited messages that are sent by the SNMP agent and alert the NMS to a condition on the network
messages that are used by the NMS to change configuration variables in the agent device
messages that are sent periodically by the NMS to the SNMP agents that reside on managed devices to query the device for
data
6. How can SNMP access be restricted to a specific SNMP manager?
Use the snmp-server community command to configure the community string with no access level.
Specify the IP address of the SNMP manager by using the snmp-server host command.
Use the snmp-server traps command to enable traps on an SNMP manager.
Define an ACL and reference it by using the snmp-server community command.
7. A network administrator issues two commands on a router:
R1(config)# snmp-server host 10.10.50.25 version 2c campus
R1(config)# snmp-server enable traps
What can be concluded after the commands are entered?
No traps are sent, because the notification-types argument was not specified yet.
Traps are sent with the source IP address as 10.10.50.25.
If an interface comes up, a trap is sent to the server.
The snmp-server enable traps command needs to be used repeatedly if a particular subset of trap types is desired.
8. What is a difference between SNMP and NetFlow?
Unlike NetFlow, SNMP uses a “push”-based model.
NetFlow collects more detailed traffic statistics on IP networks than SNMP does.
SNMP only gathers traffic statistics, whereas NetFlow can also collect many other performance indicators, such as interface
errors and CPU usage.
Unlike NetFlow, SNMP may be used to provide IP accounting for billing purposes.
9. How does NetFlow function on a Cisco router or multilayer switch?
Netflow captures and analyzes traffic.
One user connection to an application exists as two NetFlow flows.
On 2960 switches, Netlow allows for data export.
NetFlow does not consume any additional memory.
10. Which type of information can an administrator obtain with the show ip cache flow command?
the NetFlow version that is enabled
whether NetFlow is configured on the correct interface and in the correct direction
the configuration of the export parameters
the protocol that uses the largest volume of traffic
11. What is the most common purpose of implementing NetFlow in a networked environment?
to support accounting and monitoring with consumer applications
to actively capture traffic from networked devices
to monitor live data usage and to control traffic flow with set messages
to passively capture changing events that occur in the network and to perform after-the-fact-analysis
12. Which destination do Cisco routers and switches use by default when sending syslog messages for all severity levels?
RAM
NVRAM
nearest syslog server
console
13. Which SNMP feature provides a solution to the main disadvantage of SNMP polling?
SNMP community strings
SNMP set messages
SNMP get messages
SNMP trap messages
14. Which statement describes SNMP operation?
A get request is used by the SNMP agent to query the device for data.
A set request is used by the NMS to change configuration variables in the agent device.
An NMS periodically polls the SNMP agents that are residing on managed devices by using traps to query the devices for data.
An SNMP agent that resides on a managed device collects information about the device and stores that information remotely in the MIB that is located on the NMS.
15. A network administrator has issued the logging trap 4 global configuration mode command. What is the result of this command?
After four events, the syslog client will send an event message to the syslog server.
The syslog client will send to the syslog server any event message that has a severity level of 4 and higher.
The syslog client will send to the syslog server event messages with an identification trap level of only 4.
The syslog client will send to the syslog server any event message that has a severity level of 4 and lower.
16. When logging is used, which severity level indicates that a device is unusable?
Critical – Level 2
Alert – Level 1
Emergency-Level 0 
Error-Level 3
17.

Refer to the exhibit. While planning an upgrade, a network administrator uses the Cisco NetFlow utility to analyze data flow in the current network. Which protocol used the greatest amount of network time?
TCP-FTP
TCP-Telnet
UDP-DNS
TCP-other
UDP-other
18. Which two statements describe items to be considered in configuring NetFlow? (Choose two.)
Netflow requires both management and agent software.
NetFlow can only be used if all devices on the network support it.
Netflow can only be used in a unidirectional flow.
Netflow requires UDP port 514 for notification messages.
Netflow consumes additional memory.
19. When SNMPvl or SNMPv2 is being used, which feature provides secure access to MIB objects?
message integrity
source validation
community strings
packet encryption
20.

Refer to the exhibit. What can be concluded from the produced output?
An ACL was configured to restrict SNMP access to an SNMP manager.
This is the output of the show snmp command without any parameters.
The system contact was not configured with the snmp server contact command
21. What are the most common syslog messages?
output messages that are generated from debug output
linkup and link down messages
those that occur when a packet matches a parameter condition in an access control list
error messages about hardware or software malfunctions
22. A network administrator has issued the snmp-server user adminl admin v3 encrypted auth md5 abc789 priv des 256 key99 command. What are two features of this command? (Choose two.)
It forces the network manager to log into the agent to retrieve the SNMP messages.
It restricts SNMP access to defined SNMP managers.
It uses the MD5 authentication of the SNMP messages.
It allows a network administrator to configure a secret encrypted password on the SNMP server.
It adds a new user to the SNMP group.
23. Fill in the blank.
The   “syslog”   protocol uses UDP port 514 and is the most common method to access system messages provided by networking devices.
24 When SNMPv1 or SNMPv2 is being used, which feature provides secure access to MIB objects?
packet encryption
source validation
community strings 
message integrity
25  A network administrator has issued the snmp-server user admin1 admin v3 encrypted auth md5 abc789 priv des 256 key99 command. What are two features of this command? (Choose two.)
It uses the MD5 authentication of the SNMP messages. 
It allows a network administrator to configure a secret encrypted password on the SNMP server.
It adds a new user to the SNMP group. 
It restricts SNMP access to defined SNMP managers.
It forces the network manager to log into the agent to retrieve the SNMP messages.
Read more ...