Cisco 100-101 Interconnecting Cisco Networking Devices Exam Set 2

From which of the following attacks can Message Authentication Code (MAC) shield your network?


Options are :

  • spoofing
  • DDoS
  • SYN floods
  • DoS

Answer : spoofing

300-115 Implementing Cisco IP Switched Network Practice Exam Set 2

ROUTER# show ip route

192.168.12.0/24 is variably subnetted, 9 subnets, 3 masks

C 192.168.12.64 /28 is directly connected, Loopback1

C 192.168.12.32 /28 is directly connected, Ethernet0

C 192.168.12.48 /28 is directly connected, Loopback0

O 192.168.12.236 /30 [110/128] via 192.168.12.233, 00:35:36, Serial0

C 192.168.12.232 /30 is directly connected, Serial0

O 192.168.12.245 /30 [110/782] via 192.168.12.233, 00:35:36, Serial0

O 192.168.12.240 /30 [110/128] via 192.168.12.233, 00:35:36, Serial0

O 192.168.12.253 /30 [110/782] via 192.168.12.233, 00:35:37, Serial0

O 192.168.12.249 /30 [110/782] via 192.168.12.233, 00:35:37, Serial0

O 192.168.12.240/30 [110/128] via 192.168.12.233, 00:35:36, Serial 0

To what does the 128 refer to in the router output above?


Options are :

  • OSPF hop count
  • OSPF ID number
  • OSPF administrative distance
  • OSPF priority
  • OSPF cost

Answer : OSPF cost

What happens when computers on a private network attempt to connect to the Internet through a Cisco router running PAT?


Options are :

  • The router uses the same IP address but a different TCP source port number for each connection.
  • An IP address is assigned based on the priority of the computer requesting the connection.
  • The router selects an address from a pool of one-to-one address mappings held in the lookup table.
  • The router assigns a unique IP address from a pool of legally registered addresses for the duration of the connection.

Answer : The router uses the same IP address but a different TCP source port number for each connection.

The network administrator is using a Windows PC application that is called putty.exe for remote communication to a switch for network troubleshooting. Which two protocols could be used during this communication? (Choose two.)


Options are :

  • Telnet
  • SSH
  • RMON
  • SNMP
  • HTTP
  • C,E

Answer : C,E

300-320 Designing Cisco Network Service Architectures Exam Set 7

Which IOS command is used to initiate a login into a VTY port on a remote router?


Options are :

  • router# login
  • router# ping
  • router# trace
  • router(config-line)# login
  • router# telnet
  • router(config)# line vty 0 5

Answer : router# telnet

A network administrator cannot connect to a remote router by using SSH. Part of the show interfaces command is shown. router#show interfaces Serial0/1/0 is up, line protocol is down At which OSI layer should the administrator begin troubleshooting?


Options are :

  • data link
  • physical
  • network
  • transport

Answer : data link

On a live network, which commands will verify the operational status of router interfaces? (Choose two.)


Options are :

  • Router# show ip protocols
  • Router# show start
  • Router# show interfaces
  • A,D
  • Router# show ip interface brief
  • Router# debug interface

Answer : A,D

Cisco 300-209 Implementing Secure Mobility Solutions Exam Set 5

A company has placed a networked PC in a lobby so guests can have access to the corporate directory. A security concern is that someone will disconnect the directory PC and re-connect their laptop computer and have access to the corporate network. For the port servicing the lobby, which three configuration steps should be performed on the switch to prevent this? (Choose three.)


Options are :

  • Configure the switch to discover new MAC addresses after a set time of inactivity.
  • Enable port security.
  • Statically assign the MAC address to the address table.
  • Create the port as a trunk port.
  • Create the port as an access port.
  • Set the port security aging time to 0.
  • Create the port as a protected port.
  • A,C,F

Answer : A,C,F

In the configuration of NAT, what does the keyword overload signify?


Options are :

  • The pool of IP addresses has been exhausted.
  • Multiple internal hosts will use one IP address to access external network resources.
  • When bandwidth is insufficient, some hosts will not be allowed to access network translation.
  • If the number of available IP addresses is exceeded, excess traffic will use the specified address pool.

Answer : Multiple internal hosts will use one IP address to access external network resources.

What is the OSPF default frequency, in seconds, at which a Cisco router sends hello packets on a multi-access network?


Options are :

  • 30
  • 40
  • 10
  • 20

Answer : 10

300-320 Designing Cisco Network Service Architectures Exam Set 5

What is the effect of using the service password-encryption command?


Options are :

  • Only the enable password will be encrypted.
  • Only the enable secret password will be encrypted.
  • Only passwords configured after the command has been entered will be encrypted.
  • It will encrypt all current and future passwords.
  • It will encrypt the secret password and remove the enable secret password from the configuration.

Answer : It will encrypt all current and future passwords.

What should be part of a comprehensive network security plan?


Options are :

  • Allow users to develop their own approach to network security.
  • Minimize network overhead by deactivating automatic antivirus client updates.
  • Physically secure network equipment from potential access by unauthorized individuals.
  • Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten.
  • Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.

Answer : Physically secure network equipment from potential access by unauthorized individuals.

How can you ensure that only the MAC address of a server is allowed by switch port Fa0/1?


Options are :

  • Configure port Fa0/1 to accept connections only from the static IP address of the server.
  • Configure the server MAC address as a static entry of port security.
  • Use a proprietary connector type on Fa0/1 that is incomputable with other host connectors.
  • Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.

Answer : Configure the server MAC address as a static entry of port security.

300-320 Designing Cisco Network Service Architectures Exam Set 1

What is the purpose of the switchport command? Switch(config-if)# switchport port-security maximum 1 Switch(config-if)# switchport port-security mac-address 0018.DE8B.4BF8


Options are :

  • It ensures that only the device with the MAC address 0018.DE8B.4BF8 will be able to connect to the port that is being configured.
  • The switch will shut down the port of any traffic with source MAC address of 0018.DE8B.4BF8.
  • It will act like an access list and the port will filter packets that have a source or destination MAC of 0018.DE8B.4BF8.
  • It informs the switch that traffic destined for MAC address 0018.DE8B.4BF8 should only be sent to the port that is being configured.

Answer : It ensures that only the device with the MAC address 0018.DE8B.4BF8 will be able to connect to the port that is being configured.

The following commands are entered on the router:

Burbank(config)# enable secret fortress

Burbank(config)# line con 0

Burbank(config-line)# login

Burbank(config-line)# password n0way1n

Burbank(config-line)# exit

Burbank(config)# service password-encryption

What is the purpose of the last command entered?


Options are :

  • to encrypt the enable secret password
  • to prevent the vty, console, and enable passwords from being displayed in plain text in the configuration files
  • to provide login encryption services between hosts attached to the router
  • to require the user to enter an encrypted password during the login process

Answer : to prevent the vty, console, and enable passwords from being displayed in plain text in the configuration files

The ip helper-address command does what?


Options are :

  • resolves an IP address overlapping issue
  • assigns an IP address to a host
  • resolves an IP address from a DNS server
  • relays a DHCP request across networks

Answer : relays a DHCP request across networks

300-320 Designing Cisco Network Service Architectures Exam Set 3

Why would a network administrator configure port security on a switch?


Options are :

  • block unauthorized access to the switch management interfaces
  • to prevent unauthorized Telnet access to a switch port
  • to limit the number of Layer 2 broadcasts on a particular switch port
  • to prevent unauthorized hosts from accessing the LAN

Answer : to prevent unauthorized hosts from accessing the LAN

An administrator is in the process of changing the configuration of a router. What command will allow the administrator to check the changes that have been made prior to saving the new configuration?


Options are :

  • Router# show startup-config
  • Router# show current-config
  • Router# show processes
  • Router# show running-config
  • Router# show flash
  • Router# show memory

Answer : Router# show running-config

Which transport layer protocol provides best-effort delivery service with no acknowledgment receipt required?


Options are :

  • HTTP
  • IP
  • UDP
  • TCP
  • Telnet

Answer : UDP

300-320 Designing Cisco Network Service Architectures Exam Set 6

An administrator must assign static IP addresses to the servers in a network. For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP properties box for the sales server?


Options are :

  • IP address: 192.168.20.254 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.20.1
  • IP address: 192.168.20.30 Subnet Mask: 255.255.255.248 Default Gateway: 192.168.20.25
  • IP address: 192.168.20.30 Subnet Mask: 255.255.255.240 Default Gateway: 192.168.20.17
  • IP address: 192.168.20.14 Subnet Mask: 255.255.255.248 Default Gateway: 192.168.20.9
  • IP address: 192.168.20.30 Subnet Mask: 255.255.255.240 Default Gateway: 192.168.20.25

Answer : IP address: 192.168.20.30 Subnet Mask: 255.255.255.248 Default Gateway: 192.168.20.25

Which two characteristics apply to Layer 2 switches? (Choose two.)


Options are :

  • Decreases the number of broadcast domains
  • Increases the number of collision domains
  • Uses the IP address to make decisions for forwarding data packets
  • A,C
  • Implements VLAN
  • Decreases the number of collision domains

Answer : A,C

A switch has 48 ports and 4 VLANs. How many collision and broadcast domains exist on the switch (collision, broadcast)?


Options are :

  • 48, 4
  • 1, 48
  • 4, 1
  • 4, 48
  • 48, 1

Answer : 48, 4

Cisco Data Center Architecture Set 2

How many simultaneous Telnet sessions does a Cisco router support by default?


Options are :

  • 6
  • 5
  • 3
  • 2
  • 4
  • 1

Answer : 5

Which OSI layer header contains the address of a destination host that is on another network?


Options are :

  • data link
  • application
  • network
  • session
  • transport
  • physical

Answer : network

Which layer of the OSI model controls the reliability of communications between network devices using flow control, sequencing and acknowledgments?


Options are :

  • Network
  • Transport
  • Physical
  • Data-link

Answer : Transport

100-105 Net Cert Interconnecting Cisco Networking Exam Set 2

Which two characteristics describe the access layer of the hierarchical network design model? (Choose two.)


Options are :

  • port security
  • VLANs
  • PoE
  • redundant components
  • layer 3 support
  • B,D

Answer : B,D

What does a host on an Ethernet network do when it is creating a frame and it does not have the destination address?


Options are :

  • Sends out an ARP request with the destination IP address
  • Drops the frame
  • Sends out a Layer 3 broadcast message
  • Sends a message to the router requesting the address

Answer : Sends out an ARP request with the destination IP address

Which command can you use to manually assign a static IPV6 address to a router interface?


Options are :

  • ipv6 autoconfig
  • ipv6 address PREFIX_1::1/64
  • ipv6 address 2001:db8:2222:7272::72/64
  • ipv6 autoconfig 2001:db8:2222:7272::72/64

Answer : ipv6 address 2001:db8:2222:7272::72/64

100-105 Net Cert Interconnecting Cisco Networking Exam Set 1

What is the purpose of flow control?


Options are :

  • To regulate the size of each segment.
  • To reassemble segments in the correct order at the destination device.
  • To ensure data is retransmitted if an acknowledgement is not received.
  • To provide a means for the receiver to govern the amount of data sent by the sender.

Answer : To provide a means for the receiver to govern the amount of data sent by the sender.

Which layer of the TCP/IP stack combines the OSI model physical and data link layers?


Options are :

  • network access layer
  • transport layer
  • application layer
  • Internet layer

Answer : network access layer

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions