You are trying to enter a command in the IOS, and you receive the following console message: “Invalid input detected at ^.” What should you do to correct this?
| |||||||||||||
Which of the following forms of NAT incorporates the source IP address (inside local) along with the source port number to make every translation unique?
| |||||||||||||
What verification command can show you the current state of the PPP Link Control Protocol?
| |||||||||||||
Which of the following are Application layer protocols? (Choose the three best answers)
| |||||||||||||
Which of the following commands enable you to specify the datagram size in a ping to 10.1.1.1?
| |||||||||||||
The NAT Overload feature on a Cisco router takes multiple inside local addresses and overloads a single ______________ address.
| |||||||||||||
Which Application layer protocol resolves hostnames or fully qualified domain names (FQDNs) such as www.cisco.com into IP addresses?
| |||||||||||||
Which of the following configuration registers causes the IOS to boot from flash if no
| |||||||||||||
When connecting a serial cable from the CSU/DSU to your Cisco router, what two standards are supported on the Cisco end of the connection? (Choose two)
| |||||||||||||
Which layer of the OSI model handles dialog control among devices?
| |||||||||||||
Which of the following STP 802.11d port states actively learns MAC addresses? (Choose all that apply)
| |||||||||||||
Which of the following IP addresses represent public addresses? (Choose two)
| |||||||||||||
SNMP uses which port number?
| |||||||||||||
Which of the following is a form of DoS attack? (Choose three)
| |||||||||||||
At the end of your Setup Mode dialog, you are asked whether you want to keep the configuration you created. This configuration will be present even if you reboot the device. Where is this configuration stored?
| |||||||||||||
You are troubleshooting network connectivity issues between a client and a server. The server’s IP address recently changed, and you would like to clear the client’s ARP table. What command will accomplish this?
| |||||||||||||
____________ is an electrical or magnetic field that is a result of one communications signal that can affect the signal in a nearby circuit.
| |||||||||||||
Which command allows only SSH through the vty lines?
| |||||||||||||
A host is assigned the IP address 10.5.62.173/27. An application on the host attempts to contact a server with the IP address 10.5.62.158/27. What is the next step in the process of network communication?
| |||||||||||||
What type of UTP cable would you use to connect a switch to a PC?
| |||||||||||||
Given the following output, which of the statements is false? Routing Protocol is "rip" Sending updates every 30 seconds, next due in 2 seconds Invalid after 180 seconds, hold down 180, flushed after 240 Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Redistributing: rip Default version control: send version 2, receive version 2 Interface Send Recv Key-chain Ethernet0 2 2 examprep Serial0 2 2 Routing for Networks: 172.19.0.0 10.2.0.0 Routing Information Sources: Gateway Distance Last Update Distance: 80
Router(config)#router rip Router(config-router)#version 2 Router(config-router)#network 10.2.0.0 Router(config-router)#network 172.19.0.0 | |||||||||||||
What form of NAT allows you to translate one group of IP addresses to another in a 1:1 relationship with minimal configuration?
| |||||||||||||
The Ethernet IEEE 802.3 specification defines which of the following LAN standards? (Choose the three best answers)
| |||||||||||||
Which of the following networks are contained in the summarized CIDR route of 192.168.64.0 /19? (Choose all that apply)
| |||||||||||||
Which of the following encapsulation types can be used on leased-line connections? (Choose two)
| |||||||||||||
Which devices are implemented at the Physical layer of the OSI model? (Choose the two best answers.)
| |||||||||||||
Which of the following are 802.3 MAC sublayer Ethernet addresses? (Choose the three best answers)
| |||||||||||||
Which of the following would you typically configure as the default gateway for a PC?
| |||||||||||||
Which of the following match the correct encryption algorithm with the wireless security standard? (Choose two)
| |||||||||||||
Which Ethernet MAC 802.3 sublayer address type always starts with the hexadecimal characters 0100.5E?
| |||||||||||||
You no longer have IP connectivity to a remote router at a customer’s site. From your location, what terminal option can you use to gain access to an EXEC session on the remote router?
| |||||||||||||
Which of the following commands would allow a network client to test connectivity to a destination device and verify the current delay for all routers traversed while making the connection?
| |||||||||||||
______________ occurs when a switch creates a dedicated path for sending and receiving transmissions with each connected host.
| |||||||||||||
How does a switch forward frames when the destination MAC address is unknown?
| |||||||||||||
How many wireless channels are available in the U.S. for the 2.4GHz band without overlapping frequencies for close-proximity wireless access points?
| |||||||||||||
Which devices are implemented at the Data Link layer of the OSI model? (Choose the two best answers)
| |||||||||||||
What range represents the first-octet value of a Class A address?
| |||||||||||||
What Layer 2 protocol can identify information such as the IP address of Cisco devices connected to you?
| |||||||||||||
You are using NAT Overload on your company’s Cisco router to provide Internet access to your internal network. The NAT process is overloading the IP address assigned to the router’s outside interface. Which of the following statements are not true? (Choose two)
| |||||||||||||
You are the network administrator of ACME Corp. You have received a number of tickets from your San Diego office complaining about server connectivity issues. You verify the WAN interface connecting the corporate office to the San Diego office: Router# show interfaces serial
Serial 0 is administratively down, line protocol is down
Hardware is MCI Serial
Internet address is 150.136.190.203, subnet mask is 255.255.255.0
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, rely 255/255, load 1/255
Encapsulation HDLC, loopback not set, keepalive set (10 sec)
Last input 0:00:07, output 0:00:00, output hang never
Output queue 0/40, 0 drops; input queue 0/75, 0 drops
Five minute input rate 0 bits/sec, 0 packets/sec
Five minute output rate 0 bits/sec, 0 packets/sec
16263 packets input, 1347238 bytes, 0 no buffer
Received 13983 broadcasts, 0 runts, 0 giants
2 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 2 abort
1 carrier transitions
22146 packets output, 2383680 bytes, 0 underruns
0 output errors, 0 collisions, 2 interface resets, 0 restarts The line protocol is down due to an HDLC encapsulation mismatch. HDLC is Cisco-proprietary and should be changed to PPP. The interface is experiencing input errors. The keepalive value is set too low. The interface is in a shutdown state. You are logged into a router and want to view the IP address of neighboring Cisco routers. What IOS command gives this information for the directly connected neighbors?
| |||||||||||||
What is the end result of the 192.168.2.0 network based on the following output? RouterA# debug ip rip
RIP protocol debugging is on
RouterA#
00:26:27: RIP: received v1 update from 192.168.1.6 on Serial0/0
00:26:27: 192.168.2.0 in 12 hops
00:26:37: RIP: received v1 update from 192.168.1.12 on Serial0/1
00:26:37: 192.168.2.0 in 12 hops
| |||||||||||||
Your organization uses a wireless security standard that requires users to authenticate to a back-end server with a valid active directory username and password before they are granted access to the wireless network. Upon successful authentication, the dynamic encryption keys are generated for use during the wireless session. What type of network security is in use?
| |||||||||||||
What is 00111000 10110011 01010111 11011010 converted into decimal format?
| |||||||||||||
Which of the following security practices is incorrect?
| |||||||||||||
You are configuring your Cisco 2600XM router to connect across the WAN to a Cisco 3800 router. You would like to use the default WAN encapsulation. Will this work?
| |||||||||||||
What is the broadcast IP of 212.84.5.66/26?
| |||||||||||||
Which statement is true regarding the 10.1.100.0 network based on the following output? CstmrARtr# show ip route
...output omitted...
Gateway of last resort is 192.168.1.9 to network 0.0.0.0
R 10.1.100.0 /24 [120/14] via 192.168.1.9, 00:00:11, Serial0
C 172.17.0.0/16 is directly connected, Ethernet0
R 172.16.0.0/16 [120/11] via 172.17.0.2, 00:00:02, Ethernet0
192.168.1.0/30 is subnetted, 1 subnets
C 192.168.1.8 is directly connected, Serial0
| |||||||||||||
You suspect that one of your network users has violated the corporate security policy and plugged in a personal wireless access point in his cubicle. What Cisco security solution would allow you to detect and identify this issue?
| |||||||||||||
What is the network ID of 212.84.5.66/26?
| |||||||||||||
When pinging a device on a remote segment, which of the following are true of the packet as soon as it leaves the device that originated the packet? (Choose two)
| |||||||||||||
Which of the following are valid interface connections for serial WAN connections? (Choose three)
| |||||||||||||
What does the c2600 portion of the Cisco IOS filename c2600-ipbase-1.122-1.T.bin represent?
| |||||||||||||
After telnetting from RouterA into RouterB, you realize that your
| |||||||||||||
While troubleshooting a serial connection, you issue the following command: router# sh controllers serial 0/0
Interface Serial0/0
Hardware is PowerQUICC MPC850
DTE V.24 (RS-232) clocks stopped.
RX ring with 32 entries at 0x45560 : RLEN=5, Rxhead 0
00 pak=0x6044D78 ds=0x6044ED4 status=80 max_size=1524 pak_size=0
01 pak=0x60445F0 ds=0x604474C status=80 max_size=1524 pak_size=0
02 pak=0x6043E68 ds=0x6043FC4 status=80 max_size=1524 pak_size=0
03 pak=0x60436E0 ds=0x604383C status=80 max_size=1524 pak_size=0
04 pak=0x6042F58 ds=0x60430B4 status=80 max_size=1524 pak_size=0 What problem is indicated by the output, and what action will most likely solve it?
| |||||||||||||
Which of the following bridge IDs will become the root bridge?
| |||||||||||||
________________ allows an end device to receive power over a copper Ethernet cable.
| |||||||||||||
What command configures a default route in a Layer 2 switch?
| |||||||||||||
You are using a Cisco 7921 Wireless VoIP device. While speaking to your coworker on the phone, you are walking through multiple wireless cells. What type of network topology is this?
| |||||||||||||
You walk away from your terminal for five minutes to get some coffee. When you return, you notice that someone has made configuration changes to your router. Which three commands will keep this from happening in the future?
| |||||||||||||
Which of the following is not a step in configuring SSH on your Cisco device?
| |||||||||||||
You are configuring an office to use a Cisco router to connect to the Internet. The onsite network administrator would like to publish an internal email server, two internal web servers, and an internal FTP server to the Internet so that outside users can access them. What is necessary for this configuration?
| |||||||||||||
Which of the following conditions could cause the port to transition to a disabled state? (Choose all that apply)
| |||||||||||||
What is a typical reason why the first ICMP ping response times out?
| |||||||||||||
Given the following output, how can you close Telnet session 2? (Choose two) CCNA2620# show sessions
Conn Host Address Idle Conn Name
1 131.108.100.152 131.108.100.152 0 131.108.100.152
*2 126.102.57.63 126.102.57.63 0 126.102.57.63
| |||||||||||||
Which of the following is not part of configuring RIPv2 to be classless?
| |||||||||||||
You connected your switch into a device at half duplex. What is a possible reason for not using full duplex?
| |||||||||||||
Which of the following is not an additional feature of RIPv2 over RIPv1?
| |||||||||||||
How many bits does an IPv6 address have?
| |||||||||||||
Which of the following is an encryption protocol? (Choose three)
| |||||||||||||
Private addressing for IPv6 is represented by a _____________________ address.
|
18.119.103.96