Final Exam Due No due date
Points 60
Questions 60
Time Time Limit 120 Minutes
Allowed Allowed Attem Attem pts 2
Take the Quiz Again
Aempt History Attempt LATEST
Atte mpt 1
Time
Score 58.5 out of 60
a nswers ers are hidden. hidde n. Correct answ Score for this this attempt: 58.5 out of 60
Question Question 1
1 / 1 pts
Which approach is being used when network network maintenance maintenance is performed in in order of of urgency? urgency?
interrupt-driven
Refer to Chapter 3.
Question Question 2
1 / 1 pts
Which structured maintenance methodology should a network engineer use?
the methodology that is prescribed by the organization organization
Refer to Chapter 2.
Question Question 3
1 / 1 pts
What is a characteristic of o f network network maint mai ntenan enance? ce?
Maintaining network documentation is an important element of network maintenance.
Refer to Chapter 3.
Question Question 4
Which backup mechanism presents the highest security risk?
1 / 1 pts
TFTP
Refer to Chapter 3.
Question Question 5
1 / 1 pts
What are two limitations limitatio ns of using buffered buffered logging? loggi ng? (Choose two.)
Oldest messages are overwritten when allocated memory is exceeded.
Log messages are removed when a device is powered down.
Refer to Chapter 3.
Question Question 6
1 / 1 pts
What is the highest logging severity level message that is displayed by default on the console line?
debugging (7)
Refer to Chapter 3.
Question Question 7
1 / 1 pts
What best describes a stratum stratum 3 time source? so urce?
The clock is synchronized to a time server that is in turn synchronized to a stratum 1 time server.
Refer to Chapter 3.
Question Question 8
1 / 1 pts
Which two advantages does scheduled maintenance offer over interrupt-driven events? (Choose two.)
reduced network downtime
predictable lead times for change requests
Refer to Chapter 3.
Question 9
1 / 1 pts
Refer to the exhibit. Based on the output that is generated, which two statements are true? (Choose two.)
Every time the running configuration file is saved to NVRAM, it will also be automatically archived.
The archive path is the only mandatory archive parameter that must be configured.
Refer to Chapter 3.
Question 10
1 / 1 pts
Refer to the exhibit. Which two FTP-related statements are true? (Choose two.)
The ip ftp user name and ip ftp password commands were issued on router R1.
The configuration was copied using a method that is less secure than HTTPS.
Refer to Chapter 3.
Question 11
1 / 1 pts
What term refers to alleviating the symptoms of the problem without resolving the root cause?
workaround
Refer to Chapter 2.
Question 12
What is the final task in a structured troubleshooting process?
documenting the changes
Refer to Chapter 2.
1 / 1 pts
Question 13
1 / 1 pts
RSPAN depends on which type of VLAN?
RSPAN VLAN
Refer to Chapter 5.
Question 14
1 / 1 pts
Which command would a network administrator use to verify which VLANs are allowed on a trunk?
show interfaces trunk
Refer to Chapter 2.
Question 15
1 / 1 pts
Refer to the exhibit. A port channel link between a branch site and the main site experiences an outage after a hardware upgrade at the branch site. The network administrator at the main site checks the log and sees a “%SPANTREE-2-CHNL_MISCFG” message. What is a likely cause of this message?
The main site has been configured to bundle links into an EtherChannel and the branch site has not.
Refer to Chapter 3.
Question 16
1 / 1 pts
What happens to the route connected to a routed port on a multilayer switch when the port goes down?
It is immediately removed from the routing table.
Refer to Chapter 4.
Question 17
1 / 1 pts
Refer to the exhibit. Switch1 and Switch2 are unable to establish a trunk link. Based on the information in the exhibit, what could be the reason for this problem?
native VLAN mismatch
Refer to Chapter 3.
Question 18
1 / 1 pts
Refer to the exhibit. In a converged spanning tree, how many blocked ports will there be in VLAN 1 for the pictured topology?
2
Refer to Chapter 6.
Question 19
1 / 1 pts
A network administrator is troubleshooting why hosts are taking a suboptimal path to another network and suspects that it is an EIGRP routing problem. Which command should be used to verify which neighbors sent routes, the state of those neighbors, and the distance vector metrics associated with those routes?
show ip eigrp topology
Refer to Chapter 7.
Question 20
1 / 1 pts
A network administrator is troubleshooting packet flow in a routed network where there are two or more equal routes for a particular prefix. Why would the show ip cef exact-route source destination command be useful in this scenario?
The output displays which of the paths a particular packet would take.
Refer to Chapter 6.
Question 21
1 / 1 pts
A network administrator uses the clear ip arp * command on a router. What type of issue is he likely troubleshooting?
IP address to Ethernet MAC address mappings
Refer to Chapter 6.
Question 22
1 / 1 pts
What are two problems that can occur when routes are redistributed in two directions? (Choose two.)
routing loops
suboptimal routing
Refer to Chapter 6.
Incorrect
Question 23
0 / 1 pts
Which two conditions could cause two routers to have trouble establishing a neighbor relationship in an OSPF network? (Choose two.)
Hello packets are not sent from either neighbor.
Slow network connections cause OSPF advertisements to time out.
Refer to Chapter 7.
Question 24
1 / 1 pts
Which statement is true based on the show ip ospf neighbor command output that is shown in the exhibit?
RTB did not receive a hello packet from RTA.
Refer to Chapter 7.
Question 25
1 / 1 pts
What are the three main data structures used by EIGRP? (Choose three.)
interface table
topology table
neighbor table
Refer to Chapter 7.
Question 26
1 / 1 pts
What type of BGP message precedes the successful formation of a BGP peering session?
open
Refer to Chapter 7.
Question 27
Which two pieces of information are displayed by the debug ip bgp command? (Choose two.)
BGP related events
1 / 1 pts
phases of BGP peering relationships
Refer to Chapter 7.
Question 28
1 / 1 pts
Refer to the exhibit. A network administrator is unable to have two BGP peers exchange routing information. Which solution would correct this problem?
Change the neighbor peer IP addresses on R1 and R2 to the loopback interface IP address of the other router.
Refer to Chapter 7.
Question 29
1 / 1 pts
Refer to the exhibit. A network administrator is unable to have two BGP peers exchange routing information. Based on the output generated, which solution would correct this problem?
Issue the neighbor x.x.x.x update-source loopback0 command on both routers.
Refer to Chapter 7.
Question 30
1 / 1 pts
Refer to the exhibit and its partial output. During the testing of the network, it was discovered that the workstations could ping the router but could not reach any outside destinations. Troubleshooting revealed that proper translations were being set up in the router, but communication still was not occurring. What is the problem?
The inbound access list is incorrect and should allow the 192.168.10.1 address.
Refer to Chapter 6.
Question 31
1 / 1 pts
Refer to the exhibit. Based on the output of the debug ip nat command in the exhibit, which two statements are true? (Choose two.)
Packets that are destined for 172.31.2.132 from source 192.168.1.95 a re translated into 172.31.233.209.
Entries that are indicated with NAT* have been translated via the fast path.
Refer to Chapter 6.
Question 32
1 / 1 pts
What is the correct sequence for the DHCP negotiation process?
DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, DHCPACK
Refer to Chapter 6.
Question 33
1 / 1 pts
Refer to the exhibit. A network administrator is troubleshooting a NAT translation issue on router R2. The IP addresses of hosts on the R2 LAN are not being translated by R2. Based on the information in the exhibit, what is the issue?
The R2 LAN is not configured as an inside interface.
Refer to Chapter 6.
Question 34
1 / 1 pts
Refer to the exhibit. A network administrator is troubleshooting a connectivity issue between LAN clients on routers R1 and R3. Connectivity tests from R2 to the R1 and R3 LAN segments are successful. The administrator confirms that a routing issue exists. Based on the information that is presented in the exhibit, which configuration command would correct the problem?
R1(config)# ip route 172.16.6.0 255.255.255.0 172.16.7.10
Refer to Chapter 6.
Question 35
1 / 1 pts
Which Cisco IOS router configuration mode is used to enter the command ip dhcp excluded-address 10.1.1.1?
global configuration
Refer to Chapter 6.
Question 36
1 / 1 pts
Refer to the exhibit. A network engineer is investigating a reported issue of Computer1 not receiving its IP configuration from the DHCP server. Computer2 is receiving its configuration from the DHCP server. What is a plausible reason for this issue?
The DHCP server does not have a DHCP pool for 192.168.0.0 /24 network.
Refer to Chapter 6.
Question 37
1 / 1 pts
Refer to the exhibit. Users are complaining that they are receiving duplicate address error messages when they start their machines. What should the administrator do to correct this problem?
Use the ip dhcp excluded-address command to exclude any statically assigned addresses from the DHCP pool.
Refer to Chapter 6.
Question 38
1 / 1 pts
Refer to the exhibit. Users are complaining that they are unable to connect to resources outside of their corporate network during peak hours. What action should the administrator take to correct this problem?
Increase the size of the NAT pool to provide more IP addresses for translation.
Refer to Chapter 6.
Question 39
1 / 1 pts
Refer to the exhibit. To verify network performance a network administrator issued the show platform tcam utilization command on one of the distribution switches. On the basis of the output provided, what conclusion can be made?
TCAM will punt any additional unicast frames for remote networks to the CPU for forwarding.
Refer to Chapter 4.
Question 40
1 / 1 pts
Refer to the exhibit. What is occurring with the ARP process on the South1-1.10 switch?
ARP is operating normally.
Refer to Chapter 4.
Question 41
1 / 1 pts
What are two reasons why a switch port would have a status of errdisable? (Choose two.)
late collisions duplex mismatch
Refer to Chapter 6.
Question 42
1 / 1 pts
Refer to the exhibit. You have been asked to correct the configuration on R1 so that the Tunnel 0 interface does not flap and R3 can be consistently reached from R1. What command would you issue on R1 to accomplish this?
ip route 10.3.3.3 255.255.255.255 Serial0/0/0
Refer to Chapter 9.
Question 43
1 / 1 pts
Refer to the exhibit. You have been asked to troubleshoot a connectivity issue between R3 and R1. From the partial output of the show running-config command on both routers, what configuration change is required?
The tunnel destination for Tunnel0 on R3 should be the IP address of Loopback0 on R1.
Refer to Chapter 9.
Question 44
1 / 1 pts
Which feature serves to offset the lack of authentication available with IEEE 802.1D Spanning Tree Protocol?
BPDU guard
Refer to Chapter 10.
Question 45
1 / 1 pts
Refer to the exhibit. What could be concluded about the TACACS+ failure based on the exhibited command output from debug tacacs and debug aaa authentication?
The TACACS+ server key of the router does not match that of the TACACS+ server.
Refer to Chapter 9.
Question 46
1 / 1 pts
Refer to the exhibit. A network administrator is trying to secure the remote administration of the router by enabling the use of the SSH protocol. Which changes should be made on the partial configuration as shown in the graphic?
The transport input telne t command should be changed to transport input ssh .
Refer to Chapter 8.
Question 47
1 / 1 pts
Which IPv6 protocol provides Layer 2 address mapping, Duplicate Address Detection (DAD), and stateless autoconfiguration?
Neighbor Discovery (ND)
Refer to Chapter 6.
Question 48
1 / 1 pts
Refer to the exhibit. BPDU guard and PortFast have been configured on all edge ports on the access switches. A junior network administrator tested a new switch in the lab and verified that the bridge ID is 32887. What would happen when the administrator plugs this switch into port Fa0/20 on ASW_1 in an attempt to extend the LAN?
Port Fa0/20 will be shut down.
Refer to Chapter 6.
Question 49
1 / 1 pts
During a network security audit, the auditors indicated a security issue with the transactions between the network devices and the authentication server. The audit concluded that the content of the transactions is not being encrypted. How can this security issue be corrected?
Change the authentication process and server to use TACACS.
Refer to Chapter 8.
Question 50
1 / 1 pts
An administrator has just implemented two-way route redistribution between an OSPF and EIGRP domain. However, network performance between domains quickly degraded and an investigation revealed routing loops. What action could be used to solve this issue?
Filter the routes be ing redistributed between the protocols.
Refer to Chapter 9.
1 / 1 pts
Question 51
How can you prevent the forming of an EIGRP adjacency on a specific segment while still including the interface’s address in the EIGRP routing updates?
By issuing the passive-interface ethernet
slot /number command.
Refer to Chapter 6.
Question 52
What can go wrong with BGP session on Layer 4?
Access lists or firewalls are dropping relevant TCP packets.
1 / 1 pts
Refer to Chapter 8.
Question 53
1 / 1 pts
Where is the outbound distribute list applied in the configuration?
Under BGP configuration with the neighbor command.
Refer to Chapter 8.
Question 54
1 / 1 pts
Which NTP server is used for clock synchronization in the output below? Router# show ntp associations
address ref clock st when poll reach delay offset disp
~192.165.100.101 .INIT. 16 - 1024 0 0.000 0.000 15937.
*~192.165.100.102 .LOCL. 1 615 1024 377 0.000 0.000 2.036
+~192.165.100.103 .LOCL. 1 509 1024 377 0.000 0.000 2.016
192.165.100.102
Refer to Chapter 8.
Question 55
1 / 1 pts
A DNS query was sent by the 10.0.3.33 host to a DNS server at 8.8.8.8. Which access list line will be matched when the response arrives? access-list 100 permit udp host 8.8.8.8 eq 53 10.0.3.33 0.0.0.255 eq 53
access-list 100 permit udp any 10.0.3.33 0.0.0.31 eq 53 access-list 100 permit udp any eq 53 10.0.3.3 0.0.0.31
access-list 100 permit udp any 10.0.3.32 0.0.0.31
Line 4.
Refer to Chapter 8.
Partial
Question 56
0.5 / 1 pts
What does this output of the traceroute command mean? (Choose two.) RouterPC> traceroute 209.165.201.45
Type escape sequence to abort.
Tracing the route to 209.165.201.45
VRF info: (vrf in name/id, vrf out name/id)
1 192.168.0.253 0 msec 0 msec 1 msec
2 192.168.0.253 !H !H *
!H – Host is unreachable.
Refer to Chapter 9.
Question 57
1 / 1 pts
Which show ip sla command displays number of succeed and failed tests?
show ip sla statistics
Refer to Chapter 9.
Question 58
1 / 1 pts
A router is configured with a link-local address using ipv6 address fe80::123 link-local command. When you ping another link-local address, the router
prompts you to provide the source interface. Why?
The router does not know which interface leads to the link-local address you want to ping, therefore the source interface must be manually set.
Refer to Chapter 9.
Question 59
1 / 1 pts
Which protocol and port are used by TACACS+?
TCP/49
Refer to Chapter 9.
Question 60
1 / 1 pts
Which best describes GRE protocol?
GRE adds new IP header, inserts GRE header and encapsulates original IP packet.