Final Exam Due No due date
Points 60
Questions 60
Time Time Limit 120 Minutes
Allowed Allowed Attem Attem pts 2
Take the Quiz Again
Aempt History Attempt LATEST
Atte mpt 1
Time
Score 58.5 out of 60
a nswers ers are hidden. hidde n. Correct answ Score for this this attempt: 58.5 out of 60
Question Question 1
1 / 1 pts
Which approach is being used when network network maintenance maintenance is performed in in order of of urgency? urgency?
interrupt-driven
Refer to Chapter 3.
Question Question 2
1 / 1 pts
Which structured maintenance methodology should a network engineer use?
the methodology that is prescribed by the organization organization
Refer to Chapter 2.
Question Question 3
1 / 1 pts
What is a characteristic of o f network network maint mai ntenan enance? ce?
Maintaining network documentation is an important element of network maintenance.
Refer to Chapter 3.
Question Question 4
Which backup mechanism presents the highest security risk?
1 / 1 pts
TFTP
Refer to Chapter 3.
Question Question 5
1 / 1 pts
What are two limitations limitatio ns of using buffered buffered logging? loggi ng? (Choose two.)
Oldest messages are overwritten when allocated memory is exceeded.
Log messages are removed when a device is powered down.
Refer to Chapter 3.
Question Question 6
1 / 1 pts
What is the highest logging severity level message that is displayed by default on the console line?
debugging (7)
Refer to Chapter 3.
Question Question 7
1 / 1 pts
What best describes a stratum stratum 3 time source? so urce?
The clock is synchronized to a time server that is in turn synchronized to a stratum 1 time server.
Refer to Chapter 3.
Question Question 8
1 / 1 pts
Which two advantages does scheduled maintenance offer over interrupt-driven events? (Choose two.)
reduced network downtime
predictable lead times times for chang e requests
Refer to Chapter 3.
Question Question 9
1 / 1 pts
Refer to the exhibit. Based on the output that is generated, which two statements are true? (Choose two.)
Every time the running configuration file is saved to NVRAM, it will also be automatically archived.
The archive path is the only mandatory archive parameter that must be configured.
Refer to Chapter 3.
Question Question 10 10
1 / 1 pts
Refer to the exhibit. Which two FTP-related statements are true? (Choose two.)
The ip ftp user name and ip ftp password commands were issued on router R1.
The configuration was copied using a method that is less secure than HTTPS.
Refer to Chapter 3.
Question 11
1 / 1 pts
What term refers to alleviating the symptoms of the problem without resolving the root cause?
workaround
Refer to Chapter 2.
Question Question 12 12
What is the final task in a structured troubleshooting process?
documenting documenting the changes
Refer to Chapter 2.
1 / 1 pts
Question Question 13 13
1 / 1 pts
RSPAN depends on which type of VLAN?
RSPAN VLAN
Refer to Chapter 5.
Question Question 14 14
1 / 1 pts
Which command would a network administrator use to verify which VLANs are allowed on o n a trunk? trunk?
show interfaces trunk
Refer to Chapter 2.
Question Question 15 15
1 / 1 pts
Refer to the exhibit. A port channel link between a branch site and the main site experiences an outage after a hardware upgrade at the branch site. The network network administrator at the main site checks the the log and sees see s a “%SPANTREE-2-CHNL_MI “%SPANTREE-2-CHNL_MISCF SCFG” G” message. What is i s a likely cause of this message?
The main site has been configured to bundle links into an EtherChannel and the branch site has not.
Refer to Chapter 3.
Question Question 16 16
1 / 1 pts
What happens to the route connected to a routed port on a multilayer switch when the port goes down?
It is immediately removed from the routing table.
Refer to Chapter 4.
Question Question 17 17
1 / 1 pts
Refer to the exhibit. Switch1 and Switch2 are unable to establish a trunk link. Based on the information in the exhibit, what could be the reason for this problem?
native VLAN mismatch mismatch
Refer to Chapter 3.
Question Question 18 18
1 / 1 pts
Refer to the exhibit. In a converged spanning tree, how many blocked ports will there there be in VLAN VLA N 1 for the pictured topology?
2
Refer to Chapter 6.
Question Question 19 19
1 / 1 pts
A netw network ork administr administrator ator is troub troublesh leshootin ooting g why why hosts are taking taking a suboptimal suboptimal path to another network and suspects that it is an EIGRP routing problem. Which command should be used to verify which neighbors sent routes, the state of those neighbors, and the the distance di stance vector vector metrics associated associ ated with those routes?
show ip eigrp topology
Refer to Chapter 7.
Question Question 20 20
1 / 1 pts
A netw network ork administr administrator ator is troub troublesh leshootin ooting g packet flow flow in a routed routed network etwork where there are two or more equal routes for a particular prefix. Why would the show ip cef exact-route source destination command be useful in this scenario?
The output displays which which of the paths a particular packet would take.
Refer to Chapter 6.
Question Question 21 21
1 / 1 pts
A netw network ork administr administrator ator uses the the clear ip arp * command comma nd on a router. What type of issue is he likely troubleshooting?
IP address to Ethernet MAC address mappings
Refer to Chapter 6.
Question Question 22 22
1 / 1 pts
What are two problems that can occur when routes are redistributed in two directions? directi ons? (Choose two.)
routing loops
suboptimal routing
Refer to Chapter 6.
Incorrect
Question Question 23 23
0 / 1 pts
Which two conditions could cause two routers to have trouble establishing a neighbor relationship relationship in an OSPF network? network? (Choose (C hoose two.)
Hello packets are not sent from either neighbor.
Slow network connections cause OSPF advertisements to time out.
Refer to Chapter 7.
Question Question 24 24
1 / 1 pts
Which statement is true based on the show ip ospf n eighbor command command output that that is i s shown in the exhib exhibit? it?
RTB did not receive a hello packet from RTA.
Refer to Chapter 7.
Question Question 25 25
1 / 1 pts
What are the three main data structures used by EIGRP? (Choose three.)
interface table
topology table
neighbor table
Refer to Chapter 7.
Question Question 26 26
1 / 1 pts
What type type of BGP message mes sage precedes pre cedes the successful successful formation of a BGP B GP peering session?
open
Refer to Chapter 7.
Question Question 27 27
Which two two pieces pie ces of inf i nformation ormation are displayed di splayed by the the debug ip bgp command? (Choose two.) two.)
BGP related events
1 / 1 pts
phases of BGP peering relationships
Refer to Chapter 7.
Question Question 28 28
1 / 1 pts
Refer to the exhibit. A network administrator is unable to have two BGP peers exchange routing information. Which solution would correct this problem?
Change the neighbor peer IP addresses on R1 and R2 to the loopback interface IP IP address of the other router.
Refer to Chapter 7.
Question Question 29 29
1 / 1 pts
Refer to the exhibit. A network administrator is unable to have two BGP peers exchange routing information. Based on the output generated, which solution would would correct this this problem?
Issue the neighbor x.x x.x.x .x.x .x update-source loopback0 command on both routers.
Refer to Chapter 7.
Question Question 30 30
1 / 1 pts
Refer to the exhibit and its partial output. During the testing of the network, it was discovered that the workstations could ping the router but could not reach any outside destinations. Troubleshooting revealed that proper translations were being set up in the router, but communication still was not occurring. What is the problem?
The inbound access list is is incorrect and should allow the 192.168.10.1 address.
Refer to Chapter 6.
Question Question 31 31
1 / 1 pts
Refer to the exhibit. Based on the output of the debug ip nat command in the exhibit, which two statements are true? (Choose two.)
Packets that are destined for 172.31.2.132 from source 192.168.1.95 a re translated into 172.31.233.209.
Entries that are indicated with NAT* have been translated via the fast path.
Refer to Chapter 6.
Question Question 32 32
1 / 1 pts
What is the correct sequence for the the DHCP negotiation process?
DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, DHCPACK
Refer to Chapter 6.
Question Question 33 33
1 / 1 pts
Refer to the exhibit. A network administrator is troubleshooting a NAT translation issue on router R2. The IP addresses of hosts on the R2 LAN are not being translated by R2. Based on the information in the exhibit, what is the issue?
The R2 LAN L AN is not configured as an inside interface.
Refer to Chapter 6.
Question Question 34 34
1 / 1 pts
Refer to the exhibit. A network administrator is troubleshooting a connectivity issue between LAN clients on routers R1 and R3. Connectivity tests from R2 to the R1 and R3 LAN segments are successful. The administrator confirms that a routing issue exists. Based on the information that is presented in the exhibit, which configuration command would correct the problem?
R1(config)# ip route 172.16.6.0 255.255.255.0 172.16.7.10
Refer to Chapter 6.
Question Question 35 35
1 / 1 pts
Which Cisco IOS router configuration configuration mode is used to enter the command ip dhcp excluded-address 10.1.1.1?
global configuration
Refer to Chapter 6.
Question Question 36 36
1 / 1 pts
Refer to the the exhibi exhibit. t. A network engineer engineer is i s inv i nvestigating estigating a reported issue i ssue of Computer1 not receiving its IP configuration from the DHCP server. Computer2 is receiving its conf c onfiguration iguration from the the DHCP D HCP serv se rver. er. What What is a plausible reason reaso n for this this issue?
The DHCP server does not have a DHCP pool for 192.168.0.0 /24 network.
Refer to Chapter 6.
Question Question 37 37
1 / 1 pts
Refer to the exhibit. Users are complaining that they are receiving duplicate address error messages when they start their machines. What should the administrator do to correct correc t this this problem? p roblem?
Use the ip dhcp excluded-address command to exclude any statically assigned addresses from the DHCP pool.
Refer to Chapter 6.
Question Question 38 38
1 / 1 pts
Refer to the exhibit. Users are complaining that they are unable to connect to resources outside of their their corporate network during peak hours. hours. What action should should the administrator take to correct this this problem?
Increase the size of the NAT pool to provide more IP addresses for translation.
Refer to Chapter 6.
Question Question 39 39
1 / 1 pts
Refer to the exhibit. To verify network performance a network administrator utilization command on one of the issued the show platform tcam utilization
distribution switches. On the basis of the output provided, what conclusion can be made?
TCAM will punt any additional unicast frames for remote networks to the CPU for forwarding. forwarding.
Refer to Chapter 4.
Question Question 40 40
1 / 1 pts
Refer to the exhibit. What is occurring with the ARP process on the South1-1.10 switch?
ARP is is oper ating normally no rmally..
Refer to Chapter 4.
Question Question 41 41
1 / 1 pts
What are two reasons why a switch port would have a status of errdisable? (Choose two.)
late collisions duplex mismatch
Refer to Chapter 6.
Question Question 42 42
1 / 1 pts
Refer to the exhibit. You have been asked to correct the configuration on R1 so that the Tunnel 0 interface does not flap and R3 can be consistently reached from R1. What command would you issue on R1 to accomplish this?
ip route 10.3.3.3 255.255.255.255 Serial0/0/0
Refer to Chapter 9.
Question Question 43 43
1 / 1 pts
Refer to the exhibit. You have been asked to troubleshoot a connectivity issue between R3 and R1. From the partial output of the show running-config command on both routers, what configuration change is required?
The tunnel destination for Tunnel0 on R3 should be the IP address of Loopback0 on R1.
Refer to Chapter 9.
Question Question 44 44
1 / 1 pts
Which feature serves to offset the lack of authentication available with IEEE 802.1D Spanning Spanning Tree Protocol?
BPDU guard guar d
Refer to Chapter 10.
Question Question 45 45
1 / 1 pts
Refer to the exhibit. What could be concluded about the TACACS+ failure based on the exhibited command output from debug tacacs and debug aaa authentication?
The TACACS+ server key of the router does not match that of the TACACS+ server.
Refer to Chapter 9.
Question Question 46 46
1 / 1 pts
Refer to the exhibit. A network administrator is trying to secure the remote administration of the router by enabling the use of the SSH protocol. Which changes should be made on the partial configuration as shown in the graphic?
The transport input telne telne t command command should be changed to transport input ssh .
Refer to Chapter 8.
Question Question 47 47
1 / 1 pts
Which IPv6 IPv6 protocol provides Layer 2 address add ress mapping, mappi ng, Duplicate Duplicate Address A ddress Detection (DAD), (D AD), and stateless autocon autoconfiguration? figuration?
Neighbor Discovery (ND)
Refer to Chapter 6.
Question Question 48 48
1 / 1 pts
Refer to the exhibit. BPDU guard and PortFast have been configured on all edge ports p orts on the the access acce ss switches. A junior junior network administrator tested a new switch in the lab and verified that the bridge ID is 32887. What would happen when when the the administrator admi nistrator plugs plugs this switch into port Fa0/20 Fa 0/20 on ASW_1 AS W_1 in i n an attempt to extend the LAN?
Port Fa0/20 will be shut down.
Refer to Chapter 6.
Question Question 49 49
1 / 1 pts
During a network security audit, the auditors indicated a security issue with the transactions between the network devices and the authentication server. The audit concluded that the content of the transactions is not being encrypted. How can this this security issue be corrected?
Change the authentication process and server to use TACACS TACACS..
Refer to Chapter 8.
Question Question 50 50
1 / 1 pts
An administrato administratorr has has jus justt implemented implemented two-way two-way route route redistribution redistribution between between an OSPF and EIGRP domain. However, network performance between domains quickly degraded and an a n investigati investigation on revealed routing routing loops. What action could could be used to solve this this issue?
Filter the routes be ing redistributed between between the protocols.
Refer to Chapter 9.
1 / 1 pts
Question Question 51 51
How can you prevent the forming of an EIGRP adjacency on a specific segment while still including the interface’s address in the EIGRP routing updates?
By issuing the passive-interface ethernet
command. slot /number command.
Refer to Chapter 6.
Question Question 52 52
What can go wrong with BGP session on Layer 4?
Access lists or firewalls are dropping dr opping relevant relevan t TCP packets.
1 / 1 pts
Refer to Chapter 8.
Question Question 53 53
1 / 1 pts
Where is the the outbound outbound distribute di stribute list applied appli ed in i n the the configuration?
Under BGP configuration with the neighbor command. command.
Refer to Chapter 8.
Question Question 54 54
1 / 1 pts
Which NTP server is used for clock synchronization in the output below? Router# show ntp associations
address ref clock st when poll reach delay offset disp
~192.165.100.101 ~192.165.100 .101 .INIT. 16 - 1024 0 0.000 0.000 15937.
*~192.165.100.102 *~192.165.10 0.102 .LOCL. 1 615 1024 377 0.000 0.000 2.036
+~192.165.100.103 +~192.165.10 0.103 .LOCL. 1 509 1024 377 0.000 0.000 2.016
192.165.100.102
Refer to Chapter 8.
Question Question 55 55
1 / 1 pts
A DNS query query was sent sent by the the 10.0.3. 10.0.3.33 33 host host to a DNS server server at 8.8.8.8. 8.8.8.8. Which Which access list line will be matched matched when the the response respo nse arrives? access-list 100 permit udp host 8.8.8.8 eq 53 10.0.3.33 0.0.0.255 eq 53
access-list 100 permit udp any 10.0.3.33 0.0.0.31 eq 53 access-list 100 permit udp any eq 53 10.0.3.3 0.0.0.31
access-list 100 permit udp any 10.0.3.32 0.0.0.31
Line 4.
Refer to Chapter 8.
Partial
Question Question 56 56
0.5 / 1 pts
What does this output of the traceroute command mean? (Choose two.) RouterPC> traceroute 209.165.201.45
Type escape sequence to abort.
Tracing the route to 209.165.201.45
VRF info: (vrf in name/id, vrf out name/id)
1 192.168.0.253 0 msec 0 msec 1 msec
2 192.168.0.253 !H !H *
!H – Host is unreachable.
Refer to Chapter 9.
Question Question 57 57
1 / 1 pts
Which show ip sla command display disp lays s number number of succeed and failed tests?
show ip sla statistics
Refer to Chapter 9.
Question Question 58 58
1 / 1 pts
fe80::123 123 A router router is configu configured red with with a link-l link-local ocal address using ipv6 address fe80:: link-local command. When you ping another link-local address, the router
prompts you to provide the source interface. Why?
The router does not know which which interface leads to the link-local link-local address you want to ping, ther efore the source interface must be manually set.
Refer to Chapter 9.
Question Question 59 59
1 / 1 pts
Which protocol and and port are used by TAC TACACS ACS+? +?
TCP/49
Refer to Chapter 9.
Question Question 60 60
1 / 1 pts
Which best describes GRE protocol?
GRE adds new IP header, inserts GRE header and encapsulates original IP packet.
Refer to Chapter 9.
Quiz Score: 58.5 out of 60