YOU WERE LOOKING FOR: Cisco 3 Chapter 8 Exam Answers
Enable the serial interfaces of both routers. Configure the same hello interval between the routers. Fill in the blank. Do not use abbreviations. The passive-interface command causes an EIGRP router to stop sending hello packets through an...
Which two conclusions can be drawn from the exhibited configuration? Choose two. The configuration supports equal-cost load balancing. The configuration supports unequal-cost load balancing. The network statements require subnet masks to prevent...
Not all options are used. The router displays a console message to configure the router ID manually. What is the function of STP in a scalable network? It decreases the size of the failure domain to contain the impact of failures. It protects the edge of the enterprise network from malicious activity. It disables redundant paths to eliminate Layer 2 loops. It combines multiple switch trunk links to act as one logical link for increased bandwidth. Refer to the exhibit. The routers are unable to form a neighbor adjacency. What should be done to fix the problem? Implement the command network Change the router-id of router R2 to 2. Choose three. R5 is BDR for segment B. R1 is BDR for segment A. R3 is DR for segment A. R2 is DR for segment A. R4 is DR for segment B. R3 is DR for segment B. What are three characteristics of VTP? VTP-enabled switches exchange three types of advertisements: summary routes, subnet advertisements, and advertisement requests from transparent bridges.
VTP updates are exchanged across trunk links only. The switch configuration must be saved and the switch reloaded to reset a configuration revision number. Switches in different VTP domains can exchange updates if revision numbers are the same. What term is used to express the thickness or height of a switch?
Fill in the blank. Do not use abbreviations. The passive-interface command causes an EIGRP router to stop sending hello packets through an interface. What is a possible cause for this failure? The same autonomous system numbers must be used in the interface configurations of each router. The same number of key strings must be used on each router. The authentication configuration is correct, issue the show ip eigrp neighbors command to troubleshoot the issue. The same key chain name must be used on each router. The key string should be used in interface mode instead of the key chain. Which statement is true about the implementation of summarization in this network?
Automatic summarization is disabled on R3. Automatic summarization has been enabled only for the Automatic summarization is enabled on neighboring routers. Automatic summarization is disabled on a per-interface basis. Which issue could be causing this problem? After the configuration shown is applied on router R1, the exhibited status message is displayed. What is the most likely cause of this problem? R1 and R2 can ping the directly connected serial interface of their neighbor, but they cannot form an EIGRP neighbor adjacency. What action should be taken to solve this problem? Enable the serial interfaces of both routers.
Refer to the exhibit. A network administrator is configuring a router for DHCPv6 operation. Which conclusion can be drawn based on the commands? The router is configured for stateless DHCPv6 operation. Clients would configure the interface IDs above Therefore, it is not configured for stateful DHCPv6 operation. There is a web server for public access on the LAN that is attached to the router. The router is also the gateway for a LAN.
It is a SOHO or home broadband router. The router is configured as a DHCP server. The IP address that is assigned is typically a dynamic address to reduce the cost, but a static IP address is possible with more cost. However, if the router is assigned a dynamic IP address, DNS issues will result in the web server behind the router not being easily accessible to the public. What does this indicate? The client should be statically configured with an IPv6 address because the local router does not support autoconfiguration. If the M flag is set to 0 it means that the host should automatically configure its own IPv6 interface address rather than asking for one from a DHCPv6 server. If the O flag is set to 1, it means that the client can find additional addressing information, such as a DNS server address, by contacting a DHCPv6 server after it has automatically configured its own address.
Sixteen bits will yield subnets. Fill in the blank. The last host address on the Explanation: The host portion of the last host address will contain all 1 bits with a 0 bit for the lowest order or rightmost bit. This address is always one less than the broadcast address. The range of addresses for the network So the last host address for this network is The network portion of the address The network portion of the address is therefore Three devices are on three different subnets.
Match the network address and the broadcast address with each subnet where these devices are located. Not all options are used. Device 1: IP address Draw a line showing where the subnet mask 1s end. For example, with Device 1, the final octet 77 is Change all the bits to the right of the line to 0s to determine the network number or Change all the bits to the right of the line to 1s to determine the broadcast address or Search for:.
What is a common function of a proxy server? Which task should be included in the preventive maintenance program? Disconnect and reconnect all patch cables. Inspect all patch cables for breaks. Replace all cable supports to prevent loose attachment points. What is a benefit of performing preventative maintenance at regular intervals? While the technician is checking the computer, the other users on the same network report that they are having the same problem.
What should the technician do next? Check each computer to verify that they all have the same settings. Report the problem to the network administrator. Use nslookup to check network connectivity. A user can print to a printer that is on the same network, but the traffic of the user cannot reach the Internet. What is a possible cause of the problem?
The PC default gateway address is missing or incorrect. The network cable connected to the user PC is faulty. A technician is investigating a report that a computer is unable to access network resources. The technician discovers that the computer has an IP address of What is a logical first step in diagnosing this problem? Attempt to ping the default gateway. Activate Network Discovery and File Sharing. A Windows 7 computer is unable to reach a mapped drive on a file server that is on another network within the organization. Further investigation shows that the user is able to use a printer that is connected to the same network as the computer. Which action should the technician perform next? Verify that DNS name resolution is operating properly. Inspect the network patch cable for wear or breaks. A user has taken a personal laptop to work. The laptop is unable to discover the name of the office wireless network. What are two potential causes of this problem?
Choose two. The wireless router is not broadcasting the SSID. The wireless router is set to mixed mode. The network does not support the wireless protocol in use by the laptop. A network technician attempts to ping www. Access to mapped network drives and a shared printer are working correctly. What are two potential causes for this problem? The Windows domain or workgroup name that is configured on the computer is incorrect. The target web server is down. DNS service is unavailable on the customer network. A technician uses the nbtstat -A What does the technician expect to view in the command output? What is the acronym for the protocol that is used when securely communicating with a web server? A custom OS may reduce sandboxing features. The operating system can be fine-tuned to improve the speed of the device. The user interface can be extensively customized. What are two purposes of the passcode lock feature on mobile devices? Flash memory has a drive head that moves, reducing the seek time to locate data.
Flash memory requires very little power to store and retrieve data. Flash memory is highly resistant to water and cold. What are two touchscreen characteristics that are used by most mobile devices?
Addresses The address ranges that are available include A network administrator needs to monitor network traffic to and from servers in a data center. Which features of an IP addressing scheme should be applied to these devices? Using a predictable static addressing scheme for these devices makes them easier to identify. Server security, redundancy, and duplication of addresses are not features of an IP addressing scheme. Choose two. It eliminates most address configuration errors. It guarantees that every device that needs an address will get one. It provides an address only to devices that are authorized to be connected to the network. It reduces the burden on network support staff. However, DHCP itself does not discriminate between authorized and unauthorized devices and will assign configuration parameters to all requesting devices. DHCP servers are usually configured to assign addresses from a subnet range, so there is no guarantee that every device that needs an address will get one.
The address pool is configured with There are 3 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to other hosts?
What happens immediately after two OSPF routers have exchanged hello packets and have formed a neighbor adjacency? They exchange DBD packets in order to advertise parameters such as hello and dead intervals. They negotiate the election process if they are on a multiaccess network. They request more information about their databases. They exchange abbreviated lists of their LSDBs. Choose two. Which command should be used to check the OSPF process ID, the router ID, networks the router is advertising, the neighbors the router is receiving updates from, and the default administrative distance? What are two reasons that will prevent two routers from forming an OSPFv2 adjacency? Which three addresses could be used as the destination address for OSPFv3 messages?
When will a router drop a traceroute packet? What is indicated by a successful ping to the IPv6 address? The host is cabled properly. The default gateway address is correctly configured. All hosts on the local link are available. The link-local address is correctly configured. IP is properly installed on the host. Which two things can be determined by using the ping command? Choose two. Fill in the blank. The decimal equivalent of the binary number is What is the decimal equivalent of the hex number 0x3F? Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
VPN traffic is encrypted only between the interconnecting devices, and internal hosts have no knowledge that a VPN is used. Which is a requirement of a site-to-site VPN? It requires hosts to use Chaptef client aanswers to encapsulate traffic. It requires the placement of a VPN server at the edge of the company network. It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic. Explanation: Site-to-site Cbapter are static and are used to connect entire networks. The VPN gateway is responsible for encapsulating the traffic and forwarding it through the VPN tunnel to a peer gateway at the other end which decapsulates the traffic. What is the function of the Diffie-Hellman algorithm within the IPsec framework? DH Diffie-Hellman is an algorithm used for key exchange. DH is a public exaam exchange method that allows two IPsec peers to establish a shared secret key over an insecure channel.
What does NAT overloading use to track multiple internal hosts that use one inside global address? Question as presented: CCNA 3 v7. The inside global address is the translated address of the source or the address as seen by the outside device. Since the PC is using the outside address of the R1 router, the chater global address is The outside addressing is simply the address of the server or Refer to the exhibit.
CCNA 3 v7. Internet hosts will send packets to PC1 and use as a destination address the inside global address The traffic from a source IPv4 address of Explanation: Because no outside local or outside global address is referenced, the traffic from a source IPv4 address of In the output from the command show ip nat translations, the inside local IP address of A public Cisco 3 chapter 8 exam answers device can connect to chhapter private IPv4 device Which two WAN infrastructure services are examples of private connections? Choose two.
Addresses The address ranges that are available include Which features of an IP addressing scheme should be applied to these devices? Using a predictable static addressing scheme for these devices makes them easier to identify. Server security, redundancy, and duplication of addresses are not features of an IP addressing scheme. Choose two. It eliminates most address configuration errors. It ensures that addresses are only applied to devices that require a permanent address. It guarantees that every device that needs an address will get one. It provides an address cisck to devices that are authorized to be connected to the network.
No comments:
Post a Comment