| How do cable modems transfer data across local cable TV lines? | |
| | carries analog signals end-to-end |
| | carries digital signals end-to-end |
| | toggles between radio frequency and analog data signals |
| | modulates digital data to an RF and transmits it at a specific frequency |
| |
| ||||||||||
| |
| ||||||||||
| |
| ||||||||||||||
|
| |
| | The subnet mask for the DHCP pool is incorrect. |
| | The default router that is specified in the DHCP pool is incorrect. |
| | The DHCP excluded addresses are incorrect. |
| | The command ip nat inside and ip nat outside were issued on the incorrect interfaces. |
| | The overload keyword should be removed. |
| Which statement is true about the use of dead peer detection (DPD) within an IPsec environment? | |
| | DPD and Cisco IOS keepalives are sent together. |
| | DPDs are sent at regular intervals. |
| | DPDs are sent when no traffic is flowing. |
| | DPDs are sent by default only when the IKE policy is initiated. |
| | Cisco IOS keepalives are sent by default instead of the DPDs. |
|
| |
| | The key will not be sent encrypted to the peer. |
| | The default authentication has been changed. |
| | The local IP address is 172.16.153.2. |
| | Access-list 2 will be referenced to control traffic. |
|
| |
| | crypto isakmp policy 15 |
| | crypto isakmp policy 15 |
| | crypto isakmp policy 15 |
| | crypto isakmp policy 15 |
| | crypto isakmp policy 15 |
| If SDM is being used, which statement is true when no IKE policies have been configured on a router? | |
| | The hash algorithm used will be MD5. |
| | The lifetime will be unlimited. |
| | Pre-share authentication will be used. |
| | 3DES encryption will be used. |
| |
| ||||||||||||
|
| |
| | Selecting the interface on which the client connections will terminate. |
| | Configuring IKE policies. |
| | Configuring an IPSec transform set. |
| | Configuring a group policy lookup method. |
| | Configuring user authentication. |
| | Configuring group policies on the local router. |
| Which two statements about the Cisco Easy VPN Client for Windows are true? (Choose two.) | |
| | Previously installed versions of the Cisco Easy VPN Client do not have to be uninstalled before proceeding with a new installation. |
| | Previously installed versions of the Cisco Easy VPN Client must be uninstalled before proceeding with a new installation. |
| | The Cisco Easy VPN Client can be installed by using either InstallShield or the Microsoft Windows Installer (MSI). |
| | The Cisco Easy VPN Client can only be installed by using InstallShield. |
| | The Cisco Easy VPN Client can only be installed by using the Microsoft Windows Installer (MSI). |
| | The Cisco Easy VPN Client is only compatible with a Cisco Easy VPN server. |
| |
| ||||||||||||
|
| |
| | Traffic cannot flow between network A and network B until NAT is activated on RTA. |
| | Because access-list 101 does not permit TCP or UDP, traffic will not be encrypted. |
| | Routers inside the Internet will see packets with the destination IP address of 128.107.155.2. |
| | Routers inside the Internet will see packets with the destination IP address of 192.168.0.2. |
| | Traffic will go through an IPsec tunnel. |
| | Traffic will go through a GRE tunnel. |
| An MPLS network consists of label switching routers (LSR) and edge LSRs. What are two functions of an edge LSR but not functions of an LSR? (Choose two.) | |
| | adding labels |
| | removing labels |
| | forwarding of packets |
| | exchanging Layer 3 routing information |
| | exchanging labels |
| | populating an LFIB |
| Which two statements are characteristics of MPLS? (Choose two.) | |
| | Frame Mode MPLS inserts a 32-bit label between the Layer 2 and Layer 3 headers. |
| | Frame Mode MPLS inserts a 53-bit label between the Layer 2 and Layer 3 headers. |
| | Frame Mode MPLS uses the virtual path identifier/virtual channel identifier (VPI/VCI) fields in the ATM header to label the frame. |
| | MPLS over ATM inserts a 32-bit label between the Layer 2 and Layer 3 headers. |
| | MPLS over ATM inserts a 53-bit label between the Layer 2 and Layer 3 headers. |
| | MPLS over ATM uses the virtual path identifier/virtual channel identifier (VPI/VCI) fields in the ATM header to label the frame. |
| |
| ||||||||||||||
| Which VPN implementation model provides optimum routing between customer sites without any special design or configuration effort? | |
| | overlay VPNs |
| | GRE VPNs |
| | VPDN VPNs |
| | peer-to-peer VPNs |
| | non-service-provider MPLS VPNs |
| What is the benefit of implementing the peer-to-peer VPN model? | |
| | The service provider takes care of configuration tasks when adding new VPN sites. |
| | A full mesh of VCs between customer sites is used to provide optimum intersite routing. |
| | The service provider does not participate in customer routing. |
| | The service provider PE routers carry all customer routes. |
| What is the length of a VPNv4 address that uses MPLS-VPN with route distinguishers (RD)? | |
| | 32 bits |
| | 48 bits |
| | 64 bits |
| | 96 bits |
| | 128 bits |
| | 160 bits |
| |
| ||||||||||||||
| Which two statements are correct about applying the mpls ip command on a router interface? (Choose two.) | |
| | Label switching is enabled on the interface. |
| | The command mpls ip must be run on another interface before label switching is enabled. |
| | Because the interface will now use labels to forward IP packets, the interface will no longer transmit or receive routing updates. |
| | The interface will not forward packets until it establishes an MPLS neighbor. |
| | A non-proprietary protocol that is used to distribute labels is activated. |
| | A Cisco proprietary protocol that is used to distribute labels is activated |
| p interface configuration command. What additonal configuration is required to prevent fragmentation across the MPLS network? | |
| | Serial interfaces require the mpls mtu 1492 command. |
| | Ethernet interfaces require the mpls mtu 1492 command. |
| | Serial interfaces require the mpls mtu 1512 command. |
| | Ethernet interfaces require the mpls mtu 1512 command. |
| | MPLS will automatically sense the interface mtu and ensure all frames are within this MTU limit. No extra configuration is required. |
|
| |
| | RTA(config)# interface Serial 0 |
| | RTA(config)# interface Serial 0 |
| | RTA(config)# interface FastEthernet 0/0 |
| | RTA(config)# interface FastEthernet 0/0 |
| | RTA(config)# interface FastEthernet 0/1 |
| | RTA(config)# interface FastEthernet 0/1 |
| ABC Company has configured a full mesh of GRE tunnels to link remote sites via the Internet. Which two statements correctly describe the site interconnections? (Choose two.) | |
| | ABC Company now has a peer-to-peer Layer 3 VPN between sites. |
| | ABC Company now has an overlay Layer 2 VPN between sites. |
| | ABC Company now has an overlay Layer 3 VPN between sites. |
| | All ABC Company subnets will need to be advertised to the Internet to provide Layer 3 connectivity. |
| | This cannot be considered a virtual private network unless IPsec is enabled. |
| | ABC Company routers attached to the Internet can exchange routing updates directly with one another across GRE tunnels. |
| Refer to the exhibit. Which statement is correct about the peer-to-peer VPN model shown? | |
| | The model outlines a network that uses tunnels to establish secure communications between Site#1 and Site#2. |
| | The model outlines a network that interconnects Site#1 and Site#2 via Frame Relay permanent virtual circuits. |
| | The model outlines a network that allows routers attached to Site#1 and Site#2 to advertise routes across the WAN without routers inside the WAN participating in the routing updates. |
| | The model outlines a network that provides point-to-point links between Site#1 and Site#2 unknown to devices inside the WAN. |
| | The model outlines a network that allows routers attached to Site#1 and Site#2 to advertise private routes across the WAN with routers inside the WAN participating in the private routing updates. |
| ABC Company has subscribed to a carrier-provided, full-mesh Frame Relay network. Which two statements correctly describe this network? (Choose two.) | |
| | ABC Company now has a peer-to-peer Layer 2 VPN between sites. |
| | ABC Company now has an overlay Layer 2VPN between sites. |
| | The carrier participates in ABC Company routing updates across the Frame Relay network. |
| | The carrier only provides Layer 3 point-to-point links between sites and does not participate in ABC Company routing updates across the Frame Relay network. |
| | The Frame Relay network cannot be considered a virtual private network unless IPsec is enabled. |
| | ABC Company routers that are attached to the Frame Relay network can exchange routing updates directly with one another. |
| |
| ||||||||||||||
| |
| ||||||||||||||
| |
| ||||||||||||
| |
| ||||||||||||
| What is the maximum number of methods that can be specified in an AAA authentication method list? | |
| | 1 |
| | 4 |
| | 6 |
| | unlimited |
| Which command is used to display TACACS+ configuration and setting information? | |
| | show authentication |
| | show tacacs |
| | show statistics tacacs |
| | show tacacs settings |
| Which keyword is used for minimal accounting and sends a stop record accounting notice at the end of the requested user process? | |
| | stop-only |
| | start-stop |
| | wait-stop |
| | end-stop |
| |
| ||||||||||
| Which statement about the login block-for 15 attempts 3 within 5 command is true? | |
| | The hosts that are predefined in the ACL are not subjected to the quiet time. |
| | After 10 login attempts, the quiet period will start. |
| | Connection attempts made via Telnet and SSH are not affected by the quiet period. |
| | Once the quiet period is activated, it will last for 15 seconds. |
| | This command only applies to hosts defined by ACL 15. |
| Which sequence of steps is recommended for worm attack mitigation? | |
| | Step 1: Containment |
| | Step 1: Containment |
| | Step 1: Inoculation |
| | Step 1: Inoculation |
| | Step 1: Quarantine |
| | Step 1: Quarantine |
| |
| ||||||||||||||
| Which two statements are true about network attacks that use intelligence? (Choose two.) | |
| | A Trojan horse can contain a worm. |
| | A virus can contain a Trojan horse and worms. |
| | A worm can contain a Trojan horse. |
| | A worm can contain a Trojan horse and viruses. |
| | A worm executes and installs copies of itself in the memory of the infected computer. |
| |
| ||||||||||||
| Which range of custom privilege levels can be configured on Cisco routers? | |
| | 1 through 15 |
| | 0 through 14 |
| | 1 through 16 |
| | 2 through 14 |
| | 2 through 15 |
| | 0 through 15 |
|
| |
| | The login authentication DEFAULT command is missing in line vty 0 4 configuration mode. |
| | The vty lines have not been configured, so by default telnet access is denied. |
| | The login command is missing in line vty 0 4 configuration mode. |
| | AAA has not been configured on RTB. |
| | Telnet has been restricted outgoing on RTB. |
|
| |
| | The login authentication default command is missing in line vty 0 4 configuration mode. |
| | The login authentication default-list command is missing in line vty 0 4 configuration mode. |
| | The login command is missing in line vty 0 4 configuration mode. |
| | The peer relationship with the TACACS+ server is unknown. |
| | The TACACS+ server address and key have not been configured. |
| | The user entered an invalid username and password. |
| Which two benefits does stateful packet filtering have over packet filtering or application layer gateways? (Choose two.) | |
| | requires less memory |
| | does not require CEF |
| | modifies the source of traffic |
| | has higher performance |
| | operates mainly at the network layer |
| | is application-aware |
| |
| ||||||||||||
| Which statement is true about configuring the Cisco IOS Firewall interfaces? | |
| | Only one interface can be configured on a device, and the direction can be configured for both inbound and outbound. |
| | Only one interface can be configured on a device, and the direction can be configured for either inbound or outbound. |
| | More than one interface can be configured on a device, but rules can only be applied in a single direction. |
| | More than one interface can be configured on a device, and a separate rule can be configured for the inbound and outbound direction, respectively. |
| Which Cisco IOS Firewall feature statement is true? | |
| | Administrators cannot define their own custom IPS signatures. |
| | Cisco IOS Firewall cannot filter UDP packets. |
| | The authentication proxy is compatible with other Cisco IOS security features, such as NAT, IPsec, and VPN client software. |
| | The Cisco IOS Firewall feature set can only be configured using the SDM. |
| | The Cisco IOS Firewall feature set is included on all IOS 12.4 images or higher. |
| | When a match against a signature is detected by the Cisco IOS Firewall IPS, it can be configured to reset a UDP connection. |
| What are the two guidelines for applying inspection rules and ACLs on the router interface where traffic initiates? (Choose two.) | |
| | Apply a rule in the inbound direction that inspects wanted traffic. |
| | Apply a rule in the outbound direction that inspects wanted traffic. |
| | In the inbound direction apply an ACL that permits only wanted traffic. |
| | In the outbound direction apply an ACL that permits only wanted traffic. |
| | In the inbound direction apply an ACL to deny all traffic that has not been inspected by the firewall. |
| What is the primary use of the state information on a Cisco IOS Firewall? | |
| | to enable logging of traffic |
| | to verify the content of the traffic |
| | to allow deeper packet inspection for stateless protocols such as UDP, as well as for more complex protocols including GRE and IPsec |
| | to allow a temporary opening in the ACL and permit return traffic based on permissible sessions |
| | to eliminate the possibility of embryonic connections |
| Which two statements about the use of a Cisco IOS firewall are true? (Choose two.) | |
| | The Cisco IOS Firewall provides stateful packet filtering. |
| | Standard ACLs are no longer needed when the Cisco IOS Firewall is being used. |
| | The Cisco IOS Firewall is unable to detect fragmented packets. |
| | The Cisco IOS Firewall is application-aware and can inspect a session in more detail than can packet filtering. |
| | The Cisco IOS Firewall can handle UDP connections in the exact same manner that TCP connections are handled. |
| Which three statements about router services are true? (Choose three.) | |
| | BOOTP server is disabled by default and should be enabled to support DHCP. |
| | Configuration auto-loading is enabled by default but should be disabled if not required. |
| | Finger service is enabled by default but should be disabled if not required. |
| | ICMP unreachable notifications are enabled by default but should be disabled on untrusted interfaces. |
| | Proxy ARP is disabled by default and should remain disabled if not required. |
| | TCP keepalives are disabled by default but should be enabled globally. |
| Which two statements about router services are true? (Choose two.) | |
| | Cisco Discovery Protocol (CDP) is enabled by default but should be disabled if not required. |
| | The FTP server is enabled by default but should be disabled if not required. |
| | ICMP redirects are enabled by default and should remain enabled. |
| | IP source routing is enabled by default and should remain enabled. |
| | The Network Time Protocol (NTP) is enabled by default but should be disabled if not required. |
| | Simple Network Management Protocol (SNMP) is enabled by default but should be disabled if not required. |
|
| |
| | Incoming traffic that matches state table entries will be logged. |
| | All incoming IP traffic on the outside interface will be blocked unless the traffic matches state table entries. |
| | ICMP packet-too-big messages incoming on the outside interface will not match in the state table but will be permitted. |
| | All incoming traffic on the outside interface will be logged. |
|
| |
| | Double-clicking the field name Source will sort the list alphabetically in ascending or descending order. |
| | Firewall features should only be applied in an outbound direction. |
| | Interface Fa0/0 is on the inside trusted network. |
| | The IOS firewall configuration is incomplete. |
| | The firewall will filter and deny CUSseeMe protocol traffic. |
| How are Intrusion Prevention System (IPS) and Intrusion Detection System (IDS) components used conjunctively? | |
| | The IDS blocks offending traffic and the IPS verifies that offending traffic was blocked. |
| | The IDS will send alert messages about "gray area" traffic while the IPS will block malicious traffic. |
| | The IPS will block all traffic that the IDS does not mark as legitimate. |
| | The IPS will send alert messages when the IDS sends traffic through that is marked as malicious. |
|
| |
| | A = Adjacency Table |
| | A = BGP Table |
| | A = BGP Table |
| | A = IP Routing Table |
| | A = IP Routing Table |











i already take the exam..this answer can be trusted :)
ReplyDelete