Final Flashcards
What are two main components of data confidentiality? (Choose two.)
encapsulation
encryption
Which network component has the primary function of detecting and logging attacks made against the network?
intrusion detection system
Refer to the exhibit. A network administrator has issued the commands that are shown on Router1 and Router2. A later review of the routing tables reveals that neither router is learning the LAN network of the neighbor router. What is most likely the problem with the RIPng configuration?
The RIPng process is not enabled on interfaces.
Which three guidelines would help contribute to creating a strong password policy?
Deliberately misspell words when creating passwords.
Create passwords that are at least 8 characters in length.
Use combinations of upper case, lower case, and special characters.
Refer to the exhibit. The link between the CTRL and BR_1 routers is configured as shown in the exhibit. Why are the routers unable to establish a PPP session?
The usernames are misconfigured.
Refer to the exhibit. Headquarters is connected through the Internet to branch office A and branch office B. Which WAN technology would be best suited to provide secure connectivity between headquarters and both branch offices?
VPN
Which combination of authentication and Layer 2 protocol should be used to establish a link between a Cisco and a non-Cisco router without sending authentication information in plain text?
CHAP and PPP
A technician is talking to a colleague at a rival company and comparing DSL transfer rates between the two companies. Both companies are in the same city, use the same service provider, and have the same rate/service plan. What is the explanation for why company 1 reports higher download speeds than company 2 reports?
Company 1 is closer to the service provider than is company 2.
Refer to the exhibit. The network administrator creates a standard access control list to prohibit traffic from the 192.168.1.0/24 network from reaching the Internet. The access list must still permit the 192.168.1.0/24 network access to the 192.168.2.0 network. On which router interface and in which direction should the access control list be applied?
interface S0/0/0, outbound
An administrator is configuring a dual stack router with IPv6 and IPv4 using RIPng. The administrator receives an error message when trying to enter the IPv4 routes into RIPng. What is the cause of the problem?
IPv4 is incompatible with RIPng.
Refer to the exhibit. A network administrator is trying to backup the IOS software on R1 to the TFTP server. He receives the error message that is shown in the exhibit, and cannot ping the TFTP server from R1. What is an action that can help to isolate this problem?
Check that R1 has a route to the network where the TFTP server resides.
Refer to the exhibit. Partial results of the show access-lists and show ip interface FastEthernet 0/1 commands for router Router1 are shown. There are no other ACLs in effect. Host A is unable to telnet to host B. Which action will correct the problem but still restrict other traffic between the two networks?
Reverse the order of the TCP protocol statements in the ACL.
What component of VPN technology combines message text with a key to make the message unreadable by unauthorized receivers?
encryption algorithm
Which variable is permitted or denied by a standard access control list?
source IP address
Refer to the exhibit. An ACL called Managers already exists on this router. What happens if the network administrator issues the commands as shown in the exhibit?
The existing ACL is modified to include the new command.
Refer to the exhibit. RIPv2 has been configured on all routers in the network. Routers R1 and R3 have not received any RIP routing updates. What will fix the issue?
Enable RIP authentication on R2.
What name is given to the location where a customer network interfaces with a network that is owned by another organization?
demarcation point
Refer to the exhibit. What is placed in the address field in the header of a frame that will travel from the Orlando router to the DC router?
DLCI 123
Refer to the exhibit. Communication between two peers has failed. Based on the output that is shown, what is the most likely cause?
PPP negotiation failure
What will be the result of adding the command ip dhcp excluded-address 10.10.4.1 10.10.4.5 to the configuration of a local router that has been configured as a DHCP server?
The DHCP server will not issue the addresses ranging from 10.10.4.1 to 10.10.4.5.
What functionality do access control lists provide when implementing dynamic NAT on a Cisco router?
which addresses are to be translated
Which statement about a VPN is true?
VPNs use virtual Layer 3 connections that are routed through the Internet.
Refer to the exhibit. Results of the show vlan and show vtp status commands for switches S1 and S2 are displayed in the exhibit. VLAN 11 was created on S1. Why is VLAN 11 missing from S2?
The VTP domain names do not match.
An administrator is unable to receive e-mail. While troubleshooting the problem, the administrator is able to ping the local mail server IP address successfully from a remote network and can also successfully ping using the mail server name. At which layer of the OSI model is the problem most likely to be found?
application layer