Measure Up 100-105 Flashcards
You issue the show logging command on your router, and you see the output shown in the exhibit. Where will messages with a severity of informational be logged? (Choose two.)
Buffer
Monitor Connections
Syslog Server
Console
Buffer
Syslog Server
Your task is to secure the console port on a Cisco router. you have the following requirements:
- anyone with a valid username and password is allowed to connect.
- the session should time out after 10 minutes.
Which set of commands should you use?
Set A:
R1(config)#line vty 0 4
R1(config-line)#login
R1(config-line)#exec-timeout 10
Set B:
R1(config)#line console 0
R1(config-line)#login local
R1(config-line)#exec-timeout 10
Set C:
R1(config)#line console 0
R1(config-line)#login
R1(config-line)#exec-timeout 10
Set D:
R1(config)#line vty 0 4
R1(config-line)#login local
R1(config-line)#exec-timeout 10
Set B:
R1(config)#line console 0
R1(config-line)#login local
R1(config-line)#exec-timeout 10
You have made changes to the running configuration of the Cisco switch. you need to save the current configuration to the NVRAM and verify that the changes made to the current configuration have been actually saved in the NVRAM. Which two commands will help you complete the task? (Choose two.)
show running-config show version show startup-config copy startup-config running-config copy running-config startup-config
show startup-config
copy running-config startup-config
Based on the output from the show ip interface brief command on Core_Rtr_A shown in the exhibit, what does the down value in the Protocol field indicate? (Choose two.)
The physical layer is not functioning properly.
The interface is shutdown.
The data link layer is not functioning properly.
Remote keepalive messages are not being received.
The interface is operational.
The local cable is unplugged.
The data link layer is not functioning properly.
Remote keepalive messages are not being received.
Which command uses a series of packets with low Time-to-Live values (TTL) to determine a path in the network?
traceroute
ip route
ping
icmp
traceroute
Which two network utilities are often used to access and configure a remote Cisco device that is configured with an IP address? (Choose two.)
Ping FTP Traceroute Telnet SSH
Telnet
SSH
You are the network administrator for your company. One of the hosts cannot communicate with a host on a different network. Which Cisco Internetwork Operating System (IOS) command should you issue on the router to find the network path taken by the packets that are getting dropped?
extended ping ping tracert traceroute telnet
traceroute
You re experiencing some problems with your network, which is shown in the exhibit. You issue a ping command from Router A and get the following output:
Router_A#ping 192.168.7.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.7.1, timeout is 2 seconds:
.!!!!
Success rate is 890 percent (4/5), round-trip min/avg/max = 16/16/16 ms
Router_A#
What is a likely cause of the problem that is illustrated by the output of the ping command?
Router B had to issue an Address Resolution Protocol (ARP) request to Router A.
Router A had to issue an Address Resoltion Protocol (ARP) request to Router B.
There is no device with the address 192.168.7.1.
Router C did not receive the ping request.
Router A had to issue an Address Resoltion Protocol (ARP) request to Router B.
You are the network administrator for your company. you configure your network using the subnet 172.16.10.0/24. You are undable to access a remote host with the IP address 62.168.10.20. You check the connectivity using the ping command on the network router. The exhibit shows the output of the ping command. What conclusion can be drawn from the output?
A routing loop has occurred.
A router in the path did not have a route available to the destination.
The destination router was receiving a lot of traffic.
An access control list (ACL) blocked the ping request.
The firewall has blocked the ping request.
A router in the path did not have a route available to the destination.
Which two statement about the traceroute command are true? (Choose two.)
It is used to establish a remote connection over the Internet or Local Area Network(LAN).
It is used to determine the network points where packets are getting dropped.
It finds the path that a packet takes while it is transmitted to a remote destination.
It is used to display the route table information for a remote network.
It is used to make modifications to the console terminal settings.
It is used to determine the network points where packets are getting dropped.
It finds the path that a packet takes while it is transmitted to a remote destination.
You manage a network with multiple Cisco routers and switches. you receive new license files for the routers. you need to install the licenses on each router. What should you do? (Choose two.)
On each router, copy the license file using the copy tftp flash0: command.
On each router, run the license call-hose command.
On each router, copy the license file using the copy flash0: tftp command.
On each router, run the license install command.
On each router, copy the license file using the copy tftp flash0: command.
On each router, run the license install command.
You manage a network with multiple Cisco routers and switches. you receive a new product activation key (PAK) for the routers. You need to install the licenses on each router. What should you do?
On each router, run the license call-home command.
On each router, run the license install command.
On each router, copy the PAK using the copy tftp flash0: command.
On each router, copy the PAK using the copy flash0: tftp command.
On each router, run the license call-home command.
You upgrade the Internetwork Operating System (IOS) on your router. you decide to save a backup copy of the IOS file to your Trivial File transfer protocol (TFTP) server on the local network. Which IOS command should you use?k
Router#copy nvram tftp Router#copy tftp nvram Router#copy tftp system Router#copy system tftp Router#copy tftp flash Router#copy flash tftp
Router#copy flash tftp
you are configuring Cisco routers to use a third-party logging server. The logging server has an IP address of 192.168.1.100. All system events with a severity level of six or lower must be sent to the logging server with the current time. Which block of commands should you run?
Block 1: configure terminal logging 192.168.1.100 service timestamps log uptime logging monitor 6
Block 2: configure terminal logging 192.168.1.100 service timestamps log datetime logging monitor 6
Block 3: configure terminal logging 192.168.1.100 service timestamps log datetime logging trap 6
Block 4: configure terminal logging 192.168.1.100 service timestamps log uptime logging trap 6
Block 3: configure terminal logging 192.168.1.100 service timestamps log datetime logging trap 6
You recently started to manage a network with Cisco routers and switches. You do not know the password to one of the routers. you need to ensure that you can reset the password on the device. What should you do?
Boot the router to rommon and change the configuration register setting to 0x2142.
Boot the router to rommon and manually boot the device from flash memory.
boot the router to rommon and manually boot the device from a TFTP server.
Boot the router to rommon and change the configuration register setting to 0x2102
Boot the router to rommon and change the configuration register setting to 0x2142.
Which Cisco IOS command will generate the following output?
-#—length——-date/time———————–path
1 1336 Apr 08 2010 01:17:54 nvram
2 3273 Dec 01 2011 20:34:32 SDM_Backup
…
61521920 bytes available (68231168 bytes used)
Router#show running-config Router#show flash Router(config)#show running-config Router#show version Router(config)#show version Router(config)#show flash
Router#show flash
You have made some configuration changes to a router running in the network. you want to ensure that these changes are stored in memory so that these changes are available the next time the router is rebooted. Which Cisco IOS command should you use?
router>copy startup-config running0config
router(config)#copy startup-config running-config
router#copy startup-config running -config
router>copy running-config startup-config
router#copy running-config startup-config
router(config)#copy running-config startup-config
router#copy running-config startup-config
You recently completed initial configuration of a router. A new network administrator executes a series of commands on the router that results in changes to that configuration, which he then saves to startup-config. you saved a backup copy of your configuration firle on your Trivial File transfer Protocol (TFTP) server. you want to restore your configuration file from the TFTP server to non-volatile random access memory (NVRAM) on the router. Which IOS command should you use to restore the configuration file?
router#copy tftp flash router#copy tftp running-config router#copy tftp startup-config router#copy running-config tftp router#copy flash tftp router#copy startup-config tftp
router#copy tftp startup-config
Your network has five routers and 20 switches. you need to configure each device to synchronize the logs during telnet sessions. Which commands should you execute on each device?
configure terminal
line console 0
logging trap 5
configure terminal
line vty 0 15
logging trap 5
configure terminal
line vty 0 15
logging synchronous 5
configure terminal
line console 0
logging synchronous 5
configure terminal
line vty 0 15
logging synchronous 5
What are three ways to mitigate a password attack? (Choose three.)
Disconnect the network from the outside world.
Use strong passwords.
Disable an account after a specific number of unsuccessful login attempts.
Do not use the same password on more than one system.
Maintain spares for critical components.
use plaintext passwords.
Use strong passwords.
Disable an account after a specific number of unsuccessful login attempts.
Do not use the same password on more than one system.
Which two statements regarding Secure Shell (SSH) access to network devices are true? (Choose two.)
All information from the network device is sent in clear text.
All information from the network device is encrypted.
All keystrokes to the network Device are sent in clear text.
All keystrokes to the network device are encrypted.
SSH version 1 (SSHv1) is recommended.
All information from the network device is encrypted.
All keystrokes to the network device are encrypted.
You are configuring a new router for your network and want to make access to the router secure. What are three recommended practices for securing router access? (Choose three.)
Use a login banner to display a warning message before the login prompts.
Configure both an enable password and an enable secret command to ensure that if you forget the password configured with the enable secret command, you can use the password configured with the enable password command.
Use Secure Shell (SSH) rather than Telnet to establish a connection on the console line.
Use the same password on the console line and on all virtual terminal (vty) lines.
Encrypt all passwords in the running configuration file by using the service password-encryption command.
Use mixed case passwords.
Use a login banner to display a warning message before the login prompts.
Use the same password on the console line and on all virtual terminal (vty) lines.
Encrypt all passwords in the running configuration file by using the service password-encryption command.
Use mixed case passwords.
You want to make sure that only Secure Shell (SSH) connections are allowed on the vty lines of your router. Anyone attempting to Telnet into the router should not be successful. Which command ensures that only SSH sessions are allowed?
Router(config-line)#transport input ssh
Router(config)#ip ssh version 2
Router(config)#transport input ssh
Router(config-line)#transport input ssh telnet
Router(config)#transport input ssh telnet
Router(config-line)#transport input ssh
You are the network administrator of your company. you have set up a new Cisco router on the network. you want to display a message stating, “Access limited to authorized Administrators only” to anyone who connects to the router. Which Cisco IOS command should you use to display this message?
Router# banner login % Router# banner motd % Router(config)# banner motd# Router(config-line)# banner motd $ Router(config-line)# banner login $ Router (config)# banner login #
Router(config)# banner motd#
You are the network administrator for your company. you are concerned about unauthorized acces to network data. You want all the passwords on the main Cisco router to be encrypted so that attackers cannot read the passwords in the configuration files and gain access to the company’s network. Which single Cisco Internetworking Operating System (IOS) command should you use to accomplish this task?
Router#service password-encryption router#enable secret Router(config)#enable password Router#enable password Router(config)#enable secret Router(config)#service password-encryption
Router(config)#service password-encryption
When looking at the log file for your core router, you frequently notice that more than one log message has the same time stamp. You would like to disseminate the information without having to sort through duplicative stamps. Which command would you use to resolve this problem?
logging synchronous service sequence-numbers logging timestamp mss service logging timestamp sequence logging buffered
service sequence-numbers
Which two statements describe IPv6 link-local addresses? (Choose two.)
Routers will only forward datagrams using link-local addresses.
They are used for addressing on a single link but cannot be used with neighbor discovery protocol.
Nodes with link-local addresses require a globally unique address to communicate.
All IPv6 enabled interfaces have a link-local address.
A link-local address is tied to a particular physical interface.
All IPv6 enabled interfaces have a link-local address.
A link-local address is tied to a particular physical interface.
An IPv6 address contains the following characteristics:
*it can exist more than once in the network.
A message is delivered to the closest interface identified by the address.
Nodes to which this type of address is assigned must be explicitly configured to recognize the address type. What type of IPv6 address is it?
Link-local Global Unicast Anycast Loopback Multicast
Anycast
What are two characteristics of IPv6 unique local addresses? (Choose two.)
They are globally unique and are intended for local communications.
They are expected to be routable on the global Internet.
They should not be used inside of a limited area, such as a site.
They may be routed between a limited set of sites only if IPv6 NAT is enabled.
They have the same functionality as IPv4 private addresses.
They are globally unique and are intended for local communications.
They have the same functionality as IPv4 private addresses.
In which Internet Protocol version 6 (IPv6) address method is a packet delivered to the closest interface that has that address?
Anycast
Broadcast
Milticast
Unicast
Anycast
Which IPv6 addressing method represents communication between a single host and multiple receivers?
Unicast
Anycast
Multicast
Broadcast
Multicast
How many collisions domains are in the network shown in the exhibit?
7
3
5
8
7
Which device creates one broadcast domain and multiple collision domains?
Hub
Router
NIC
Bridge
Bridge
The exhibit shows a network diagram with a firewall and security zones. Which zone should you label as inside, which as outside, and which as DMZ?
1 - Zone DMZ, 2 - Zone Inside, 3 - Zone Outside
1 - Zone inside, 2 - Zone Outside, 3 - Zone DMZ
1 - Zone Outside, 2 - Zone Inside, 3 - Zone DMZ
1 - Zone DMZ, 2 - Zone Outside, 3 - Zone Inside
1 - Zone inside, 2 - Zone Outside, 3 - Zone DMZ
Which protocol is in use between a wireless LAN controller and access points?
LLDP
HTTPS
IPSec
CAPWAP
CAPWAP
You have been asked to connect the network in the engineering department with the network in the research department. The requred bandwidth is 100 Mbps, and the distance between the dpeartments is 400 feet (122 meters). Also, the area the media must be routed through is known to have high EMI. Which media type should you use?
Single-Mode Fiber (1000Base-LX)
Multimode Fiber (1000Base-SX)
Twisted Pair (CAT 5e)
Wireless (IEEE 802.11g)
Multimode Fiber (1000Base-SX)
You have a Cisco router. After installing and switching on the router, you want to connect to the router using your PC. You have HyperTerminal installed on your PC. Which cable type should you use to connect your PC to the console port connector on the router?
RJ-45 to DB-9 console adapter cable
RJ-11 to DB-20 console adapter cable
RJ-11 to DB-9 console adapter cable
RJ-45 to DB-25 black console adapter cable
RJ-45 to DB-9 console adapter cable
You are troubleshooting a network communication issue with a router on the network. The router in question should be directly connected to another router and to two new switches on the network. you want to ensure that the communication issue is not related to physical cabling between the devices. What are the different types of cables required?
Two crossover cables and one straight-through cable
Two straight-through cables and one rollover cable
Two straight-through cables and one crossover cable
Two crossover cables and one rollover cable
Two rollover cables and one crossover cable
Two straight-through cables and one crossover cable
Which address type can be used to send a message from one device to a group of devices that subscribe to the information?
Broadcast address
IP address
Multicast address
Unicast address
Multicast address
You manage the network where computer 1 is accessing a web page on a server. On the packet’s hop to the server, what will be the source MAC address and destination IP address when the packet enters the port on the router coming from computer 1.
MAC address of Computer 1
IP address of Server 1
IP address of interface Fa0/0 on Router 2
MAC address of Interface Fa0/1 on Router 1
IP address of Server 1
MAC address of Interface Fa0/1 on Router 1
What is the broadcast address on the subnet with a device with an IP address 192.168.10.52 and subnet mask 255.255.255.248?
- 168.10.56
- 168.10.53
- 168.10.54
- 168.10.55
- 168.10.51
192.168.10.55
Which statements about UDP and data connection integrity are true? (Choose two.)
UDP packets can be retransmitted using the TCP/IP protocol.
UDP is ompatible with packet broadcast and multicasting.
UDP does basic error checking and correction at a network interface level.
UDP is unreliable because datagrams might arrive out of order or go missing without notice.
UDP uses a simple transmission model of basic hand-shaking dialogues for a reliable and guaranteed connection.
UDP is ompatible with packet broadcast and multicasting.
UDP is unreliable because datagrams might arrive out of order or go missing without notice.
Which statements are true regarding TCP and UDP? (Choose two.)
UDP sends packets individually, guaranteeing a whole packet with a beginning and an end if it arrives safely at the destination. UDP has one packet per one read call.
Whith TCP/IP, data is read as a stream without marking the beginning or the end of the packet. There are multiple packets in one read call.
UDP misses the packets in a stream and keeps sending the data packets until the data stream goes smooth. There might be losses, but UDP manages to send 4 to 5 copies of the same packet at once.
With TCP/IP, data is read as a stream with a distinguished beginning and an end of a packet. There is only one packet per read call.
UDP sends packets individually, guaranteeing a whole packet with a beginning and an end if it arrives safely at the destination. UDP has one packet per one read call.
Whith TCP/IP, data is read as a stream without marking the beginning or the end of the packet. There are multiple packets in one read call.
What are the components of a UDP header? (Choose two.)
Sequence number and acknowledgment number
16-bit data length and checksum
Urgent pointer and checksum
Source port number and destination port number
16-bit data length and checksum
Source port number and destination port number
A web server named Web Server 1 is sending a web page to a web browser on a computer named Web1 using three separate messages. Each message has a TCP header and HTTP information in addition to the actual data. Each message has a sequence number. As shown in the exhibit, the web server sends three messages with their respective sequence numbers to Web1. Two messages with sequence number 1 and 3 reach their destination, but the message with sequence number 2 fails to reach the destination. Which action occurs so that Web1 receives message number 2?
Web1 will modify the TCP segment and send an error detail log to the web server requesting further action.
Web1 modifies the TCP segment and sends the TCP error recovery notice to the web server.
Web1 sends a TCP Acknowledgement to the web server for the missing segment.
Web1 discards the message completely and resends the message.
Web1 sends a TCP Acknowledgement to the web server for the missing segment.
In which network topology is every host device effectively directly connected to every other host device through a common cable?
Mesh
Start
Hybrid
Bus
Bus
Which two statements describe the benefits of a core layer? (Choose two.)
LAN and WAN aggregation
High speed switching and faster scaling
Fault tolerance with a reliable transport
Broadcast domain control feature
Access control lists and filtering used with policy-based security
High speed switching and faster scaling
Fault tolerance with a reliable transport
What does an access layer do in a three-tier architecture?
An access layer interconnects the distribution block to the WAN and Internet edge.
An access layer aggregates large amounts of traffic from all core layer devices.
An access layer provides upstream services for various distribution layer switches.
An access layer incorporates layer 2 switches and access points granting connectivity between servers and workstations.
An access layer incorporates layer 2 switches and access points granting connectivity between servers and workstations.
You are a network engineer. Your network consists of 15 routers. A user reports issues sending a file from one server to another. you want to connect to one of the edge routers and verify the route of packets to the destination. Which step should you take to follow the Cisco organized troubleshooting process?
Use the ping command to isolate the problem.
Escalate the problem to a senior engineer.
Monitor the situation and document all results.
Use the traceroute command to isolate the problem.
Use the traceroute command to isolate the problem.
You have a computer named PC1. You connect to a web server by entering the address www.webserver.com in the web broswer of PC1. You are unable to load the web page www.webserver.com. you can ping the public IP address of this web page. you can the helpdesk and they assigna a network engineer to solve the issue. The network engineer firnds that it is a Layer 3 problem. Which step should the network engineer take to isolate the problem?
Use the traceroute comand to isolate the issue.
Verify DNS settings on PC1.
Verify that PC1 is connected to the internet.
Check speed and duplex settings on PC1.
Verify DNS settings on PC1.