考题
After working all night and successfully configuring a Cisco router for the Ezonexam network you save your changes on the startup config, reboot the router, and go out for a cigarette. When you return, none of your changes are active and the router boots to the initial configuration mode! Which of the choices below indicates the source of your problem?A.Hardware failure in NVRAM prevents the router from loading the configB.Startup-config in flash is corrupt and cannot be analyzedC.Router configuration-register set to bypass startup configurationD.Startup-config in NVRAM is corrupt and cannot be analyzedE.None of the above
考题
Why might the Ezonexam network administrator set the configuration register to 0x2142 on a 2600 series Cisco router?A.To boot the IOS from ROMB.To reset the console passwordC.To upload a new version of the configuration fileD.To upload a new version of the IOSE.To allow a new memory upgrade to be recognized by the router
考题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?A. BPDUB. Port securityC. RSTPD. STPE. VTPF. Blocking mode
考题
Which of the following should an administrator do after running a command from the console onthe perimeter router?()
A. Update the configuration logsB. Update the network wiring schematicsC. Update the network configuration proceduresD. Compare the configuration with the baseline
考题
A network administrator needs to allow only one Telnet connection to a router. For anyone viewing the configuration and issuing the show run command, the password for Telnet access should be encrypted. Which set of commands will accomplish this task?()A.B.C.D.
考题
For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。
A.IPB.ICMPC.TCPD.UDP
考题
A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router.How should the network administrator configure the serial interface of the main office router to make the connection?()A.B.C.D.
考题
You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP
考题
The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to router) basis?()A、nGenius Real-Time MonitorB、Cisco ViewC、Device Fault ManagerD、Internetwork Performance Monitor
考题
A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()A、access-list 10 permit ip 192.168.147.0 0.0.0.255.255B、access-list 10 permit ip 192.168.149.0 0.0.0.255.255C、access-list 10 permit ip 192.168.146.0 0.0.0.0.255D、access-list 10 permit ip 192.168.146.0 0.0.1.255E、access-list 10 permit ip 192.168.148.0 0.0.1.255F、access-list 10 permit ip 192.168.146.0 255.255.255.0
考题
After working all night and successfully configuring a Cisco router for the TestKing network you save your changes on the startup config, reboot the router, and go out for a cigarette. When you return, none of your changes are active and the router boots to the initial configuration mode! Which of the choices below indicates the source of your problem?()A、Hardware failure in NVRAM prevents the router from loading the configB、Startup-config in flash is corrupt and cannot be analyzedC、Router configuration-register set to bypass startup configurationD、Startup-config in NVRAM is corrupt and cannot be analyzedE、None of the above
考题
A network administrator is configuring ACLs on a cisco router,to allow traffic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0and192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()A、access-list 10 permit ip 192.168.147.0 0.0.0.255.255B、access-list 10 permit ip 192.168.149.0 0.0.0.255.255C、access-list 10 permit ip 192.168.146.0 0.0.0.0.255D、access-list 10 permit ip 192.168.146.0 0.0.0.1.255E、access-list 10 permit ip 192.168.148.0 0.0.0.1.255F、access-list 10 permit ip 192.168.146.0 255.255.255.0
考题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode
考题
What are two reasons that a network administrator would use access lists? (Choose two.) ()。A、to control vty access into a router B、to control broadcast traffic through a router C、to filter traffic as it passes through a router D、to filter traffic that originates from the router E、to replace passwords as a line of defense against security incursions
考题
On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()A、a router with subinterfaces configured on the physical interface that is connected to the switchB、a router with an IP address on the physical interface connected to the switchC、a switch with an access link that is configured between the switchesD、a switch with a trunk link that is configured between the switches
考题
Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()A、WPA-PSK encryptionB、SSID broadcastC、Port forwardingD、MAC filtering
考题
多选题A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()Aaccess-list 10 permit ip 192.168.147.0 0.0.0.255.255Baccess-list 10 permit ip 192.168.149.0 0.0.0.255.255Caccess-list 10 permit ip 192.168.146.0 0.0.0.0.255Daccess-list 10 permit ip 192.168.146.0 0.0.1.255Eaccess-list 10 permit ip 192.168.148.0 0.0.1.255Faccess-list 10 permit ip 192.168.146.0 255.255.255.0
考题
单选题After working all night and successfully configuring a Cisco router for the TestKing network you save your changes on the startup config, reboot the router, and go out for a cigarette. When you return, none of your changes are active and the router boots to the initial configuration mode! Which of the choices below indicates the source of your problem?()A
Hardware failure in NVRAM prevents the router from loading the configB
Startup-config in flash is corrupt and cannot be analyzedC
Router configuration-register set to bypass startup configurationD
Startup-config in NVRAM is corrupt and cannot be analyzedE
None of the above
考题
单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A
STPB
GVRPC
SNMPD
VTPE
DHCP
考题
多选题A network administrator is configuring ACLs on a cisco router,to allow traffic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0and192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()Aaccess-list 10 permit ip 192.168.147.0 0.0.0.255.255Baccess-list 10 permit ip 192.168.149.0 0.0.0.255.255Caccess-list 10 permit ip 192.168.146.0 0.0.0.0.255Daccess-list 10 permit ip 192.168.146.0 0.0.0.1.255Eaccess-list 10 permit ip 192.168.148.0 0.0.0.1.255Faccess-list 10 permit ip 192.168.146.0 255.255.255.0
考题
单选题Which of the following should an administrator do after running a command from the console onthe perimeter router?()A
Update the configuration logsB
Update the network wiring schematicsC
Update the network configuration proceduresD
Compare the configuration with the baseline
考题
单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A
BPDUB
Port securityC
RSTPD
STPE
VTPF
Blocking mode
考题
多选题Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()APort security needs to be globally enabled.BPort security needs to be enabled on the interface.CPort security needs to be configured to shut down the interface in the event of a violation.DPort security needs to be configured to allow only one learned MAC address.EPort security interface counters need to be cleared before using the show command.FThe port security configuration needs to be saved to NVRAM before it can become active.
考题
单选题On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()A
a router with subinterfaces configured on the physical interface that is connected to the switchB
a router with an IP address on the physical interface connected to the switchC
a switch with an access link that is configured between the switchesD
a switch with a trunk link that is configured between the switches
考题
单选题For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?()A
IPB
ICMPC
TCPD
UDP
考题
单选题The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to-router) basis?()A
nGenius Real-Time MonitorB
CiscoViewC
Device Fault ManagerD
Internetwork Performance Monitor
考题
单选题Refer to the exhibit. A network administrator configures a new router and enters the copy startup-config running-config on the router. The network administrator powers down the router and sets it up at a remote location. When the router starts, it enter the system configuration dialog as shown. What is the caust of the problem?()A
The network administrator faled to save the configuration.B
The configuration register is set to 0x2100.C
The boot system flash command is missing from the configuration.D
The configuraiton register is set to 0x2102.E
The router is configured with the boot system startup command.