Interconnecting Cisco Networking Devices Part 1 v3.0 (ICND1)

 

QUESTION 161

Refer to the exhibit. The two connected ports on the switch are not turning orange or green. What would be the most effective steps to troubleshoot this physical layer problem? (Choose three.)

 

clip_image002

 

A.

Ensure that the Ethernet encapsulations match on the interconnected router and switch ports.

B.

Ensure that cables A and B are straight-through cables.

C.

Ensure cable A is plugged into a trunk port.

D.

Ensure the switch has power.

E.

Reboot all of the devices.

F.

Reseat all cables.

 

Correct Answer: BDF

Explanation:

The ports on the switch are not up indicating it is a layer 1 (physical) problem so we should check cable type, power and how they are plugged in.

 

 

QUESTION 162

Refer to the exhibit. The network administrator is testing connectivity from the branch router to the newly installed application server. What is the most likely reason for the first ping having a success rate of only 60 percent?

 

clip_image004

 

A.

The network is likely to be congested, with the result that packets are being intermittently dropped.

B.

The branch router had to resolve the application server MAC address.

C.

There is a short delay while NAT translates the server IP address.

D.

A routing table lookup delayed forwarding on the first two ping packets.

E.

The branch router LAN interface should be upgraded to FastEthernet.

 

Correct Answer: B

Explanation:

Initially the MAC address had to be resolved, but once it is resolved and is in the ARP table of the router, pings go through immediately.

 

 

QUESTION 163

Refer to the exhibit. An administrator cannot connect from R1 to R2. To troubleshoot this problem, the administrator has entered the command shown in the exhibit. Based on the output shown, what could be the problem?

 

clip_image005

 

A.

The serial interface is configured for half duplex.

B.

The serial interface does not have a cable attached.

C.

The serial interface has the wrong type of cable attached.

D.

The serial interface is configured for the wrong frame size.

E.

The serial interface has a full buffer.

 

Correct Answer: C

Explanation:

http://www.thebryantadvantage.com/CCNACertificationExamTutorialDirectlyConnectedSerialInterfaces.htm

 

Since the output is not forthcoming it shows that the type of cable attached is wrong, though the cable is connected since it shows the cable type. According to the figure DTE cable should connect to R1 on interface but while examining using show controllers serial 0/0 command it showing that a DCE is connected so the wrong type of cable is being used.

 

 

 

 

 

QUESTION 164

The following commands are entered on the router:

 

Burbank(config)# enable secret fortress

 

Burbank(config)# line con 0

 

Burbank(config-line)# login

 

Burbank(config-line)# password n0way1n

 

Burbank(config-line)# exit

 

Burbank(config)# service password-encryption

 

What is the purpose of the last command entered?

 

A.

to require the user to enter an encrypted password during the login process

B.

to prevent the vty, console, and enable passwords from being displayed in plain text in the configuration files

C.

to encrypt the enable secret password

D.

to provide login encryption services between hosts attached to the router

 

Correct Answer: B

Explanation:

Certain types of passwords, such as Line passwords, by default appear in clear text in the configuration file. You can use the service password-encryption command to make them more secure. Once this command is entered, each password configured is automatically encrypted and thus rendered illegible inside the configuration file (much as the Enable/Enable Secret passwords are). Securing Line passwords is doubly important in networks on which TFTP servers are used, because TFTP backup entails routinely moving config files across networks–and config files, of course, contain Line passwords.

 

 

QUESTION 165

Two routers named Atlanta and Brevard are connected by their serial interfaces as shown in the exhibit, but there is no data connectivity between them. The Atlanta router is known to have a correct configuration. Given the partial configurations shown in the exhibit, what is the problem on the Brevard router that is causing the lack of connectivity?

 

clip_image007

 

A.

A loopback is not set.

B.

The IP address is incorrect.

C.

The subnet mask is incorrect.

D.

The serial line encapsulations are incompatible.

E.

The maximum transmission unit (MTU) size is too large.

F.

The bandwidth setting is incompatible with the connected interface.

 

Correct Answer: B

Explanation:

The connection between two routers must have IP addresses that belong to the same subnet, but in this case Atlanta is using 192.168.10.1/24 and the other is in 192.168.11.1/24.

 

 

QUESTION 166

Refer to the exhibit. A technician pastes the configurations in the exhibit into the two new routers shown. Otherwise, the routers are configured with their default configurations. A ping from Host1 to Host 2 fails, but the technician is able to ping the S0/0 interface of R2 from Host 1. The configurations of the hosts have been verified as correct. What could be the cause of the problem?

 

clip_image009

 

A.

The serial cable on R1 needs to be replaced.

B.

The interfaces on R2 are not configured properly

C.

R1 has no route to the 192.168.1.128 network.

D.

The IP addressing scheme has overlapping subnetworks.

E.

The ip subnet-zero command must be configured on both routers.

 

Correct Answer: C

Explanation:

Without a static route pointing to the host 2 network the router R1 is unaware of the path to take to reach that network and reply traffic cannot be sent.

 

 

 

 

QUESTION 167

clip_image011

clip_image013

 

Which two of the following are true regarding the configuration of RouterA? (Choose two.)

 

A.

At least 5 simultaneous remote connections are possible

B.

Only telnet protocol connections to RouterA are supported

C.

Remote connections to RouterA using telnet will succeed

D.

Console line connections will nevertime out due to inactivity

E.

Since DHCP is not used on Fa0/1 there is not a need to use the NAT protocol

 

Correct Answer: AC

 

QUESTION 168

A company has placed a networked PC in a lobby so guests can have access to the corporate directory. A security concern is that someone will disconnect the directory PC and re-connect their laptop computer and have access to the corporate network. For the port servicing the lobby, which three configuration steps should be performed on the switch to prevent this? (Choose three.)

 

A.

Enable port security.

B.

Create the port as a trunk port.

C.

Create the port as an access port.

D.

Create the port as a protected port.

E.

Set the port security aging time to 0.

F.

Statically assign the MAC address to the address table.

G.

Configure the switch to discover new MAC addresses after a set time of inactivity.

 

Correct Answer: ACF

Explanation:

If port security is enabled and the port is only designated as access port, and finally static MAC address is assigned, it ensures that even if a physical connection is done by taking out the directory PC and inserting personal laptop or device, the connection cannot be made to the corporate network, hence ensuring safety.

 

 

QUESTION 169

clip_image015

clip_image017

clip_image019

 

What is the bandwidth on the WAN interface of Router 1?

 

A.

16 Kbit/sec

B.

32 Kbit/sec

C.

64 Kbit/sec

D.

128 Kbit/sec

E.

512 Kbit/sec

F.

1544 Kbit/sec

 

Correct Answer: A

Explanation:

Use the “show interface s0/0” to see the bandwidth set at 16 Kbit/sec.

The show interface s0/0 command results will look something like this and the bandwidth will be represented by the “BW” on the fourth line as seen below where BW equals 1544 Kbits/sec.

R2#show interface serial 0/0

Serial0/0 is up, line protocol is down

Hardware is GT96K Serial

Internet address is 10.1.1.5/30

MTU 1500 bytes, BW 1544 Kbit/sec, DLY 20000 uses.

 

 

QUESTION 170

What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)

 

A.

Allow unrestricted access to the console or VTY ports.

B.

Use a firewall to restrict access from the outside to the network devices.

C.

< /td>

Always use Telnet to access the device command line because its data is automatically encrypted.

D.

Use SSH or another encrypted and authenticated transport to access device configurations.

E.

Prevent the loss of passwords by disabling password encryption.

 

Correct Answer: BD

Explanation:

Using a firewall is a must for networks of any size to protect the internal network from outside threats and unauthorized access. SSH traffic is encrypted while telnet is not, so it is always recommended to use SSH.

 

Free VCE & PDF File for Cisco 100-105 Practice Test

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …