Exam CISCO-640-802 v12(2.93) Part 16

| Thursday, February 28, 2008

151.Refer to the exhibit. The FMJ manufacturing company is concerned about unauthorized access to the Payroll Server. The Accounting1, CEO, Mgr1, and Mgr2 workstations should be the only computers with access to the Payroll Server. What two technologies should
be implemented to help prevent unauthorized access to the server? (Choose two.)



A:access lists
B:encrypted router passwords
C:STP
D:VLANs
E:VTP
F:wireless LANs

Correct Answers: A, D

152.Which statement is correct about the internetwork shown in the diagram?



A: Switch 2 is the root bridge.
B: Spanning Tree is not running.
C: Host D and Server 1 are in the same network.
D: No collisions can occur in traffic between Host B and Host C.
E: If Fa0/0 is down on Router 1, Host A cannot access Server 1.
F: If Fa0/1 is down on Switch 3, Host C cannot access Server 2.

Correct Answers: E

153.Which statements are true about EIGRP successor routes? (Choose two.)
A:A successor route is used by EIGRP to forward traffic to a destination.
B:Successor routes are saved in the topology table to be used if the primary route fails.
C:Successor routes are flagged as "active" in the routing table.
D:A successor route may be backed up by a feasible successor route.
E:Successor routes are stored in the neighbor table following the discovery process.

Correct Answers: A, D

154.Which of the following is true regarding the use of switches and hubs for network connectivity?
A: Switches take less time to process frames than hubs take.
B: Switches do not forward broadcasts.
C: Hubs can filter frames.
D: Using hubs can increase the amount of bandwidth available to hosts.
E: Switches increase the number of collision domains in the network.

Correct Answers: E

155.Refer to the exhibit. After HostA pings HostB, which entry will be in the ARP cache of HostA to support this transmission?





Correct Answers: D

156.Why has the network shown in the exhibit failed to converge?



A: The no auto-summary command needs to be applied to the routers.
B: The network numbers have not been properly configured on the routers.
C: The subnet masks for the network numbers have not been properly configured.
D: The autonomous system number has not been properly configured.
E: The bandwidth values have not been properly configured on the serial interfaces.

Correct Answers: A

157.What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)

A:Allow unrestricted access to the console or VTY ports.
B:Use a firewall to restrict access from the outside to the network devices.
C:Always use Telnet to access the device command line because its data is automatically encrypted.
D:Use SSH or another encrypted and authenticated transport to access device configurations.
E:Prevent the loss of passwords by disabling password encryption.

Correct Answers: B, D

158.What are two characteristics of Telnet? (Choose two.)

A:It sends data in clear text format.
B:It is no longer supported on Cisco network devices.
C:It is more secure than SSH.
D:It requires an enterprise license in order to be implemented.
E:It requires that the destination device be configured to support Telnet connections.

Correct Answers: A, E

159.Refer to the exhibit. The network shown in the exhibit is running the RIPv2 routing protocol. The network has converged, and the routers in this network are functioning properly. The FastEthernet0/0 interface on R1 goes down. In which two ways will the routers in this network respond to this change? (Choose two.)



A:All routers will reference their topology database to determine if any backup routes to the 192.168.1.0 network are known.
B:Routers R2 and R3 mark the route as inaccessible and will not accept any further routing updates from R1 until their hold-down timers expire.
C:Because of the split-horizon rule, router R2 will be prevented from sending erroneous information to R1 about connectivity to the 192.168.1.0 network.
D:When router R2 learns from R1 that the link to the 192.168.1.0 network has been lost, R2 will respond by sending a route back to R1 with an infinite metric to the 192.168.1.0 network.
E:R1 will send LSAs to R2 and R3 informing them of this change, and then all routers will send periodic updates at an increased rate until the network again converges.

Correct Answers: C, D

160.Refer to the exhibit. After HostA pings HostB, which entry will be in the ARP cache of HostA to support this transmission?




Correct Answers: D

0 comments:

eXTReMe Tracker