Exam CISCO-640-802 v12(2.93) Part 14

| Thursday, February 28, 2008

131.When a new trunk is configured on a 2950 switch, which VLANs by default are allowed over the trunk link?

A: no VLANs
B: all VLANs
C: only VLANs 1 - 64
D: only the VLANs that are specified when creating the trunk

Correct Answers: B

132.What should be part of a comprehensive network security plan?
A: Allow users to develop their own approach to network security.
B: Physically secure network equipment from potential access by unauthorized individuals.
C: Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten.
D: Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.
E: Minimize network overhead by deactivating automatic antivirus client updates.

Correct Answers: B

133.An access list was written with the four statements shown in the graphic. Which single access list statement will combine all four of these statements into a single statement that will have exactly the same effect?



A: access-list 10 permit 172.29.16.0 0.0.0.255
B: access-list 10 permit 172.29.16.0 0.0.1.255
C: access-list 10 permit 172.29.16.0 0.0.3.255
D: access-list 10 permit 172.29.16.0 0.0.15.255
E: access-list 10 permit 172.29.0.0 0.0.255.255

Correct Answers: C

134.Refer to the exhibit. All of the routers in the network are configured with the ip subnet-zero command. Which network addresses should be used for Link A and Network A? (Choose two.)



A:Network A - 172.16.3.48/26
B:Network A - 172.16.3.128/25
C:Network A - 172.16.3.192/26
D:Link A - 172.16.3.0/30
E:Link A - 172.16.3.40/30
F:Link A - 172.16.3.112/30

Correct Answers: B, D

135.At which layers of the OSI model do WANs operate? (Choose two.)

A:application layer
B:session layer
C:transport layer
D:network layer
E:datalink layer
F:physical layer

Correct Answers: E, F

136.A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1? (Choose two.)

A:Configure port Fa0/1 to accept connections only from the static IP address of the server.
B:Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
C:Configure the MAC address of the server as a static entry associated with port Fa0/1.
D:Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
E:Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
F:Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

Correct Answers: C, E

137.Refer to the exhibit. A network associate has configured the internetwork that is shown in the exhibit, but has failed to configure routing properly. Which configuration will allow the hosts on the Branch LAN to access resources on the HQ LAN with the least impact on router processing and WAN bandwidth?



A: HQ(config)# ip route 192.168.1.0 255.255.255.0 192.168.2.5
Branch(config)# ip route 172.16.25.0 255.255.255.0 192.168.2.6
B: HQ(config)# router rip
HQ(config-router)# network 192.168.2.0
HQ(config-router)# network 172.16.0.0
Branch(config)# router rip
Branch (config-router)# network 192.168.1.0
Branch (config-router)# network 192.168.2.0
C: HQ(config)# router eigrp 56
HQ(config-router)# network 192.168.2.4
HQ(config-router)# network 172.16.25.0
Branch(config)# router eigrp 56
Branch (config-router)# network 192.168.1.0
Branch (config-router)# network 192.168.2.4
D: HQ(config)# router ospf 1
HQ(config-router)# network 192.168.2.4 0.0.0.3 area 0
HQ(config-router)# network 172.16.25.0 0.0.0.255 area 0
Branch(config)# router ospf 1
Branch (config-router)# network 192.168.1.0 0.0.0.255 area 0
Branch (config-router)# network 192.168.2.4 0.0.0.3 area 0

Correct Answers: A

138.Which additional configuration step is necessary in order to connect to an access point that has SSID broadcasting disabled?
A: Set the SSID value in the client software to public.
B: Configure open authentication on the AP and the client.
C: Set the SSID value on the client to the SSID configured on the AP.
D: Configure MAC address filtering to permit the client to connect to the AP.

Correct Answers: C

139.LAB



140.The OSPF Hello protocol performs which of the following tasks? (Choose two.)
A:It provides dynamic neighbor discovery.
B:It detects unreachable neighbors in 90 second intervals.
C:It maintains neighbor relationships.
D:It negotiates correctness parameters between neighboring interfaces.
E:It uses timers to elect the router with the fastest links as the designated router.
F:It broadcasts hello packets throughout the internetwork to discover all routers that are running OSPF.

Correct Answers: A, C

0 comments:

eXTReMe Tracker