Exam CISCO-640-802 v12(2.93) Part 6

| Thursday, February 28, 2008

51.Refer to the exhibit. The FMJ manufacturing company is concerned about unauthorized access to the Payroll Server. The Accounting1, CEO, Mgr1, and Mgr2 workstations should be the only computers with access to the Payroll Server. What two technologies should be implemented to help prevent unauthorized access to the server? (Choose two.)



A:access lists
B:encrypted router passwords
C:STP
D:VLANs
E:VTP
F:wireless LANs

Correct Answers: A, D

52.Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4? (Choose two.)

A:It establishes a static route to the 172.16.3.0 network.
B:It establishes a static route to the 192.168.2.0 network.
C:It configures the router to send any traffic for an unknown destination to the
172.16.3.0 network.
D:It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4.
E:It uses the default administrative distance.
F:It is a route that would be used last if other routes to the same destination exist.

Correct Answers: A, E

53.Hotspot






Hotspot question. Click on the correct location or locations in the exhibit.
Correct Answers:







54.Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server?

A: denial of service
B: brute force
C: reconnaissance
D: Trojan horse

Correct Answers: A

55.The network shown in the diagram is experiencing connectivity problems. Which of the following will correct the problems? (Choose two.)



A:Configure the gateway on Host A as 10.1.1.1.
B:Configure the gateway on Host B as 10.1.2.254.
C:Configure the IP address of Host A as 10.1.2.2.
D:Configure the IP address of Host B as 10.1.2.2.
E:Configure the masks on both hosts to be 255.255.255.224.
F:Configure the masks on both hosts to be 255.255.255.240.

Correct Answers: B, D

56.Which three statements are correct about RIP version 2? (Choose three.)

A:It has the same maximum hop count as version 1.
B:It uses broadcasts for its routing updates.
C:It is a classless routing protocol.
D:It has a lower default administrative distance than RIP version 1.
E:It supports authentication.
F:It does not send the subnet mask in updates.

Correct Answers: A, C, E

57.What should be part of a comprehensive network security plan?

A: Allow users to develop their own approach to network security.
B: Physically secure network equipment from potential access by unauthorized individuals.
C: Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten.
D: Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.
E: Minimize network overhead by deactivating automatic antivirus client updates.

Correct Answers: B

58.How should a router that is being used in a Frame Relay network be configured to avoid split horizon issues from preventing routing updates?
A: Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to the sub-interface.
B: Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic.
C: Configure many sub-interfaces on the same subnet.
D: Configure a single sub-interface to establish multiple PVC connections to multiple remote router interfaces.

Correct Answers: A

59.What is the maximum data rate specified for IEEE 802.11b WLANs?

A: 10 Mbps
B: 11 Mbps
C: 54 Mbps
D: 100 Mbps

Correct Answers: B

60.Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)

A:It specifies use of a static encryption key that must be changed frequently to enhance
B:It requires use of an open authentication method.
C:It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
D:It requires that all access points and wireless devices use the same encryption key.
E:It includes authentication by PSK.

Correct Answers: C, E
security.

0 comments:

eXTReMe Tracker