首页计算机思科认证思科640-802 > 思科认证640-802模拟试卷24
Refer to the exhibit. Router1 was just successfully rebooted. Identify the current OSPF router ID for Router1. [*] 190.172.32.10 208.149.23.162 208.149.23.194 220.173.149.10
How should a router that is being used in a Frame Relay network be configured to avoid split horizon issues from preventing routing updates? Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to the sub-interface. Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic. Configure many sub-interfaces on the same subnet. Configure a single sub-interface to establish multiple PVC connections to multiple remote router interfaces.
What is the maximum data rate specified for IEEE 802.11b WLANs? 10 Mbps 11 Mbps 54 Mbps 100 Mbps
While troubleshooting a connectivity problem, a network administrator notices that a port status LED on a Cisco Catalyst series switch is alternating green and amber. Which condition could this indicate? The port is experiencing errors. The port is administratively disabled. The port is blocked by spanning tree. The port has an active link with normal traffic activity.
Refer to the exhibit. Which switch provides the spanning-tree designated port role for the network segment that services the printers? [*] Switch1 Switch2 Switch3 Switch4
Refer to the exhibit. Switch-1 needs to send data to a host with a MAC address of 00b0.d056.efa4. What will Switch-1 do with this data? [*] Switch-1 will drop the data because it does not have an entry for that MAC address. Switch-1 will flood the data out all of its ports except the port from which the data originated. Switch-1 will send an ARP request out all its ports except the port from which the data originated. Switch-1 will forward the data to its default gateway.
Refer to the output from the show running-config command in the exhibit. What should the administrator do to allow the workstations connected to the FastEthernet 0/0 interface to obtain an IP address? [*] Apply access-group 14 to interface FastEthernet 0/0. Add access-list 14 permit any any to the access list configuration. Configure the IP address of the FastEtherent 0/0 interface to 10.90.201.1. Add an interface description to the FastEthernet 0/0 interface configuration.
A network administrator has configured two switches, named London and Madrid, to use VTP. However, the switches are not sharing VTP messages. Given the command output shown in the graphic, why are these switches not sharing VTP messages? [*] The VTP version is not correctly configured. The VTP operating mode is not correctly configured. The VTP domain name is not correctly configured. VTP pruning mode is disabled. VTP V2 mode is disabled.
Refer to the exhibit. Assuming that the router is configured with the default settings, what type of router interface is this? [*] Ethernet FastEthernet Gigabit Ethernet asynchronous serial synchronous serial
On point-to-point networks, OSPF hello packets are addressed to which address? 127.0.0.1 172.16.0.1 192.168.0.5 223.0.0.1 224.0.0.5
What should be part of a comprehensive network security plan? Allow users to develop their own approach to network security. Physically secure network equipment from potential access by unauthorized individuals. Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten. Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported. Minimize network overhead by deactivating automatic antivirus client updates.
In order to allow the establishment of a Telnet session with a router, which set of commands must be configured? router(config)# line console 0 router(config-line)# enable password cisco router(config)# line console 0 router(config-line)# enable secret cisco router(config-line)# login router(config)# line console 0 router(config-line)# password cisco router(config-line)# login router(config)# line vty 0 router(config-line)# enable password cisco router(config)# line vty 0 router(config-line)# password cisco router(config-line)# login
Refer to the exhibit. Why would the network administrator configure RA in this manner? [*] to give students access to the Internet to prevent students from accessing the command prompt of RA to prevent administrators from accessing the console of RA to give administrators access to the Internet to prevent students from accessing the Internet
While troubleshooting a network connectivity problem, a technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message “Request timed out.“ is displayed. At which layer of the OSI model does the problem most likely exist? the session layer the protocol layer the data link layer the access layer the network layer
Two routers named Atlanta and Brevard are connected by their serial interfaces as shown in the exhibit, but there is no data connectivity between them. The Atlanta router is known to have a correct configuration. Given the partial configurations shown in the exhibit, what is the problem on the Brevard router that is causing the lack of connectivity? [*] A loopback is not set. The IP address is incorrect. The subnet mask is incorrect. The serial line encapsulations are incompatible. The maximum transmission unit (MTU) size is too large.
In the implementation of VLSM techniques on a network using a single Class C IP address, which subnet mask is the most efficient for point-to-point serial links? 255.255.255.0 255.255.255.240 255.255.255.248 255.255.255.252 255.255.255.254
Which two statements best describe the wireless security standard that is defined by WPA? It specifies use of a static encryption key that must be changed frequently to enhance security. It requires use of an open authentication method. It specifies the use of dynamic encryption keys that change each time a client establishes a connection. It requires that all access points and wireless devices use the same encryption key. It includes authentication by PSK.
What can a network administrator utilize by using PPP Layer 2 encapsulation? VLAN support compression authentication sliding windows multilink support
Which three statements are correct about RIP version 2? It has the same maximum hop count as version 1. It uses broadcasts for its routing updates. It is a classless routing protocol. It has a lower default administrative distance than RIP version 1. It supports authentication.
The network shown in the diagram is experiencing connectivity problems. Which of the following will correct the problems? [*] Configure the gateway on Host A as 10.1.1.1. Configure the gateway on Host B as 10.1.2.254. Configure the IP address of Host A as 10.1.2.2. Configure the IP address of Host B as 10.1.2.2. Configure the masks on both hosts to be 255.255.255.224.

    相关试卷

    • 思科认证640-802模拟试卷29

    • 思科认证640-802模拟试卷28

    • 思科认证640-802模拟试卷27

    • 思科认证640-802模拟试卷26

    • 思科认证640-802模拟试卷25

    • 思科认证640-802模拟试卷24

    • 思科认证640-802模拟试卷23

    • 思科认证640-802模拟试卷22

    • 思科认证640-802模拟试卷21

    • 思科认证640-802模拟试卷20

    • 思科认证640-802模拟试卷19

    • 思科认证640-802模拟试卷18

    • 思科认证640-802模拟试卷17

    • 思科认证640-802模拟试卷16

    • 思科认证640-802模拟试卷15

    • 思科认证640-802模拟试卷14

    • 思科认证640-802模拟试卷13

    • 用Cisco控制器进行简单网络配置和监控、将独立AP转换为LWAPP练习试卷1

    • 无线网络概念、标准机构练习试卷1

    • 无线流量和AP发现、其他无线技术练习试卷1