.

Wednesday, March 13, 2019

Cisco

Solution for ACL Question 100% Correct http//img220. imageshack. us/i/acllabc. jpg/ A corporation wants to add security to its ne 2rk. The requirements be y y y y Host C shoulb be able to use a web browser(HTTP)to access code the Finance Web legion Other types of access from drove C to the Finance Web boniface should be blocked. All acces from hosts in the Core or local local bea network to the Finance We b Server should be blocked All hosts in the Core and local LAN should be able to acces the Plublic Web Server. You s larboard been tasked to create and apply a enumerated acces list to a single stunnedward-bound port wine. o more ternion rehearsals that meets these requirements . corp1(config)access-list 100 permission tcp host (host address) host (finance web server address) eq 80 corp1(config)access-list 100 get across ip any host (finance web server address) Corp1(config) access-list 100 permit ip any any Corp1(config)int fa0/1 Corp1(config-if)ip access- free radic al 100 out Corp1(config-if)end Corp1copy run start Q. 1 Which IPsec security communications protocol should be utilize when confidentiality is required? A. PSK B. AH C. MD5 D. ESPokreponse www. isaserver. com A, B, D se referer. Q. 7 Which statement is true, as relates to classful or classless routing? A.Automatic summarization at classful boundries tummy cause problems on discontinuous subnets B. EIGRP and OSPF ar classful routing protocols and summarize routes by omission C. RIPv1 and OSPF argon classless routing protocols D. Classful routing protocols send the subnet mask in routing updates Answer A Which three statements approximately RSTP are true? /25 et crossover Reponse 3 Question 11 as commemoraten above. what is the alternative notation for the IPV6 Address B51482C3000000000029EC7A0000EC72 a) B51482C30029EC7AEC72 b) B51482C30029EC7AEC72 c) B51482C30029EC7A0000EC72 d) 1482C30029EC7A0EC72 NONE OF THESE ARE RIGHTAm I wanting something? Adeel Khan, how great deal you r autonomic nervous systemwer be right when the 2nd to last group of hex (0000) is completely omitted and you can only use zipper condensate ONCE in an IPv6 address A refuse autonomic nervous systemwer would figure like B51482C329EC7A0EC72 if you use all available zero compression and leading zero ru les. D is closest unless somehow it doesnt show B5 in the first hex grouping. This cannot be an actual question. Q. 15 What value is primarily use to determine which user user interface becomes the root fashion on separately nonroot switch in a spanning-tree topology? A. ort priority number and MAC address B. lowest user interface MAC address C. path cost D. VTP revision number E. highest port priority number Answer C Q. 16 Two switches are connected through a tunk physical contact. Which two commands show that there is a native VLAN mismatch on that link? (Choose two) A. show interfaces switchport B. show interface trunk C. show vlan brief D. show interfaces vlan E. show in terfaces interface A ET B y y 1. which two data integrity algorithms are commonly used in vpn solutions? Ans HMAC-SHA-1 AND RSA y 2. which pariring reflects a correct protocol and metric relationship? ns rentv2 and number of hops y 3. a network admin needs to set up port security on a switch.. autonomic nervous system the network admin can configure static take prisoner or sticky undertake mac addresses in the voice vlan the sticky learning feature allows the addition of dynamically learned addresses to the running mannikin y 4. the network technician is planning to use the 255. 255. 255. 224 subnet mask on the. autonomic nervous system 10. 17. 64. 34 10. 16. 33. 98 172. 22. 243. 190 y 5. statements A, B,C AND D of ACL 10 have been entered ans CDBA y y 6. hich three approaches can be used while migrating from an ipv4 addressing scheme to an ipv6 scheme (3 ans) ans use dhcpv6 to map ipv4 addresses to ipv6 addresses configure ipv4 tunnels surrounded by ipv6 islands enable dua l-stack routing y 7. which three statements abot vtp . ans vtp pruning is used to increase available bandwidth in trunk links client, server and coherent are valid vtp modes each broadcast field of study on a switch can have its own unique vtp domain. y y y y y 8. which three elements must be used when you configure a router interface for vlan truniking ans a management domain for each subinterface ubinterface encapsulation identifiers that match vlan tags one ip network or subnetwork for each subinterface - 9. which two statements describe the advanateges to the use of rip over ospf? ans rip is less complex to configure rip uses less bandwidth - 10. what are three benefits of implementing vlans? ans vlans make it eaiser for IT staff to configure. a higher level of network sec.. broadcast storms can be mitigated by increasing. 11. assuming disregard seetings, how can you erase the vtp database of vlans on.. ns from internal mode, erase the vlan. dat file, then reload 12. which t wo states are the port states when rstp has cconverged? ans forwarding and learning 13. what are two benefits of using NAT? ans NAT eliminates the need to re-address.. NAT protects network security becuase private neworks are 14. which two lake herring ios commands, used in troubleshooting can enable debug sidetrack to a remote location ansshow logging redirect flashoutput. txt snmp-server enable traps syslog 15. which component of vpn technology ensures that data is unaltered between the sender and recipient? nskey exchnage 16. which cisco ios diagnostics command can distrupt the operation of a router under high load conditions? ans show processes cpu 17. you are working in a data fondness 10. 188. 31. 0/23.. ans 10. 188. 31. 0/27 18. assuming the default switch configuration. exteneded vlan range (1006 to 4094) on switch 3750? ans configure the switch to be in vtp transparent mode. 19. which ciso ios command can help to dertermine the timing of various debug events, relative to each other when you are debugging a complicated router let go? ans service timestamps log dateime millisecond 20. network admin receives an error message while trying to configure the ethernet interface of a router with ip address 10. 24. 24. 24/29 which statment explains the reason for this issue? ans vlsm capable routing protocols must be enabled first on the router. 21. which parameters are used to calculate ospf cost in cisco routers? ans bandwidth, mtu, reliability, live on and load 22. which three are characteristics of an ipv6 anycast address? ans one-to-nearest communicaiton model the similar address for multiple devices in the group delivery of packets to the group interface that is closest to the sending device 3. on which options are measure access lists found? ans source address and wildcard mask 24. which two statics be in show frame relay map output ans the ip address of the local router the value of the local dlci 25. which encapsulation type is a frame relay encapsulation type that is supported by cisco routers? ans hdlc 26. which ipv6 routing protocol uses multicast group ff029 to send updates? ans RIPng 28. which ipsec security protocol should be used when confidentiality is reqiured? ans ESP 29. hich protocol is an open standard protocol framework that is commonly used in vpns to provide secure end to end communications? ans IPSEC 30. when you are troubleshooting an acl issue on a router, which command can help you to verify which interfaces are affcted by the acl? ans show ip access-lists 31. what is the effect ofusing the service password encryption command? ans it testament encrypt all current and futurity passwords. 32. which command is necessary to permit ssh or telnet access to a cisco swithc that is oterwise configured for these vty line protocols? ans transport input all 33. efer to the exhibit. An try out to deny web access to a subnet blocks ACL 102? ans no ip access-group 102 in 34. which layer 2 protocl encapsulation type supports synchronous andasynchrounous circuits and has built in security mechanisms? ans uvulopalatopharyngoplasty 35. when using the cli which banner displays a message upon every connection that is made into the router? Ans MOTD 36. which statment is true, as relates to classful or classless routing? ans classful routing protocols send the subnet mask in routing updates. 37. which two statements about using the CHAP authentication mechanism in a ppp.? ns CHAP uses a two-way handshape CHAP authentication is performed only upon link establishment. 38. which three statements accurately describe layer 2 ethernet switches? (3 ans) ans a. Microsegmentation decreases the number of collisions on the network b. switches that are configured with VLANs make forwarding decisions based on both layer and layer 3 c. In a properly functioning network with reduandant switched paths, each switched segment will get hold of onre forwarding state. All other switches in that broadcast domain wil l have only one root port.

No comments:

Post a Comment