Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CIT 241 Final Exam 30 Questions and Answers, Exams of Computer Science

CIT 241 Final Exam 30 Questions and Answers

Typology: Exams

2024/2025

Available from 06/19/2025

Academicstar
Academicstar 🇬🇧

4

(35)

1.4K documents

1 / 14

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
CIT 241 Final Exam 30 Questions and
Answers
Which of the following are advantages of using the Spanning Tree Protocol (STP) in network
segmented bridges? (Select two.)
STP prevents message loops from forming.
STP identifies the most efficient path through a bridged network.
You've just configured Router_London as shown. The router is part of EIGRP autonomous system
200. Both directly connected networks 172.17.0.0 and 172.18.0.0 are to be advertised to neighbor
routers within Area 200.
When testing your router, you discover the neighboring routers have no entries in their routing table
for your subnets. What is the problem?
The area is incorrectly configured.
You are the wireless network administrator for your organization. As the size of the organization has
grown, you've decided to upgrade your wireless network to use 802.1x authentication instead of
using preshared keys.
To do this, you need to configure a RADIUS server and RADIUS clients. You want the server and the
clients to mutually authenticate with each other.
What should you do? (Select two. Each response is a part of the complete solution.)
Configure the RADIUS server with a server certificate.
Configure all wireless access points with client certificates.
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe

Partial preview of the text

Download CIT 241 Final Exam 30 Questions and Answers and more Exams Computer Science in PDF only on Docsity!

CIT 241 Final Exam 30 Questions and

Answers

Which of the following are advantages of using the Spanning Tree Protocol (STP) in network segmented bridges? (Select two.) STP prevents message loops from forming. STP identifies the most efficient path through a bridged network. You've just configured Router_London as shown. The router is part of EIGRP autonomous system

  1. Both directly connected networks 172.17.0.0 and 172.18.0.0 are to be advertised to neighbor routers within Area 200. When testing your router, you discover the neighboring routers have no entries in their routing table for your subnets. What is the problem? The area is incorrectly configured. You are the wireless network administrator for your organization. As the size of the organization has grown, you've decided to upgrade your wireless network to use 802.1x authentication instead of using preshared keys. To do this, you need to configure a RADIUS server and RADIUS clients. You want the server and the clients to mutually authenticate with each other. What should you do? (Select two. Each response is a part of the complete solution.) Configure the RADIUS server with a server certificate. Configure all wireless access points with client certificates.

You are configuring a wireless network with two wireless access points (APs). Both access points connect to the same wired network. You want wireless users to be able to connect to either access point and have the ability to roam between the two access points. How should you configure the access points? Configure both APs with the same SSID and different channels. Which switching network type allows data connections that can be initiated when needed and terminated when communication is complete? Circuit To enable roaming, network administrators have to configure all access points in the network to comply with which of the following criteria? (Select three.) To use the same channel. To have the same SSID. To function on the same IP subnet. You have a small network connected to the internet as shown. Which of the following statements is true? (Select two.) The router must be configured for NAT for Srv1 to communicate on the internet. Internet hosts can reach Srv2 without NAT.

Which of the following are reasons to configure VLANs on a switch as opposed to using switches without VLANs? (Select two.) Increased number of broadcast domains Increased security A connection or communication problem on the Data Link Layer could be indicated by which interface status? Line Status up and Protocol Status down You have a small business network connected to the internet through a single router as shown in the network diagram. You have noticed that three hosts on the internet have been flooding your router with unwanted traffic. As a temporary measure, you want to prevent all communication from these three hosts until the issue is resolved. In this lab, your task is to: Create a standard access list number 25. Add statements to the access list to block traffic from the following hosts:199.68.111.199202.177.9.1211.55.67. Add a statement to allow all other traffic from all other hosts. Apply access list 25 to the Serial0/0/0 interface to filter incoming traffic. Complete this lab as follows:

Select Router. Press Enter to get started. At the Router> prompt, type enable and press Enter. At the Router# prompt, type config t and press Enter. At the Router(config)# prompt, type access-list 25 deny host 199.68.111.199 and press Enter. At the Router(config)# prompt, type access-list 25 deny host 202.177.9.1 and press Enter. At the Router(config)# prompt, type access-list 25 deny host 211.55.67.11 any and press Enter. At the Router(config)# prompt, type access-list 25 permit any and press Enter. At the Router(config)# prompt, type int s0/0/0 and press Enter. At the Router(config-if)# prompt, type ip access-group 25 in and press Enter. Your network currently has a single switch as shown in the diagram. You're getting ready to add additional switches and want to manually configure trunking on the interfaces where switches will be attached. Use the switchport mode trunk command to configure a port as a trunk port and the switchport mode access command to identify the port as an access port. In this lab, your task is to: Manually designate the following ports as trunk ports: Fa0/8, Fa0/23, Fa0/24, Gi0/1, and Gi0/2. For each trunk port, remove the current VLAN assignment, making each port a member of VLAN 1.

Interface VLAN 2 is enabled with the no shutdown interface configuration command. Traffic sent from VLAN 2 to VLAN 3 will not reach VLAN 3. You have configured two routers (LondonA and LondonB) for OSPF routing. Serial0/0 on LondonA is connected to Serial0/1 on LondonB. The partial configuration of each router is shown below: The areas defined in the network statements do not match. Which of the following are true regarding SNMP? (Select two.) SNMPv3 employs the encryption of packets to prevent unauthorized sources from snooping. SNMPv2c can be compromised because the community string for authentication is sent in clear text. What is the router that provides clocking when connecting two routers in a back-to-back configuration through their serial ports called? DCE You are currently using EIGRP on your network. Which of the following would you gain by switching to OSPF? (Select two.) Open standard Hierarchical network design

You are currently using OSPF on your network. Which of the following would you gain by switching to EIGRP? (Select three.) Multiprotocol support Auto-summarization Faster recovery from primary link failure In which of the following scenarios would a router send a resign message? If a preempted active router fails, the standby router becomes the active router. If the preempted active router regains service, it sends a coup message. The current active router sends the resign message after receiving the coup message. You have a small network connected to the internet as shown in the diagram. Previously, you've used private addressing for your network. Now you'd like to use NAT to share a single IP address for all hosts on the private network. In this lab, your task is to: Change the IP address assigned on the Fa0/0 interface to use the last address in the 172.16.0.0/ subnet. This changes the inside network to use private addressing. Designate Fa0/0 as a NAT inside interface. Designate Serial0/0/0 as a NAT outside interface. Create a standard access list number 1 that permits all source addresses on the 172.16.0.0/ network. Use the ip nat inside source command to configure NAT to use the access list number 1 and the Serial0/0/0 interface. Include the overload parameter. This configures NAT to translate all inside host addresses on the 172.16.0.0/24 network to the public IP address assigned to the Serial0/0/ interface. Save yo

Your company has two subnets, 172.16.1.0 and 172.16.2.0, as shown in the exhibit. You want to prevent public Telnet traffic from entering your company but allow all other traffic. Which of the following sets of statements will accomplish your goal? access-list 101 deny tcp any 172.16.0.0 0.0.255.255 eq 23 access-list 101 permit ip any 172.16.2.0 0.0.255. interface serial 0 ip access-group 101 in You have just connected four switches as shown. Assuming the default switch configuration, which switch will become the root bridge? B You are implementing a wireless network inside a local office. You require a wireless link to connect a laptop in the administrator's office directly to a system in the sales department. In the default configuration, the wireless AP uses a 360-dispersed RF wave design. After installation, the signal between the two systems is weak, as many obstacles interfere with the signal. Which of the following strategies could you try to increase signal strength? Replace the omni-directional antenna with a directional antenna. Which of the following statements about ACLs are true? (Select two.) An ACL without a permit statement does not allow any traffic.

Inbound ACLs are applied before the routing process. Put the 7-step troubleshooting process in order. 1- Define the problem 2- Gather information 3- Analyze information 4- Eliminate probable causes 5- Propose hypothesis 6- Test hypothesis Solve the problem You recently connected two Catalyst 2960 access layer switches (SwitchA and SwitchB) and an external router to your network. Now you need to implement a router-on-a-stick configuration for interVLAN routing between VLANs 2 and 4 using the external router. Both VLANs are already configured on SwitchA and SwitchB and have interfaces assigned to the respective VLANs. Since SwitchA is connected to only one interface on the router, you need to create subinterfaces and set the encapsulation method for each VLAN. In this lab, your task is to configure both switches and the router for interVLAN communication: On the external router, configure the following:Enable FastEthernet 0/1For VLAN 2, configure the following subinterface details:Subinterface: FastEthernet 0/1.2Encapsulation: 802.1qIP address and subnet mask: 192.168.2.1 255.255.255.0For VLAN 4, configure the following subinterface details:Subinterface: FastEthernet 0/ 1 - Configure the external router.

type copy run start and press Enter 3 - Configure SwitchB type conf t and press Enter. type int gi 0/1 and press Enter. type switchport mode trunk and press Enter. type exit and press Enter.Press Ctrl + Z type copy run start and press Enter You have two routers connected as shown in the network diagram. The Jujuy router is already configured to share route information using OSPF on Area 0. When configuring OSPF, routers do not need to use the same process ID, but networks must be defined in the same area. When adding network statements, include the wildcard mask and the area number (in this case, area 0). All interfaces have been configured and enabled. In this lab, your task is to: Configure the Salta router to share routing information using OSPF with the Jujuy router. When you are finished, save your changes. Select Salta. type config t and press Enter.

type router ospf 100 and press Enter. type network 192.168.1.0 0.0.0.255 area 0 and press Enter. type network 192.168.2.0 0.0.0.255 area 0 and press Enter. type network 172.17.150.140 0.0.0.3 area 0 and press Enter. Press Ctrl + Z. At the Salta# prompt, type copy run start Your router generates a log message with a severity level of 6. What does this indicate? An informational message only. A user on your network has moved to another office down the hall. After the move, she calls you to complain that she has only occasional network access through her wireless connection. Which of the following is most likely the cause of the problem? The client system has moved too far away from the access point.