








Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
CIT 241 Final Exam 30 Questions and Answers
Typology: Exams
1 / 14
This page cannot be seen from the preview
Don't miss anything!
Which of the following are advantages of using the Spanning Tree Protocol (STP) in network segmented bridges? (Select two.) STP prevents message loops from forming. STP identifies the most efficient path through a bridged network. You've just configured Router_London as shown. The router is part of EIGRP autonomous system
You are configuring a wireless network with two wireless access points (APs). Both access points connect to the same wired network. You want wireless users to be able to connect to either access point and have the ability to roam between the two access points. How should you configure the access points? Configure both APs with the same SSID and different channels. Which switching network type allows data connections that can be initiated when needed and terminated when communication is complete? Circuit To enable roaming, network administrators have to configure all access points in the network to comply with which of the following criteria? (Select three.) To use the same channel. To have the same SSID. To function on the same IP subnet. You have a small network connected to the internet as shown. Which of the following statements is true? (Select two.) The router must be configured for NAT for Srv1 to communicate on the internet. Internet hosts can reach Srv2 without NAT.
Which of the following are reasons to configure VLANs on a switch as opposed to using switches without VLANs? (Select two.) Increased number of broadcast domains Increased security A connection or communication problem on the Data Link Layer could be indicated by which interface status? Line Status up and Protocol Status down You have a small business network connected to the internet through a single router as shown in the network diagram. You have noticed that three hosts on the internet have been flooding your router with unwanted traffic. As a temporary measure, you want to prevent all communication from these three hosts until the issue is resolved. In this lab, your task is to: Create a standard access list number 25. Add statements to the access list to block traffic from the following hosts:199.68.111.199202.177.9.1211.55.67. Add a statement to allow all other traffic from all other hosts. Apply access list 25 to the Serial0/0/0 interface to filter incoming traffic. Complete this lab as follows:
Select Router. Press Enter to get started. At the Router> prompt, type enable and press Enter. At the Router# prompt, type config t and press Enter. At the Router(config)# prompt, type access-list 25 deny host 199.68.111.199 and press Enter. At the Router(config)# prompt, type access-list 25 deny host 202.177.9.1 and press Enter. At the Router(config)# prompt, type access-list 25 deny host 211.55.67.11 any and press Enter. At the Router(config)# prompt, type access-list 25 permit any and press Enter. At the Router(config)# prompt, type int s0/0/0 and press Enter. At the Router(config-if)# prompt, type ip access-group 25 in and press Enter. Your network currently has a single switch as shown in the diagram. You're getting ready to add additional switches and want to manually configure trunking on the interfaces where switches will be attached. Use the switchport mode trunk command to configure a port as a trunk port and the switchport mode access command to identify the port as an access port. In this lab, your task is to: Manually designate the following ports as trunk ports: Fa0/8, Fa0/23, Fa0/24, Gi0/1, and Gi0/2. For each trunk port, remove the current VLAN assignment, making each port a member of VLAN 1.
Interface VLAN 2 is enabled with the no shutdown interface configuration command. Traffic sent from VLAN 2 to VLAN 3 will not reach VLAN 3. You have configured two routers (LondonA and LondonB) for OSPF routing. Serial0/0 on LondonA is connected to Serial0/1 on LondonB. The partial configuration of each router is shown below: The areas defined in the network statements do not match. Which of the following are true regarding SNMP? (Select two.) SNMPv3 employs the encryption of packets to prevent unauthorized sources from snooping. SNMPv2c can be compromised because the community string for authentication is sent in clear text. What is the router that provides clocking when connecting two routers in a back-to-back configuration through their serial ports called? DCE You are currently using EIGRP on your network. Which of the following would you gain by switching to OSPF? (Select two.) Open standard Hierarchical network design
You are currently using OSPF on your network. Which of the following would you gain by switching to EIGRP? (Select three.) Multiprotocol support Auto-summarization Faster recovery from primary link failure In which of the following scenarios would a router send a resign message? If a preempted active router fails, the standby router becomes the active router. If the preempted active router regains service, it sends a coup message. The current active router sends the resign message after receiving the coup message. You have a small network connected to the internet as shown in the diagram. Previously, you've used private addressing for your network. Now you'd like to use NAT to share a single IP address for all hosts on the private network. In this lab, your task is to: Change the IP address assigned on the Fa0/0 interface to use the last address in the 172.16.0.0/ subnet. This changes the inside network to use private addressing. Designate Fa0/0 as a NAT inside interface. Designate Serial0/0/0 as a NAT outside interface. Create a standard access list number 1 that permits all source addresses on the 172.16.0.0/ network. Use the ip nat inside source command to configure NAT to use the access list number 1 and the Serial0/0/0 interface. Include the overload parameter. This configures NAT to translate all inside host addresses on the 172.16.0.0/24 network to the public IP address assigned to the Serial0/0/ interface. Save yo
Your company has two subnets, 172.16.1.0 and 172.16.2.0, as shown in the exhibit. You want to prevent public Telnet traffic from entering your company but allow all other traffic. Which of the following sets of statements will accomplish your goal? access-list 101 deny tcp any 172.16.0.0 0.0.255.255 eq 23 access-list 101 permit ip any 172.16.2.0 0.0.255. interface serial 0 ip access-group 101 in You have just connected four switches as shown. Assuming the default switch configuration, which switch will become the root bridge? B You are implementing a wireless network inside a local office. You require a wireless link to connect a laptop in the administrator's office directly to a system in the sales department. In the default configuration, the wireless AP uses a 360-dispersed RF wave design. After installation, the signal between the two systems is weak, as many obstacles interfere with the signal. Which of the following strategies could you try to increase signal strength? Replace the omni-directional antenna with a directional antenna. Which of the following statements about ACLs are true? (Select two.) An ACL without a permit statement does not allow any traffic.
Inbound ACLs are applied before the routing process. Put the 7-step troubleshooting process in order. 1- Define the problem 2- Gather information 3- Analyze information 4- Eliminate probable causes 5- Propose hypothesis 6- Test hypothesis Solve the problem You recently connected two Catalyst 2960 access layer switches (SwitchA and SwitchB) and an external router to your network. Now you need to implement a router-on-a-stick configuration for interVLAN routing between VLANs 2 and 4 using the external router. Both VLANs are already configured on SwitchA and SwitchB and have interfaces assigned to the respective VLANs. Since SwitchA is connected to only one interface on the router, you need to create subinterfaces and set the encapsulation method for each VLAN. In this lab, your task is to configure both switches and the router for interVLAN communication: On the external router, configure the following:Enable FastEthernet 0/1For VLAN 2, configure the following subinterface details:Subinterface: FastEthernet 0/1.2Encapsulation: 802.1qIP address and subnet mask: 192.168.2.1 255.255.255.0For VLAN 4, configure the following subinterface details:Subinterface: FastEthernet 0/ 1 - Configure the external router.
type copy run start and press Enter 3 - Configure SwitchB type conf t and press Enter. type int gi 0/1 and press Enter. type switchport mode trunk and press Enter. type exit and press Enter.Press Ctrl + Z type copy run start and press Enter You have two routers connected as shown in the network diagram. The Jujuy router is already configured to share route information using OSPF on Area 0. When configuring OSPF, routers do not need to use the same process ID, but networks must be defined in the same area. When adding network statements, include the wildcard mask and the area number (in this case, area 0). All interfaces have been configured and enabled. In this lab, your task is to: Configure the Salta router to share routing information using OSPF with the Jujuy router. When you are finished, save your changes. Select Salta. type config t and press Enter.
type router ospf 100 and press Enter. type network 192.168.1.0 0.0.0.255 area 0 and press Enter. type network 192.168.2.0 0.0.0.255 area 0 and press Enter. type network 172.17.150.140 0.0.0.3 area 0 and press Enter. Press Ctrl + Z. At the Salta# prompt, type copy run start Your router generates a log message with a severity level of 6. What does this indicate? An informational message only. A user on your network has moved to another office down the hall. After the move, she calls you to complain that she has only occasional network access through her wireless connection. Which of the following is most likely the cause of the problem? The client system has moved too far away from the access point.