You issued the command debug ppp authentication what type of handshaking was used for this PPP
session?
A -
One-way
B -
Two-way
C -
Three-way
D -
No handshake required during authentication.
2-
Which of the following protocols is referred to as a hybrid routing protocol because it has features of
both distance-vector and link-state?
A -
OSPF
B -
EIGRP
C -
RIP
D -
IGRP
3-
You would like to be able to make a backup copy of your IOS that is stored on your router. Which of the
following commands can you use so that the router will become a TFTP host so that it can save the IOS to
a TFTP server?
A -
Copy flash tftp
B -
Config tftp server
C -
Write network <router name>
D -
Tftp-server system <filename>
4-
Your access list has one statement; access-list 131 permit ip any 131.107.7.0 0.0.0.255 eq tcp
What does the word "any" mean in the following extended access list statement?
A -
Check any of the bits in the source address.
B -
Permit any wildcard mask for the address.
C -
Accept any source address.
D -
Check any bit in the destination address.
5-
Routing Protocols use which OSI layer to determine the best path to a network?
A -
Data Link
B -
Network
C -
Physical
D -
Presentation
6-
Which two of the following were created to avoid routing loops with distance vector routing protocols?
A -
Split horizon.
B -
Route Poison.
C -
Area Hierarchies.
D -
Both A & B
7-
The Defense Advanced Research Projects Agency (DAPRA) developed the TCP/IP suite of protocols.
Which layer in that TCP/IP model corresponds to the OSI models network layer?
A -
Transport
B -
Internet
C -
Network
D -
Physical
8-
Exhibit
Examine the Routing tables of RouterTK1 and RouterTK2 above after the next IGRP update is sent
from RouterTK1 to RouterTK2 what networks will show up in RouterTK2s route table.
Your router stores routing tables, ARP cache, and packet buffers where are these stored?
A -
ROM
B -
RAM
C -
NVRAM
D -
Flash memory
10-
You are the network administrator of the Sonic Water Company. One of your users is unable to reach
the companys web site that is hosted at a remote site. Looking at the personal computer you discover the
following information:
Local PC – 10.0.3.35/24
Default gateway – 10.0.3.1
Remote server – 10.0.5.250/240
You then conduct the following tests from the offending local PC: