-
You work as a network technician at. Your boss, Mrs. , is interested in the Spanning Tree Protocol timers. What can you tell her regarding the default STP timers? ()
A . The hello time is 5 seconds.
B . The forward delay is 10 seconds.
C . The hello time is 2 seconds.
D . The forward delay is 15 seconds
E . The max_age timer is 15 seconds.
F . The hello time is 10 seconds.
G . The max_age timer is 20 seconds.
H . The forward delay is 20 seconds.
I . The max_age timer is 30 seconds.
-
TestKing.com has a large corporate network that uses multiple routing protocols.Hosts in a portion of the network that uses EIGRP have become unreachable.Which router command will allow you, the network technician, to view the status of these routes?()
A . TestKing# show eigrp entries
B . TestKing# show protocols
C . TestKing# debug eigrp routes
D . TestKing# show ip route eigrp
E . TestKing# show route eigr
-
Which IOS user EXEC command will allow a network technician to determine which router in the path to an unreachable network host should be examined more closely for the cause of the network failure?()
A . TestKingB> telnet
B . TestKingB > ping
C . TestKingB > trace
D . TestKingB > show ip route
E . TestKingB > show interface
F . TestKingB > show cdp neighbor
-
You work as a network technician at Certkiller .com. Please study the exhibit carefully. What does "locking Down" the router entail?()https://assets.asklib.com/images/image2/2018073114272525417.jpg
A . Disabling HTTPS access to Cisco SDM
B . Prohibiting console access to Router
C . Preventing any alterations to the router’s running configuration
D . Disabling all vulnerable Services on the Router
E . Shutting down all the router’s interface
-
The network technician is planning to use the 255.255.255.224 subent mask on the network.which threevalid IP addresses can the technician use for the hosts?()
A . 172.22.243.127
B . 172.22.243.191
C . 172.22.243.190
D . 10.16.33.98
E . 10.17.64.34
F . 192.168.1.160
-
As a network technician, do you know what is a recommended practice for secure configurationmanagement?()
A . Disable post scan
B . Use SSH or SSL
C . Enable trust levels
D . Deny echo replies on all edge router
-
You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()
A . The access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is "trusted" that it isentering the network with the appropriate tag
B . No traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the core
C . Traffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tags
D . IP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these off
E . MAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layer
F . The distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped
-
You work as a network technician at Certkiller .com. Please study the exhibit carefully. The exhibit is an example of which technology being implemented?()https://assets.asklib.com/images/image2/2018073114112240664.jpg
A . Spanning-tree
B . 802.1Q
C . VLANs
D . PAT
E . QoS
-
You work as a network technician at Company. Your boss, Mrs., is interested in the Cisco Compatible Extensions program. What are three features of this program? ()
A . Accounting
B . Analog and digital voice
C . Mobility
D . Security
E . Routing and switching
F . VLAN and QoS
-
You work as a network technician at Certkiller .com. Please study the exhibit carefully. From this Cisco SDM security Audit Wizard screen, what should you do to secure the Router?()https://assets.asklib.com/images/image2/2018073114365065712.jpg
A . Click Next
B . Click Fix All, then Next
C . Click Fix All, then clear CDP check box, then Next, then manually disable CDP on the WAN interface
D . Click Fix All, the clear CDP check box, the Next
E . Click Fix All, then Clear CDP check box, then Next, then Immediately reboot the router
-
You work as a network technician at Company. Your boss, Ms. , is interested in the Aironet enterprise solutions. What should you tell her regarding this?()
A . The Cisco Aironet AP handles real-time portions of the LWAPP protocol, and the WLAN controller handles those items which are not time sensitive.
B . A Cisco Aironet AP handles the transmission of beacon frames and also handles responses to probe-request frames from clients.
C . Virtual MAC architecture allows the splitting of the 802.11 protocol between the Cisco Aironet AP and a LAN switch.
D . A Cisco Aironet solution includes intelligent Cisco Aironet access point (APs) and Cisco Catalyst switches.
E . In the Cisco Aironet solution, each AP is locally configured by the use of either a web interface or the command line interface.
-
You work as a network technician at Company. Your boss, Mrs., is interested in LWAPP (Lightweight Access Point Protocol). What should you tell her regarding this technology? ()
A . LWAPP is a proprietary protocol, and because of its very high overhead it is not widely adopted.
B . Control traffic is encapsulated in UDP packets with a source port of 1024 and a destination port of 12223.
C . Layer 3 LWAPP is a UDP/IP Frame that requires a Cisco Aironet AP to obtain an IP address using DHCP.
D . Data traffic is encapsulated in UDP packets with a source port of 1024 and a destination port of 12223.
E . Control traffic is encapsulated in TCP packets with a source port of 1024 and a destination port of 12223.
F . Data traffic is encapsulated in TCP packets with a source port of 1024 and a destination port of 12223.
-
You work as a network technician at Company. Your boss, Ms., is interested LWAPP (Lightweight Access Point Protocol). In particular she wants to know which type of activities this protocol defines. What should you tell her? ()
A . Layer 3 addressing and distribution
B . SNMP monitoring services
C . Access point certification and software control
D . Packet encapsulation, fragmentation, and formatting
E . Compression and Layer 3 address mapping
F . User behavior
-
The network technician is planning to use the 255.255.255.224 subent mask on the network.which three valid IP addresses can the technician use for the hosts?()
A . 172.22.243.127
B . 172.22.243.191
C . 172.22.243.190
D . 10.16.33.98
E . 10.17.64.34
F . 192.168.1.160
-
As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)
A . It provides reliable input for verifying network consistency.
B . It requires a network audit to support some upgrade decisions.
C . It requires a network audit to support any network restructuring.
D . It begins with gathering organizational input that may be inaccurate.
-
A technician at TestKing needs to update the network documentation. One of the tasks includes documenting the name of the IOS image file of each router in the network.Which commands could be used to find this information?()
A . Router# show protocols
B . Router# show version
C . Router# show image
D . Router# show IOS
E . Router# show flash
-
You work as a network technician at Company. Your boss, Mrs. , is interested in GLBP. In particular, she wants to know the multicast address that this protocol uses. What should you tell her? ()
A . 224.0.0.100
B . 224.0.0.1
C . 224.0.0.102
D . 224.0.0.10
E . 224.0.0.101
F . None of the other alternatives apply
-
Exhibit:
https://assets.asklib.com/images/image2/20180726110937488.jpg
You work as a network technician. You trainee shows you the IOS command output displayed inthe exhibit. What command did Tess use to produce this output?()
A . show ip RIP
B . show ipv6 ospf
C . show ip ospf
D . show ip ospf interface
E . show ipv6 ospf interface
F . show ipv4 ospf
G . None of the other alternatives apply
-
A network administrator is explaining VTP configuration to a new technician. What should the network administrator tell the new technician about VTP configuration?()
A . A switch in the VTP client mode cannot update its local VLAN database.
B . A trunk link must be configured between the switches to forward VTP updates.
C . A switch in the VTP server mode can update a switch in the VTP transparent mode.
D . A switch in the VTP transparent mode will forward updates that it receives to other switches.
E . A switch in the VTP server mode only updates switches in the VTP client mode that have a higher VTP revision number.
F . A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership.
-
The network technician is planning to use the 255.255.255.224 subent mask on the network.which three valid IP addresses can the technician use for the hosts?()
A . 172.22.243.127
B . 172.22.243.191
C . 172.22.243.190
D . 10.16.33.98
E . 10.17.64.34
F . 192.168.1.160
-
You work as a network technician at Company. Your boss, Mrs. , is interested in switch spoofing. She asks you how an attacker would collect information with VLAN hoping through switch spoofing. You should tell her that the attacking station... ()
A . ...uses VTP to collect VLAN information that is sent out and then tags itself with the domain information in order to capture the data.
B . ...will generate frames with two 802.1Q headers to cause the switch to forward the frames to a VLAN that would be inaccessible to the attacker through legitimate means.
C . ...uses DTP to negotiate trunking with a switch port and captures all traffic that is allowed on the trunk.
D . ...tags itself with all usable VLANs to capture data that is passed through the switch, regardless of the VLAN to which the data belongs.
E . None of the other alternatives apply
-
While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()
A . Router#copy tftp flash
B . Router(config)#restore flash
C . Router(config)#repair flash
D . Router#copy flash run
E . Router>copy start flash
F . Router#copy start flash
-
You work as a network technician at Certkiller .com. Please study the exhibit carefully. Which two interfaces are enabled for 802.1Q encapsulation?()https://assets.asklib.com/images/image2/2018073114345074049.jpg
A . Router Certkiller 2,Gig 0/1
B . Switch Certkiller B,Fast Port 1 to 24
C . Switch Certkiller A,Gig Port 9
D . Router Certkiller 2,Gig 0/0
-
A network consultant is asked to set up a wireless network in a home. The home user wants thewireless network to be available in every comer of the house.Which of the following additional information will the technician need to determine the equipment for the installation? ()(Select TWO)
A. The length of the house
B. How many rooms are in the house
C. How many users will be using the wireless network
D. The building material of the house
E. The cost of the house