-
You work as a network technician at. Your boss, Mrs. , is interested in the Spanning Tree Protocol timers. What can you tell her regarding the default STP timers? ()
A . The hello time is 5 seconds.
B . The forward delay is 10 seconds.
C . The hello time is 2 seconds.
D . The forward delay is 15 seconds
E . The max_age timer is 15 seconds.
F . The hello time is 10 seconds.
G . The max_age timer is 20 seconds.
H . The forward delay is 20 seconds.
I . The max_age timer is 30 seconds.
-
TestKing.com has a large corporate network that uses multiple routing protocols.Hosts in a portion of the network that uses EIGRP have become unreachable.Which router command will allow you, the network technician, to view the status of these routes?()
A . TestKing# show eigrp entries
B . TestKing# show protocols
C . TestKing# debug eigrp routes
D . TestKing# show ip route eigrp
E . TestKing# show route eigr
-
Which IOS user EXEC command will allow a network technician to determine which router in the path to an unreachable network host should be examined more closely for the cause of the network failure?()
A . TestKingB> telnet
B . TestKingB > ping
C . TestKingB > trace
D . TestKingB > show ip route
E . TestKingB > show interface
F . TestKingB > show cdp neighbor
-
You work as a network technician at Certkiller .com. Please study the exhibit carefully. What does "locking Down" the router entail?()https://assets.asklib.com/images/image2/2018073114272525417.jpg
A . Disabling HTTPS access to Cisco SDM
B . Prohibiting console access to Router
C . Preventing any alterations to the router’s running configuration
D . Disabling all vulnerable Services on the Router
E . Shutting down all the router’s interface
-
As a network technician, do you know what is a recommended practice for secure configurationmanagement?()
A . Disable post scan
B . Use SSH or SSL
C . Enable trust levels
D . Deny echo replies on all edge router
-
You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()
A . The access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is "trusted" that it isentering the network with the appropriate tag
B . No traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the core
C . Traffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tags
D . IP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these off
E . MAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layer
F . The distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped
-
You work as a network technician at Certkiller .com. Please study the exhibit carefully. The exhibit is an example of which technology being implemented?()https://assets.asklib.com/images/image2/2018073114112240664.jpg
A . Spanning-tree
B . 802.1Q
C . VLANs
D . PAT
E . QoS
-
You work as a network technician at Company. Your boss, Mrs., is interested in the Cisco Compatible Extensions program. What are three features of this program? ()
A . Accounting
B . Analog and digital voice
C . Mobility
D . Security
E . Routing and switching
F . VLAN and QoS
-
As the network technician at Company, you need to configure DHCP snooping on a new switch. Which three steps are required? ()
A . Configure the switch to insert and remove DHCP relay information (option-82 field) in forwarded DHCP request messages.
B . Configure DHCP snooping globally.
C . Configure the switch as a DHCP server.
D . Configure DHCP snooping on an interface.
E . Configure all interfaces as DHCP snooping trusted interfaces.
F . Configure DHCP snooping on a VLAN or range of VLANs.
-
You work as a network technician at Certkiller .com. Please study the exhibit carefully. From this Cisco SDM security Audit Wizard screen, what should you do to secure the Router?()https://assets.asklib.com/images/image2/2018073114365065712.jpg
A . Click Next
B . Click Fix All, then Next
C . Click Fix All, then clear CDP check box, then Next, then manually disable CDP on the WAN interface
D . Click Fix All, the clear CDP check box, the Next
E . Click Fix All, then Clear CDP check box, then Next, then Immediately reboot the router
-
You work as a network technician at Company. Your boss, Ms. , is interested in the Aironet enterprise solutions. What should you tell her regarding this?()
A . The Cisco Aironet AP handles real-time portions of the LWAPP protocol, and the WLAN controller handles those items which are not time sensitive.
B . A Cisco Aironet AP handles the transmission of beacon frames and also handles responses to probe-request frames from clients.
C . Virtual MAC architecture allows the splitting of the 802.11 protocol between the Cisco Aironet AP and a LAN switch.
D . A Cisco Aironet solution includes intelligent Cisco Aironet access point (APs) and Cisco Catalyst switches.
E . In the Cisco Aironet solution, each AP is locally configured by the use of either a web interface or the command line interface.
-
You work as a network technician at Company. Your boss, Mrs., is interested in LWAPP (Lightweight Access Point Protocol). What should you tell her regarding this technology? ()
A . LWAPP is a proprietary protocol, and because of its very high overhead it is not widely adopted.
B . Control traffic is encapsulated in UDP packets with a source port of 1024 and a destination port of 12223.
C . Layer 3 LWAPP is a UDP/IP Frame that requires a Cisco Aironet AP to obtain an IP address using DHCP.
D . Data traffic is encapsulated in UDP packets with a source port of 1024 and a destination port of 12223.
E . Control traffic is encapsulated in TCP packets with a source port of 1024 and a destination port of 12223.
F . Data traffic is encapsulated in TCP packets with a source port of 1024 and a destination port of 12223.
-
You work as a network technician at Company. Your boss, Ms., is interested LWAPP (Lightweight Access Point Protocol). In particular she wants to know which type of activities this protocol defines. What should you tell her? ()
A . Layer 3 addressing and distribution
B . SNMP monitoring services
C . Access point certification and software control
D . Packet encapsulation, fragmentation, and formatting
E . Compression and Layer 3 address mapping
F . User behavior
-
The network technician is planning to use the 255.255.255.224 subent mask on the network.which three valid IP addresses can the technician use for the hosts?()
A . 172.22.243.127
B . 172.22.243.191
C . 172.22.243.190
D . 10.16.33.98
E . 10.17.64.34
F . 192.168.1.160
-
As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)
A . It provides reliable input for verifying network consistency.
B . It requires a network audit to support some upgrade decisions.
C . It requires a network audit to support any network restructuring.
D . It begins with gathering organizational input that may be inaccurate.
-
A technician at TestKing needs to update the network documentation. One of the tasks includes documenting the name of the IOS image file of each router in the network.Which commands could be used to find this information?()
A . Router# show protocols
B . Router# show version
C . Router# show image
D . Router# show IOS
E . Router# show flash
-
You work as a network technician at Company. Your boss, Mrs. , is interested in GLBP. In particular, she wants to know the multicast address that this protocol uses. What should you tell her? ()
A . 224.0.0.100
B . 224.0.0.1
C . 224.0.0.102
D . 224.0.0.10
E . 224.0.0.101
F . None of the other alternatives apply
-
A network administrator is explaining VTP configuration to a new technician. What should the network administrator tell the new technician about VTP configuration?()
A . A switch in the VTP client mode cannot update its local VLAN database.
B . A trunk link must be configured between the switches to forward VTP updates.
C . A switch in the VTP server mode can update a switch in the VTP transparent mode.
D . A switch in the VTP transparent mode will forward updates that it receives to other switches.
E . A switch in the VTP server mode only updates switches in the VTP client mode that have a higher VTP revision number.
F . A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership.
-
The network technician is planning to use the 255.255.255.224 subent mask on the network.which three valid IP addresses can the technician use for the hosts?()
A . 172.22.243.127
B . 172.22.243.191
C . 172.22.243.190
D . 10.16.33.98
E . 10.17.64.34
F . 192.168.1.160
-
You work as a network technician at Company. Your boss, Mrs. , is interested in switch spoofing. She asks you how an attacker would collect information with VLAN hoping through switch spoofing. You should tell her that the attacking station... ()
A . ...uses VTP to collect VLAN information that is sent out and then tags itself with the domain information in order to capture the data.
B . ...will generate frames with two 802.1Q headers to cause the switch to forward the frames to a VLAN that would be inaccessible to the attacker through legitimate means.
C . ...uses DTP to negotiate trunking with a switch port and captures all traffic that is allowed on the trunk.
D . ...tags itself with all usable VLANs to capture data that is passed through the switch, regardless of the VLAN to which the data belongs.
E . None of the other alternatives apply
-
While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()
A . Router#copy tftp flash
B . Router(config)#restore flash
C . Router(config)#repair flash
D . Router#copy flash run
E . Router>copy start flash
F . Router#copy start flash
-
You work as a network technician at Certkiller .com. Please study the exhibit carefully. Which two interfaces are enabled for 802.1Q encapsulation?()https://assets.asklib.com/images/image2/2018073114345074049.jpg
A . Router Certkiller 2,Gig 0/1
B . Switch Certkiller B,Fast Port 1 to 24
C . Switch Certkiller A,Gig Port 9
D . Router Certkiller 2,Gig 0/0
-
Your company network consists of a single Active Directory domain named The network has a print server running Windows 2003 Server. A single printer is installed on the print server. Technicians in the IT Support department have the necessary permissions to manage printers on the print server.You are a member of the Domain Admins group.A user in the Accounts department reports that his documents are not printing. A technician named John examines the print queue and finds a list of documents waiting to be printed. John tries to delete the documents from the queue but is unsuccessful.You need to enable users to successfully print.What should you do?()
A. Install a new print device. Reconfigure the printer to send print jobs to the new print device.
B. Stop and restart the Print Spooler service on the print server. Instruct users to resubmit their print jobs.
C. Install a second instance of the printer. Configure the print queue to hold mismatched documents. Redirect the original printer to the new printer.
D. Install a second instance of the printer. Delete the original printer. Instruct users to resubmit their print jobs.
-
A network consultant is asked to set up a wireless network in a home. The home user wants thewireless network to be available in every comer of the house.Which of the following additional information will the technician need to determine the equipment for the installation? ()(Select TWO)
A. The length of the house
B. How many rooms are in the house
C. How many users will be using the wireless network
D. The building material of the house
E. The cost of the house