Which Layer 2 access method separates traffic into time slots and is specified by DOCSIS for use with cable high speed Internet service? .TDMA FDMA CDMA S-CDMA 47 What can a network administrator do to recover from a lost router password? use the copy tftp: flash: command boot the router to bootROM mode and enter the b command to load the IOS manually telnet from another router and issue the show running-config command to view the password .boot the router to ROM monitor mode and configure the router to ignore the startup configuration when it initializes 48 During the initial configuration of a router, the administrator enters the command no service config. How will the router behave as a a result of this command? All services will be disabled. .The default configuration will be restored on reboot. Automatic configuration from the network will be prevented. Services that are configured on the router will not be allowed to originate traffic. 49 Refer to the exhibit. The corporate network that is shown has been assigned network 172.16.128.0/19 for use at branch office LANs. VLSM is not being used. Which subnet mask will allow the most efficient utilization of IP addresses? ./21 /22 /23 /24 /25 /26 50 Refer to the exhibit. EIGRP has been configured as a routing protocol on the network. Users on the 192.168.1.0/24 network should have full access to the web server that is connected to 192.168.3.0/24 but should not be allowed to telnet to router R3. Verifying the configuration, the network administrator realizes that users on network 192.168.1.0/24 can successfully telnet to the router. What should be done to remedy the problem? .The ACL 101 statements 10 and 20 should be reversed. The ACL 101 should be applied on R3 VTY lines 0 4 in the inbound direction. The ACL 101 should be applied on R3 VTY lines 0 4 in the outbound direction. The ACL 101 should be applied on R3 Serial0/0/1 interface in the outbound direction. The ACL 101 statement 10 should be changed to: permit ip 192.168.1.0 0.0.0.255 any 51 At what physical location does the responsibilty for a WAN connection change from the user to the service provider? demilitarized zone (DMZ) .demarcation point local loop cloud 52 Which two protocols in combination should be used to establish a link with secure authentication between a Cisco and a non-Cisco router? (Choose two.) HDLC .PPP SLIP PAP .CHAP prompt. What is the effect when this router is rebooted? Contents in RAM will be erased. Contents in RAM will be ignored. Contents in NVRAM will be erased. .Contents in NVRAM will be ignored. 39 Which additional functionality is available on an interface when the encapsulation is changed from HDLC to PPP? flow control error control .authentication synchronous communication 40 Which characteristic of VPN technology prevents the contents of data communications from being read by unauthorized parties? QoS latency reliability .confidentiality 41 Refer to the exhibit. A network administrator is tasked with completing the Frame Relay topology that interconnects two remote sites. How should the point-to-point subinterfaces be configured on HQ to complete the topology? frame-relay interface-dlci 103 on Serial 0/0/0.1 frame-relay interface-dlci 203 on Serial 0/0/0.2 .frame-relay interface-dlci 301 on Serial 0/0/0.1 frame-relay interface-dlci 302 on Serial 0/0/0.2 frame-relay map ip 192.168.1.1 103 broadcast on Serial 0/0/0.1 frame-relay map ip 192.168.2.2 203 broadcast on Serial 0/0/0.2 frame-relay map ip 192.168.1.1 301 broadcast on Serial 0/0/0.1 frame-relay map ip 192.168.2.2 302 broadcast on Serial 0/0/0.2 42 Refer to the exhibit. Based on the output as shown, which two statements correctly define how the router will treat Telnet traffic that comes into interface FastEthernet 0/1? (Choose two). Telnet to 172.16.10.0/24 is denied. .Telnet to 172.16.20.0/24 is denied. Telnet to 172.16.0.0/24 is permitted. .Telnet to 172.16.10.0/24 is permitted. Telnet to 172.16.20.0/24 is permitted. 43 An administrator learns of an e-mail that has been received by a number of users in the company. This e-mail appears to come from the office of the administrator. The e-mail asks the users to confirm their account and password information. Which type of security threat does this e-mail represent? cracking .phishing phreaking spamming 44 Refer to the exhibit. Which statement correctly describes how Router1 processes an FTP request packet that enters interface S0/0/0, and is destined for an FTP server at IP address 172.16.1.5? .The router matches the incoming packet to the statement that is created by access-list 201 permit ip any any command and allows the packet into the router. The router reaches the end of ACL 101 without matching a condition and drops the packet because there is no statement that was created by access-list 101 permit ip any any command. The router matches the incoming packet to the statement that was created by the access-list 101 permit ip any 172.16.1.0 0.0.0.255 command, ignores the remaining statements in ACL 101, and allows the packet into the router. The router matches the incoming packet to the statement that was created by the access-list 201 deny icmp 172.16.1.0 0.0.0.255 any command, continues comparing the packet to the remaining statements in ACL 201 to ensure that no subsequent statements allow FTP, and then the router drops the packet. 45 Which statement is true about wildcard masks? A wildcard mask must be created by inverting the subnet mask. A wildcard mask performs the same function as a subnet mask. .A wildcard mask of 0.0.0.0 means the address should match exactly. A wildcard mask uses a "1" to identify IP address bits that must be checked. Showing 3 of 4 Next> Page: GO Page: GO Page: GO Page: GO Page: GO