Powered By Blogger

Wednesday, January 16, 2013

Essential Linux Commands


touch command
______________

With out option-create new file
touch file1

If the file doesn’t exist, an empty file with the same name will be created in the current directory

-m : current tme stamp

touch -m ulupeezcontrol.jar

touch -t (mmddhhmm) ulupeezcontrol.jar

if it is current year no need of year,,,,other wise last 2 digits of the year

if you want to copy a timestamp from a file to another file.
touch –r file1 file2

creating empty file
touch ak.txt



•mtime — updated when the file contents change. This is the "default" file time in most cases.
•ctime — updated when the file or its metadata (owner, permissions) change
•atime — updated when the file is read

ls -l mtime ulupeezconrol.jar

scp Command
___________
Copy the file "foobar.txt" from remote host "rh1.edu" to remote host "rh2.edu"

scp your_username@rh1.edu:/some/remote/directory/foobar.txt \
your_username@rh2.edu:/some/remote/directory/

GREP Command                                                                                                    
______________                                                                                                  
                                                                                                                 
* Find all lines matching a specific keyword on a file                                                            
                                                                                                                                                                                                                                 
           grep ulupeez /etc/passwd                                                                                            
                                                                                                                 
* Option -v, will display all the lines except the match                                                          
                                                                                                                 
 * To get lines matched the text pattern in a particular file use -c option                                                       
 
            grep -c ulupeez /etc/passwd                                                                                                              
                                                                                                                 
*get the total number of lines that did not match the specific pattern by passing option -cv                     
                                                                                                                 
          grep -cv ulupeez /etc/passwd                                                                                        

*search a text by ignoring the case

          grep -i ulupeez /etc/passwd

*search all subdirectories for a text matching a specific pattern

           grep -ri ulupeez /home/users

Find Command
---------------------

*find files containing a specific word in its name

           find / -type f -size +100M

*find files that are not modified in the last x number of days

          find . -mtime +60

*find files that are modified in the last x number of days

          find . –mtime -2

*delete all the archive files with extension *.tar.gz and greater than 100MB

          find / -type f -name *.tar.gz -size +100M -exec ls -l {} \;
         find / -type f -name *.tar.gz -size +100M -exec rm -f {} \;

*archive all the files that are not modified in the last x number of days

        find /home/ulupeez -type f -mtime +60 | xargs tar -cvf /tmp/`date '+%d%m%Y'_archive.tar`



Wednesday, December 12, 2012

Rational ClearCase Concepts


IBM Rational ClearCase is a software tool for revision control (configuration management, SCM etc) of source code and other software development assets.

VOBs
The ClearCase source code repository is identified as a versioned object base or VOB for short. A VOB contains all the data and metadata associated with a particular software project. A project can make use of several VOBs, a single VOB or multiple projects can share a VOB.
VIEWS
View allows you to access files and directories under Rational ClearCase control.

Types of Views
----------------------
Snapshot views
Snapshot views stores a copy of the VOB data locally on the user's computer. Snapshot views can be used while disconnected from the network and later resynchronized to the VOB when a connection is reestablished.
Dynamic Views
A dynmaic view uses the Multiversion File System (MVFS) to provide immediate, transparent access to data stored in VOBs. When you work in a dynamic view, you do not need to copy data from VOBs to your view; you see the latest versions of elements in real time.
View-private
If new data is created in a ClearCase view then ClearCase will refer to the new data (files, directories, ...) as view-private to indicate it is specific to the view being used and not being version controlled (private) by ClearCase. This allows build systems to operate on the same file system structure as the source code, and ensures that each developer can build independently of each other. A view-private object can be added to source control and become a versioned element at any time, making it visible to other users.

Configuration Specifications

Configuration specification, commonly referred to as a config spec is a collection of rules that specifies what elements (files or directories) should be visible in a view, and which versions of these elements. When deciding which version, if any, of an element should be visible, ClearCase traverses the configuration specification line-by-line from top to bottom, stopping when a match is found. Earlier rules take priority over later ones. A configuration specification can also reference other configuration specifications using the 'include' statement.




View Creation
Steps for creation of new view

Go to Start >Programs > IBM Rational > IBM Rational Clearcase > Create View








Select the Snapshot view
Window for selecting the type of View.













Provide the location where the view needs to be created.



On clicking Finish, the confirm dialog box opens.




Inserting the config spec to the created view.



Click the Inspect Config Spec and then the Edit button to paste the required Config Spec. Config spec contains the rules which define the VOBs which are required to be imported from the repository. Click Finish and the new View is created in the location specified.







View Details button displays the details of View.

After the view is created a window opens to save the results.




Check in and Check out files

Check Out

To modify a file or folder that is under Rational ClearCase source control, right-click the element and click Check Out or click the ClearCase Check Out icon. You can then edit file elements, or add and delete file elements and symbolic links in directory elements.

Check In

To create a new version of a file or folder element that you previously checked out, right-click the file or folder and click Check In or click the ClearCase Check In icon.
By default, ClearCase does not check in files that have not changed. To change this behavior, click Advanced and select the Checkin even if identical option in the ClearCase - Checkin dialog box. This option is available only in ClearCase version 2002.05.00 or later. This option is off by default.

History Browser

ClearCase stores event records for any change to the VOB itself or to an object in a VOB. The History Browser is a graphical user interface for viewing these event records .This helps in keeping track of who has made what changes.

 

Compare Versions
ClearCase Diff Merge enables you to compare 2 or more files, directories, or versions, graphically representing the differences between them.


Thursday, October 13, 2011

WebSphere Application Server concepts

Websphere is the product name of IBM.IBM has many products under the name websphere like WAS (websphere application server), Websphere MQ,websphere message broker,etc….
       WebSphere Application Server is a set of software tools that enables companies to build and manage J2EE applications. It handles web application requests , and allows the server to response to client requests

To familiar with Websphere you must have familiar with some terms.......

Application server

An application server extends the ability of an HTTP server to handle Web application requests, and allows a server to generate dynamic, customized responses to client requests.

Cell

A group of related nodes and their node agents constitute a cell. Administrators define the nodes that make up a cell according to criteria that is appropriate in their environment.

A cell contains a Deployment Manager from which all the administrative tasks for the nodes in that cell are handled. Deployment Manager for the cell has a master configuration repository that contains the configuration data for the nodes and servers within the cell. Configuration changes made at the cell level are propagated to the nodes and servers the next time synchronization occurs. Therefore, all configuration changes must be made at the cell level.

Although each node and server in a cell have their own local configuration files, configuration changes made at the node or server level are temporary and will be overlaid with the data from the cell repository maintained by the Deployment Manager.

Node and Node agent

A node is a logical grouping of WebSphere Application Server managed server processes that share common configuration control. A node usually corresponds to a physical computer with a distinct IP address. A node is normally associated with one physical installation of WebSphere Application Server. The node name is typically identical to the host name of the computer.

A node contains one or more application servers, XML configuration files, and an activated node agent. The node agent communicates with the cell's Deployment Manager to manage that set of servers on the node.

A WebSphere Application server will have one nodeagnet per one node. The node agent acts as a mediator between the Deployment manager and the node.

Deployment Manager

Deployment Manager is a special application server which manages the configuration of multiple application servers across multiple nodes in a cell. Deployment Manager includes an Administrative Console for implementing the configuration management.

It is also responsible for centralizing user repositories for application and also for webSphere authentication and authorization


How to Set SESSION TIMEOUT for an Application

 In the WebSphere Administrative Console:
                  Servers->Application Servers->WebSphere Portal ->Container Settings: Web Container Settings ->Session Management->Session Timeout -> Set Timeout



JVM INITIAL AND MAXIMUM HEAP SIZE

Servers-> Application Servers->WebSphere Portal->Server Infrastructure: Java and Process Management->ProcessDefinition->Java Virtual Machine


How to check WAS version

/opt/IBM/WebSphere/AppServer/bin/versionInfo.sh

To change the value of url(URL Redirection)

Open WASConsole
Resource --->Resource Environment--->
Resource environment providers--->WP ConfigService--->Custom properties--->
There u can c the URL'S

Setup WorkManager


  1. Log in to the WebSphere® administrative console.
  2. Click Resources > Asynchronous beans > Work managers.
  3. In the Scope list, select the server node for the InfoSphere Master Content server.
  4. Click New.
  5. Enter the following information:(NAME and JNDI NAME)
    Field nameValue
    Namemcs
    JNDI namewm/mcs
    DescriptionAny descriptive text, such as MCS work manager
    Maximum number of threads100
    Service namesSelect SecurityInternationalization, and WorkArea
  6. Save your configuration.





Thursday, September 16, 2010

GTA VICE CITY CHEATZ

GTA: Vice City Cheat Codes
Codes Galore!
During Gameplay, type any of these cheats (note: codes are not case sensitive)

Cheat Effect
THUGSTOOLS All ''light'' weapons
PROFESSIONALTOOLS All ''medium'' weapons
NUTTERTOOLS All ''heavy'' weapons
ASPIRINE Full Health
PRECIOUSPROTECTION Full Armor
ICANTTAKEITANYMORE Commit Suicide
YOUWONTTAKEMEALIVE Raise Wanted Level
LEAVEMEALONE Decrease Wanted Level
FANNYMAGNET Ladies Man, Women Follow You
CERTAINDEATH Makes you smoke a cigarette
DEEPFRIEDMARSBARS Makes Tommy fatter
PROGRAMMER Gives Tommy girly arms/legs
STILLLIKEDRESSINGUP Change Skin/Clothes
CHEATSHAVEBEENCRACKED Play as Ricardo Diaz
LOOKLIKELANCE Play as Lance Vance
MYSONISALAWYER Play as Ken Rosenberg
ILOOKLIKEHILARY Play as Hilary King
ROCKANDROLLMAN Play as Love Fist character (Jezz Torent)
WELOVEOURDICK Play as Love Fist character (Dick)
ONEARMEDBANDIT Play as Phil Cassidy
IDONTHAVETHEMONEYSONNY Play as Sonny Forelli
FOXYLITTLETHING Play as Mercedes
PANZER Spawn a Rhino
TRAVELINSTYLE Spawn a Bloodring Banger
GETTHEREQUICKLY Spawn a Bloodring Banger #2
GETTHEREFAST Spawn a Sabre Turbo
GETTHEREVERYFASTINDEED Spawn a Hotring Racer
GETTHEREAMAZINGLYFAST Spawn a Hotring Racer #2
THELASTRIDE Spawn a Romero's Hearse
ROCKANDROLLCAR Spawn Love Fist's Limo
RUBBISHCAR Spawn a Trashmaster
BETTERTHANWALKING Spawn a Caddie
BIGBANG Blow up nearby cars
MIAMITRAFFIC Aggressive Drivers
AHAIRDRESSERSCAR All cars are pink
IWANTITPAINTEDBLACK All cars are black
COMEFLYWITHME Cars can fly
GRIPISEVERYTHING Perfect Handling
GREENLIGHT All traffic lights are green
SEAWAYS Cars can drive/hover over water
WHEELSAREALLINEED Only the wheels of a car are visible
LOADSOFLITTLETHINGS Sportscars have big wheels
ALOVELYDAY Sunny/Clear Weather
APLEASANTDAY Light Clouds
ABITDRIEG Dense Clouds
CANTSEEATHING Foggy Weather
CATSANDDOGS Stormy Weather
LIFEISPASSINGMEBY Speed up game clock
ONSPEED Makes everything faster
BOOOOOORING Makes everything slower
FIGHTFIGHTFIGHT Peds Riot
NOBODYLIKESME Peds Hate You
OURGODGIVENRIGHTTOBEARARMS Peds Carry Guns
CHICKSWITHGUNS Girls Carry Guns
CHASESTAT Shows Media Level (when 2+ stars)
AIRSHIP Fast boats can fly for short periods of time

Tuesday, August 31, 2010

CCNA-4 FINAL EXAM

1 As system administrator, you type “debug ipx sap” and receive the following lines as part of the IOS response: type 0×4, “HELLO2?, 199.0002.0003.0006 (451), 2 hops type 0×4, “HELLO1?, 199.0002.0003.0008 (451), 2 hops What does “0×4? signify?

A. That is a Get Nearest Server response.

B. That it is a General query.

C. That it is a General response.

D. That it is a Get Nearest Server request.



Ans A

2 To monitor IP igrp traffic, you can use “debug IP igrp transaction” or “debug IP igrp events”. How do you display information about IPX routing update packets?

A. debug routing

B. debug ipx transaction

C. debug ipx routing activity

D. debug ipx events



Ans: C

3 To monitor ipx traffic on a network, what command would you use?

A. debug ipx transaction

B. show ipx traffic

C. show ipx events

D. display ipx traffic



Ans B

4 What command would you use to find out the names of Novell servers on a network?

A. show ipx servers

B. show ipx hosts

C. show ipx sap

D. show ipx nodes.



Ans A

5 The “ipx delay number” command will allow an administrator to change the default settings. What are the default settings?

A. For LAN interfaces, one tick; for WAN interfaces, six ticks

B. For LAN interfaces, six ticks; for WAN interfaces, one tick

C. For LAN interfaces, zero ticks; for WAN interfaces, five ticks

D. For LAN interfaces, five ticks; for WAN interfaces, zero Ticks



Ans A

The default is–for LAN interfaces, one tick; for WAN interfaces, six ticks

6 As a system administrator, you need to set up one Ethernet interface on the Cisco router to allow for both sap and Novell-ether encapsulations. Which set of commands will accomplish this?

A. interface ethernet 0.1 ipx encapsulation Novell-ether ipx network 9e interface ethernet 0.2 ipx network 6c

B. interface ethernet 0 ipx encapsulation Novell-ether ipx network 9e interface ethernet 0 ipx encapsulation sap ipx network 6c

C. interface ethernet 0.1 ipx encapsulation Novell-ether interface ethernet 0.2 ipx encapsulation sap

D. interface ethernet 0.1ipx encapsulation Novell-ether ipx network 9e interface ethernet 0.2 ipx encapsulation sap ipx network 6c



Ans D

The following commands setup the subinterfaces to allow for two types of encapsulation: interface ethernet 0.1 ipx encapsulation Novell-ether ipx network 9e interface ethernet 0.2 ipx encapsulation sap ipx network 6c

7 What does the “IPX maximum-paths 2? command accomplish?

A. It enables load sharing on 2 paths if the paths are equal metric paths.

B. It sets up routing to go to network 2.

C. It is the default for Cisco IPX load sharing.

D. It enables load sharing on 2 paths if the paths are unequal metric paths.



Ans A

It enables load sharing on 2 paths if the paths are equal metric paths. The default is 1 path and the maximum is 512 paths.

8 You want to enable both arpa and snap encapsulation on one router interface. How do you do this?

A. The interface can handle multiple encapsulation types with no extra configuration.

B. Assign two network numbers, one for each encapsulation type.

C. Enable Novell-ether to run multiple encapsulation types.

D. Both arpa and snap are enabled by default so you don’t have to configure anything.



Ans B

To assign multiple network numbers, you usually use subinterfaces. A sample configuration follows: ipx ethernet 0.1 ipx encapsulation novell-ether ipx network 9e interface ethernet 0.2 ipx encapsulation sap ipx network 6c

By default, Cisco routers forward GNS SAPs to remote networks.



A. False

B. True



Ans A

GNS is Novell’s protocol to Get Nearest Server. If there is a server on the local network, that server will respond. If there isn’t, the Cisco router has to be configured to forward the GNS SAP.

9 To prevent Service Advertisements (SAPs) from flooding a network, Cisco routers do not forward them. How are services advertised to other networks?

A. Each router builds its own SAP table and forwards that every 60 seconds.

B. Each router assigns a service number and broadcasts that.

C. SAPs aren’t necessary with Cisco routers.

D. Cisco routers filter out all SAPs.



Ans: A

Cisco routers build SAP tables and forward the table every 60 seconds. All SAPs can’t be filtered even with 4.x since NDS and time synchronization uses SAPs.

10 Novell’s implementation of RIP updates routing tables every ____ seconds.

A. 60

B. 90

C. 10

D. 30

Ans A

Novell’s RIP updates routing tables every 60 seconds, Apple’s RTMP is every 10 seconds, routers ARP every 60 seconds, IGRP signal every 90 seconds, and Banyan VINES signals every 90 seconds.

11 In Novell’s use of RIP, there are two metrics used to make routing decisions. Select the two metrics.

A. Ticks.

B. Hops

C. Loops

D. Counts

Ans:A &B

It first uses ticks (which is about 1/18 sec.); if there is a tie, it uses hops; if hops are equal, then it uses an administratively assigned tiebreaker.

12 What is the Cisco name for the encapsulation type used on a serial interface?

A. HDLC

B. SDLC

C. SAP

D. SNAP

Ans A

13 “arpa” is used by the Cisco IOS for which encapsulation types?

A. Ethernet_II

B. Ethernet_802.3

C. Ethernet_802.2

D. Ethernet_SNAP

Ans A

Novell’s IPX and Cisco’s IOS name their protocols differently. Cisco uses sap for Ethernet_802.2, Token-Ring, and Novell’s FDDI_802.2. Cisco uses snap for Ethernet_SNAP, Token-Ring_SNAP, and FDDI_SNAP. Cisco uses arpa for Ethernet_II and, finally the default is Novell-ether for Novell’s Ethernet_802.3.

14 “snap” is used by the Cisco IOS for which encapsulation types?

A. Ethernet_SNAP

B. Token-Ring_SNAP

C. FDDI_SNAP

D. Novell-SNAP

E. Novell-FDDI.

Ans: A,B &C Novell’s IPX and Cisco’s IOS name their protocols differently. Cisco uses sap for Ethernet_802.2, Token-Ring, and Novell’s FDDI_802.2. Cisco uses snap for Ethernet_SNAP, Token-Ring_SNAP, and FDDI_SNAP. Cisco uses arpa for Ethernet_II and, finally the default is Novell-ether for Novell’s Ethernet_802.3.

15?sap” is used by the Cisco IOS for which encapsulation types?

A. Ethernet_802.2

B. Token-Ring

C. FDDI_SNAP

D. Ethernet_802.3

E. FDDI_802.2

Ans A,B &E

Novell’s IPX and Cisco’s IOS name their protocols differently. Cisco uses sap for Ethernet_802.2, Token-Ring, and Novell’s FDDI_802.2. Cisco uses snap for Ethernet_SNAP, Token-Ring_SNAP, and FDDI_SNAP. Cisco uses arpa for Ethernet_II and, finally the default is Novell-ether for Novell’s Ethernet_802.3.

16 Which type of Ethernet framing is used for TCP/IP and AppleTalk?

A. Ethernet 802.3

B. Ethernet 802.2

C. Ethernet II

D. Ethernet SNAP

Ans D

Ethernet 802.3 is used with NetWare versions 2 through 3.11, Ethernet 802.2 is used with NetWare 3.12 and later plus OSI routing, Ethernet II is used with TCP/IP and DECnet, and Ethernet SNAP is used with TCP/IP and AppleTalk.

17 Which type of Ethernet framing is used for TCP/IP and DECnet?

A. Ethernet 802.3

B. Ethernet 802.2

C. Ethernet II

D. Ethernet SNAP

Ans: C

Ethernet 802.3 is used with NetWare versions 2 through 3.11, Ethernet 802.2 is used with NetWare 3.12 and later plus OSI routing, Ethernet II is used with TCP/IP and DECnet, and Ethernet SNAP is used with TCP/IP and AppleTalk.

18 You are a system administrator on a NetWare network, you are running NetWare 4.11 and you cannot communicate with your router. What is the likely problem?

A. NetWare 4.11 defaults to 802.2 encapsulation.

B. NetWare 4.11 defaults to 802.3 encapsulation

C. Cisco routers only work with NetWare 3.11.

D. NetWare 3.11 defaults to 802.2 encapsulation.

Ans A

The default encapsulation on Cisco routers is Novell Ethernet_802.3 and NetWare 3.12 and later defaults to 802.2 encapsulation, 3.11 and earlier defaults to 802.3.

19 NetWare IPX addressing uses a network number and a node number. Which statements are true?

A. The network address is administratively assigned and can be up to 16 hexadecimal digits long.

B. The node address is always administratively assigned.

C. The node address is usually the MAC address.

D. If the MAC address is used as the node address, then IPX eliminates the use of ARP.

Ans A, C &D

The network address can be up to 16 hexadecimal digits in length. The node number is 12 hexadecimal digits. The node address is usually the MAC address. An example IPX address is 4a1d.0000.0c56.de33. The network part is 4a1d. The node part is 0000.0c56.de33. The network number is assigned by the system administrator of the Novell network.

20 Which NetWare protocol works on layer 3–network layer—of the OSI model?

A. IPX

B. NCP

C. SPX

D. NetBIOS

Ans A

IPX (Internetwork Packet Exchange) is a NetWare network layer 3 protocol used for transferring information on LANs.

21 Which NetWare protocol provides link-state routing?

A. NLSP

B. RIP

C. SAP

D. NCP

Ans: A

NetWare Link Services Protocol (NLSP) provides link-state routing. SAP (Service Advertisement Protocol) advertises network services. NCP (NetWare Core Protocol) provides client-to-server connections and applications. RIP is a distance vector routing protocol.

22 As a system administrator, you want to debug igrp but are worried that the “debug IP igrp transaction” command will flood the console. What is the command that you should use?

A. debug IP igrp event

B. debug IP igrp-events

C. debug IP igrp summary

D. debug IP igrp events

Ans D

The “debug IP igrp events” is used to only display a summary of IGRP routing information. You can append an IP address onto either command to see only the IGRP updates from a neighbor.

23 What does the following series of commands accomplish? router igrp 71 network 10.0.0.0 router igrp 109 network 172.68.7.0

A. It isolates networks 10.0.0.0 and 172.68.7.0.

B. It loads igrp for networks 109 and 71.

C. It disables RIP.

D. It disables all routing protocols.

Ans A

It isolates network 10.0.0.0 and 172.68.7.0 and associates autonomous systems 109 and 71 with IGRP. IGRP does not disable RIP, both can be used at the same time.

24 In the command “router igrp 109? what does 109 signify?

A. an autonomous system

B. any network number which the router is attached to

C. the allowable length of the routing table

D. the network socket number

Ans A

The Cisco IOS global configuration command “router igrp xxx” is used to configure the Interior Gateway Routing Protocol. In this case, the 109 is called the process-id , which can also be used for an autonomous system number.

25 IGRP supports a feature that allows traffic to be distributed among up to 6 (4 default) paths to provide greater overall throughput and reliability. What is this called?

A. unequal-cost load balancing

B. equal-cost load balancing

C. proportionate load balancing

D. low cost load balancing

Ans A

An unequal-cost load balancing is used to provide alternate paths for data distribution on an internetwork. Cisco developed this method to use unused or under utilized links to increase bandwidth and network availability.

26 IGRP uses flash updates, poison reverse updates, holddown times, and split horizon. How often does it broadcast its routing table updates?

A. 90 seconds

B. 10 seconds

C. 30 seconds

D. 45 seconds

Ans A

27 The command “show IP protocol” displays which information?

A. routing timers

B. network information

C. contents of the IP routing table

D. information about all known network and subnetworks

Ans A & B

“show IP protocol” displays routing timers and network information. “show IP route” displays the routing table with information about all known networks and subnetworks.

28 When using RIP, routing updates are broadcast every ____ seconds.

A. 30

B. 10

C. 60

D. 90

Ans: A

Novell’s RIP updates routing tables every 60 seconds, Apple’s RTMP is every 10 seconds, routers ARP every 60 seconds, DECnet hosts and IGRP signal every 15 seconds, and Banyan VINES signals every 90 seconds.

29 An autonomous system can only exist if all routers in that system meet which criteria?

A. interconnected

B. run the same routing protocol

C. assigned same autonomous system number

D. run IGRP only

E. run RIP only

Ans A,B &C

An autonomous system is a set of routers and networks under the same administration. Each router must be interconnected, run the same routing protocol, and assigned the same autonomous system number. The network Information Center (NIC) assigns a unique autonomous system number to enterprises.

30 A default route is analogous to a _________.

A. default gateway

B. static route

C. dynamic route

D. one-way route

Ans: A

A default route is analogous to a default gateway. It is used to reduce the length of routing tables and to provide complete routing capabilities when a router might not know the routes to all other networks.

31 Routers can learn about destinations through static routes, default, or dynamic routing. By default, a router will use information derived from __________.

A. IGRP

B. RIP

C. IP

D. TCP

Ans A

The quality of information is rated:

Connected interface 0

Static route 1

IGRP 100

RIP 120

Unknown 255

The lower the value, the more reliable the source with 255 signifying information that the router will ignore. So, the router will use IGRP, rated at 100, before RIP, rated at 120.

32 You are logged into a router, what command would show you the IP addresses of routers connected to you?

A. show cdp neighbors detail

B. show run

C. show neighbors

D. show cdp

Ans A

33 As a system administrator, you perform an extended ping at the privileged EXEC prompt. As part of the display, you see “Set DF bit in IP header? [yes] :” What would happen if you answered no at the prompt.

A. This lets the router fragment the packet.

B. It tells the router not to fragment the packet.

C. This lets the router direct the packet to the destination it finds in its routing table.

D. It tell the router to send the packet to the next hop router

Ans A

“Set DF bit in IP header?” is a response to an extended ping at the router. If you answer yes (the default) the router will not fragment the packet. If you answer no, the router will fragment the packet.

34 You have typed “ping” 172.16.101.1 and get the following display: Type escape sequence to abort. Sending 5, 100-byte ICMP Echoes to 172.16.101.1, timeout is 2 seconds:

.!!!!What does the “.” signify?

A. That one message timed out.

B. That all messages were successful.

C. That one message was successful.

D. That one message completed in under the allotted timeframe.

Ans A

The possible responses from the ping command are: ! Successful receipt of an echo reply. Timed out waiting for a reply U Destination unreachable C Congestion-experienced packet I Ping interrupted ? Packet type unknown & Packet TTL exceeded

35 Which command, that is used to test address configuration, uses Time-To-Live (TTL) values to generate messages from each router.

A. trace

B. ping

C. telnet

D. bootp

Ans: A

The Cisco IOS EXEC command “trace [protocol] [destination]” is used to discover routes that packets will travel to their destination hosts. Trace uses TTL (Time to Live) values to report destination route information.

36 What does the command “IP name-server 255.255.255.255? accomplish?

A. It sets the domain name lookup to be a local broadcast.

B. This is an illegal command.

C. It disables domain name lookup.

D. The command is now defunct and has been replaced by “IP server-name ip any”

Ans A

By default DNS is enabled on a router with a server address of 255.255.255.255, which provides for a local broadcast.

37 As a system administrator, you need to provide your routers with a Domain Name System (DNS) server. How many DNS servers can you specify with one command?

A. 6

B. 1

C. 2

D. 4

Ans A

You can only specify six name servers in one command. The syntax is “IP name-server server-address1 [[ server-address2 ]…server-address6]. You must also enable

DNS.

38 How would you configure one host name that points to two IP addresses?

A. IP host jacob 1.0.0.5 2.0.0.8

B. IP jacob 1.0.0.5 2.0.0.8

C. IP host jacob 1.0.0.5

D. IP host duplicate “all”

Ans A

The correct syntax is IP host name [ TCP-port-number ] address [ address ]….. So, “IP host P1R1 1.0.0.5 2.0.0.8? is the correct choice. “IP host jacob 1.0.0.5? only points the host name jacob to one IP address–1.0.0.5.

39 The following selections show the command prompt and the configuration of the IP network mask. Which two are correct?

A. Router#term IP netmask-format { bitcount | decimal | hexadecimal }

B. Router(config-if)#IP netmask-format { bitcount | decimal | hexadecimal }

C. Router(config-if)#netmask-format { bitcount | decimal | hexadecimal }

D. Router#ip netmask-format { bitcount | decimal | hexadecimal }

Ans A & B

Router#term IP netmask-format { bitcount | decimal | hexadecimal } and Router(config-if)#IP netmask-format { bitcount | decimal | hexadecimal } are correct. You can configure the mask for the current session and you can configure it for a specific line.

40 When configuring the subnet mask for an IP address, which formats can be used?

A. dotted-decimal.

B. Hexadecimal

C. Bit-count

D. Octal

E. Binary

Ans A, B &C

41 You are given the following address: 153.50.6.27/25. Determine the subnet mask, address class, subnet address, and broadcast address.

A. 255.255.255.128, B,153.50.6.0, 153.50.6.127

B. 255.255.255.128, C,153.50.6.0, 153.50.6.127

C. 255.255.255.128, C,153.50.6.127, 153.50.6.0

D. 255.255.255.224, C,153.50.6.0, 153.50.6.127

Ans A

42 You are given the following address: 128.16.32.13/30. Determine the subnet mask, address class, subnet address,

and broadcast address.

A. 255.255.255.252, B,128.16.32.12, 128.16.32.15

B. 255.255.255.252, C,128.16.32.12, 128.16.32.15

C. 255.255.255.252, B,128.16.32.15, 128.16.32.12

D. 255.255.255.248, B,128.16.32.12, 128.16.32.15

Ans A

43 You are given the following address: 15.16.193.6/21. Determine the subnet mask, address class, subnet address,

and broadcast address.

A. 255.255.248.0, A, 15.16.192.0, 15.16.199.255

B. 255.255.248.0, B, 15.16.192.0, 15.16.199.255

C. 255.255.248.0, A, 15.16.199.255, 14.15.192.0

D. 255.255.242.0, A, 15.16.192.0, 15.16.199.255

Ans A

44 You have an IP host address of 201.222.5.121 and a subnet mask of 255.255.255.248. What is the broadcast address?

A. 201.222.5.127

B. 201.222.5.120

C. 201.222.5.121

D. 201.222.5.122

Ans A

The easiest way to calculate this is to subtract 255.255.255.248 (subnet mask) from 255.255.255.255, this

equals 7. Convert the address 201.222.5.121 to binary–11001001 11011110 00000101 01111001. Convert the

mask 255.255.255.248 to binary–11111111 11111111 11111111 11111000. AND them together to get: 11001001 11011110

00000101 01111000 or 201.222.5.120. 201.222.5.120 is the subnet address, add 7 to this address for 201.222.5.127 or

the broadcast address. 201.222.5.121 through 201.222.5.126 are the valid host addresses.

45 Given the address 172.16.2.120 and the subnet mask of 255.255.255.0. How many hosts are available?

A. 254

B. 510

C. 126

D. 16,372

Ans A

172.16.2 120 is a standard Class B address with a subnet mask that allows 254 hosts. You are a network administrator and have been assigned the IP address of 201.222.5.0. You need to have 20 subnets with 5 hosts per subnet. The subnet mask is 255.255.255.248.

46 Which addresses are valid host addresses?

A. 201.222.5.17

B. 201.222.5.18

C. 201.222.5.16

D. 201.222.5.19

E. 201.222.5.31

Ans A,B & D

Subnet addresses in this situation are all in multiples of 8. In this example, 201.222.5.16 is the subnet, 201.22.5.31 is the broadcast address. The rest are valid host IDs on subnet 201.222.5.16.

47 You are a network administrator and have been assigned the IP address of 201.222.5.0. You need to have 20 subnets with

5 hosts per subnet. What subnet mask will you use?

A. 255.255.255.248

B. 255.255.255.128

C. 255.255.255.192

D. 255.255.255.240

Ans A

By borrowing 5 bits from the last octet, you can. have 30 subnets. If you borrowed only 4 bits you could only have 14 subnets. The formula is (2 to the power of n)-2. By borrowing 4 bits, you have (2×2x2×2)-2=14. By borrowing 5 bits, you have (2×2x2×2x2)-2=30. To get 20 subnets, you would need to borrow 5 bits so the subnet mask would be 255.255.255.248.

48 You are given the IP address of 172.16.2.160 with a subnet mask of 255.255.0.0. What is the network address in binary?

A. 10101100 00010000

B. 00000010 10100000

C. 10101100 00000000

D. 11100000 11110000

Ans: A

To find the network address, convert the IP address to binary–10101100 000100000 00000010 10100000–then ANDed it with the subnet mask–11111111 11111111 00000000 00000000. The rest is 10101100 00010000 00000000 00000000, which is 172.16.0.0 in decimal.

The first octet rule states that the class of an address can be determined by the numerical value of the first octet.

49 Which addresses are INCORRECTLY paired with their class?

A. 128 to 191, Class B

B. 192 to 223 Class B

C. 128 to 191, Class C

D. 192 to 223, Class C

Ans B & C

Address classes are: 1 to 126, Class A; 128 to 191, Class B, 192 to 223, Class C; 224 to 239, Class D; and

240 to 255, Class E. The first octet rule states that the class of an address can be determined by the numerical value of the first octet.

50 Which addresses are INCORRECTLY paired with their class?

A. 1 to 126, Class A

B. 128 to 191, Class A

C. 1 to 126, Class B

D. 128 to 191, Class B

Ans:B & C.

Address classes are: 1 to 126, Class A; 128 to 191, Class B, 192 to 223, Class C; 224 to 239, Class D; and

240 to 255, Class E. The first octet rule states that the class of an address can be determined by the numerical value of the first octet.

51 Which addresses are INCORRECTLY paired with their class?

A. 240 - 255, Class D

B. 240 - 255, Class E

C. 224 - 239, Class D

D. 224 - 239, Class E

Ans A & D

Address classes are: 1 to 126, Class A; 128 to 191, Class B, 192 to 223, Class C; 224 to 239, Class D; and 240 to 255, Class E.

52 Which IP Address Class is INCORRECTLY paired with its range of network numbers?

A. Class A addresses include 192.0.0.0 through 223.255.255.0

B. Class A addresses include 1.0.0.0 through 126.0.0.0

C. Class B addresses include 128.0.0.0 through 191.255.0.0

D. Class C addresses include 192.0.0.0 through 223.255.255.0

E. Class D addresses include 224.0.0.0 through 239.255.255.0

Ans A

Class A addresses include 1.0.0.0 through 126.0.0.0

Class B addresses include 128.0.0.0 through 191.255.0.0

Class C addresses include 192.0.0.0 through 223.255.255.0

Class D addresses include 224.0.0.0 through 239.255.255.0

53 Which IP Address Class can have 16 million subnets but support 254 hosts?

A. Class C

B. Class A

C. Class B

D. Class D

Ans A

Possible Subnets IP Address Class Possible Hosts

254 A 16M.

64K B 64K

16M C 254

54 Which IP Address Class can have 64,000 subnets with 64,000 hosts per subnet?

A. Class B

B. Class A

C. Class C

D. Class D

Ans A

IP Address Class Possible Subnets Possible Hosts

254 A 16M

64K B 64K

16M C 254

55 There are two processes to pair MAC address with IP addresses. Which process finds an IP address from a MAC address?

A. RARP

B. ARP

C. RIP

D. IGRP

Ans A

ARP (Address Resolution Protocol) maps an IP address to the MAC address, RARP (Reverse Address Resolution Protocol) maps the MAC address to the IP address. ARP and RARP work at the internet layer of the Internet Model or the network layer of the OSI model.

56 When the router runs out of buffer space, this is called ________.

A. Source Quench

B. Redirect

C. Information Request

D. Low Memory

Ans A

Source quench is the process where the destination router, or end internetworking device will “quench” the date from the “source”, or the source router. This usually happens when the destination router runs out of buffer space to process packets.

57 Which protocol carries messages such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply?

A. ICMP

B. UDP

C. TCP

D. TFTP

E. FTP



Ans A

ICMP (Internet Control Message Protocol) is a network layer internet protocol described in RFC # 792. ICMP reports IP packet information such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply.

58 Two of the protocols that can be carried in the Protocol field of an IP packet are?

A. TCP

B. UDP

C. FTP

D. TFTP



Ans A & B

The following are the fields in an IP segment,

their length, and their definitions:

VERS (Version number - 16 bits)

HLEN (Number of 32-bit words in the header - 4 bits)

Type of Server (How the datagram should be handled - 32 bits)

Total Length (Total length of header and data - 32 bits)

Identification (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)

Flags (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)

Frag Offset (Provide fragmentation of datagrams to allow different MTUs in the internet - 6 bits)

TTL (Time-To-Live - 6 bits)

Protocol (Upperlayer protocol sending the datagram - 16 bits)

Header Checksum )Integrity check on the header - 16 bits)

Source IP Address (32 bits)

Destination IP Address (32 bits)

IP Options (network testing, debugging, security and others - 4 bits)

Data (4 bits).

59 Where would network testing be included in an IP packet?

A. IP Options field

B. Identification field

C. Type of Service field

D. Reservation field



Ans A

The following are the fields in an IP segment, their length, and their definitions:

VERS (Version number - 16 bits)

HLEN (Number of 32-bit words in the header - 4 bits)

Type of Server (How the datagram should be handled - 32 bits)

Total Length (Total length of header and data - 32 bits)

Identification (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)

Flags (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)

Frag Offset (Provide fragmentation of datagrams to allow different MTUs in the internet - 6 bits)

TTL (Time-To-Live - 6 bits)

Protocol (Upperlayer protocol sending the datagram - 16 bits)

Header Checksum )Integrity check on the header - 16 bits)

Source IP Address (32 bits)

Destination IP Address (32 bits)

IP Options (network testing, debugging, security and others - 4 bits)

Data (4 bits).

60 What field tells the Internet layer how to handle an IP packet?

A. Type of Service

B. Identification

C. Flags

D. Frag Offset



Ans A

The following are the fields in an IP segment, their length, and their definitions:

VERS (Version number - 16 bits)

HLEN (Number of 32-bit words in the header - 4 bits)

Type of Server (How the datagram should be handled - 32 bits)

Total Length (Total length of header and data - 32 bits)

Identification (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)

Flags (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)

Frag Offset (Provide fragmentation of datagrams to allow different MTUs in the internet - 6 bits)

TTL (Time-To-Live - 6 bits)

Protocol (Upperlayer protocol sending the datagram - 16 bits)

Header Checksum )Integrity check on the header - 16 bits)

Source IP Address (32 bits)

Destination IP Address (32 bits)

IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

61 Which fields of an IP packet provide for fragmentation of datagrams to allow differing MTUs in the internet?

A. Identification

B. Flags

C. Frag Offset

D. Type of Service

E. Total Length



Ans A, B & C

The following are the fields in an IP segment, their length, and their definitions:

VERS (Version number - 16 bits)

HLEN (Number of 32-bit words in the header - 4 bits)

Type of Server (How the datagram should be handled - 32 bits)

Total Length (Total length of header and data - 32 bits)

Identification (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)

Flags (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)

Frag Offset (Provide fragmentation of datagrams to allow different MTUs in the internet - 6 bits)

TTL (Time-To-Live - 6 bits)

Protocol (Upperlayer protocol sending the datagram - 16 bits)

Header Checksum )Integrity check on the header - 16 bits)

Source IP Address (32 bits)

Destination IP Address (32 bits)

IP Options (network testing, debugging, security and others - 4 bits)




Refer to the exhibit. Based on the output as shown, which two statements correctly define how the router will treat Telnet traffic that comes into interface FastEthernet 0/1? (Choose two).
Telnet to 172.16.10.0/24 is denied.
Telnet to 172.16.20.0/24 is denied.
Telnet to 172.16.0.0/24 is permitted.
Telnet to 172.16.10.0/24 is permitted.
Telnet to 172.16.20.0/24 is permitted.



Which data link layer encapsulation protocol is used by default for serial connections between two Cisco routers?
ATM
Frame Relay
HDLC
PPP
SDLC



Refer to the exhibit. Which two conclusions are indicated by the output? (Choose two.)
The router is not experiencing congestion.
DLCI 102 has been active for 30:31 minutes.
The upstream router is experiencing congestion.
The downstream router is experiencing congestion.
The virtual circuit cannot be completed until the PVC status changes.



Refer to the exhibit. R1 is performing NAT overload for the 10.1.1.0/24 inside network. Host A has sent a packet to the web server. What is the destination IP address of the return packet from the web server?
10.1.1.2:1234
172.30.20.1:1234
172.30.20.1:3333
192.168.1.2:80




Which configuration on the vty lines provides the best security measure for network administrators to remotely access the core routers at headquarters?


Ans C





Where does a service provider assume responsibility from a customer for a WAN connection?
local loop
DTE cable on router
demarcation point
demilitarized zone





Which statement is true about PAP in the authentication of a PPP session?
PAP uses a two-way handshake.
The password is unique and random.
PAP conducts periodic password challenges.
PAP uses MD5 hashing to keep the password secure.





Refer to the exibit. A network technician has configured the Frame Relay network but is unable to ping between R1 and R2. What set of commands must the technician issue to fix this problem?
R2(config-if)# no frame-relay map ip 10.1.1.2 102 broadcast
R2(config-if)# frame-relay map ip 10.1.1.1 201 broadcast

R1(config-if)# no frame-relay map ip 10.1.1.2 201 broadcast R1(config-if)# frame-relay map ip 10.1.1.1 102 broadcast
R2(config-if)# no frame-relay map ip 10.1.1.2 102 broadcast R2(config-if)# frame-relay map ip 10.1.1.2 201 broadcast
R1(config-if)# no frame-relay map ip 10.1.1.1 201 broadcast R1(config-if)# frame-relay map ip 10.1.1.2 102 broadcast




Refer to the exhibit. Every time the administrator reboots this router, the boot process ends in setup mode. What is a possible problem?
There is insufficient RAM for the IOS to load on this router.
A password recovery process should be done on this router.
The bootstrap version and the version of the IOS are different.
The IOS image is damaged and must be reloaded using tftpdnld.
The configuration register is set to ignore the startup configuration.




Refer to the exhibit. What can be concluded from the exhibited output of the debug ip nat command?
The 10.1.1.225 host is exchanging packets with the 192.168.0.10 host.
The native 10.1.200.254 address is being translated to 192.168.0.10.
The 192.168.0.0/24 network is the inside network.
Port address translation is in effect.



When would the multipoint keyword be used in Frame Relay PVCs configuration?
when global DLCIs are in use
when using physical interfaces
when multicasts must be supported
when participating routers are in the same subnet



Refer to the exhibit. A network administrator is trying to connect R1 remotely to make configuration changes. Based on the exhibited command output, what will be the result when attempting to connect to R1?
failure to connect due to Telnet not being enabled
failure to connect due to incomplete configuration for Telnet
a successful connection and ability to make configuration changes
a successful connection but inability to make configuration changes because of the absence of an enable secret password


13
Which statement is true about NCP?
Link termination is the responsibility of NCP.
Each network protocol has a corresponding NCP.
NCP establishes the initial link between PPP devices.
NCP tests the link to ensure that the link quality is sufficient.


14
Refer to the exhibit. What is the meaning of the term dynamic in the output of the command?
The bandwidth capability of the interface increases and decreases automatically based on BECNs.
The Serial0/0/1 interface acquired 172.16.3.1 from a DHCP server.
The mapping between DLCI 100 and 172.16.3.1 was learned through Inverse ARP.
DLCI 100 will automatically adapt to changes in the Frame Relay cloud.


15
Refer to the exhibit. Headquarters is connected through the Internet to branch office A and branch office B. Which WAN technology would be best suited to provide secure connectivity between headquarters and both branch offices?
ATM
VPN
ISDN
Frame Relay
broadband DSL


16
Refer to the exhibit. A host connected to Fa0/0 is unable to acquire an IP address from the DHCP server. The output of the debug ip dhcp server command shows "DHCPD: there is no address pool for 10.1.1.1". What is the problem?
The 10.1.1.1 address is already configured on Fa0/0.
The default router for the 10Network pool is incorrect.
The ip helper-address must be added to Fa0/0 interface.
The pool of addresses for the 10Network pool is incorrect.
17
Refer to the exhibit. Results of the show vlan and show vtp status commands for switches S1 and S2 are displayed in the exhibit. VLAN 11 was created on S1. Why is VLAN 11 missing from S2?
There is a Layer 2 loop.
The VTP domain names do not match.
Only one switch can be in server mode.
S2 has a higher spanning-tree priority for VLAN 11 than S1 does.


18
What will be the result of adding the command ip dhcp excluded-address 192.168.24.1 192.168.24.5 to the configuration of a local router that has been configured as a DHCP server?
Traffic that is destined for 192.168.24.1 and 192.168.24.5 will be dropped by the router.
Traffic will not be routed from clients with addresses between 192.168.24.1 and 192.168.24.5.
The DHCP server will not issue the addresses ranging from 192.168.24.1 to 192.168.24.5.
The router will ignore all traffic that comes from the DHCP servers with addresses 192.168.24.1 and 192.168.24.5.


19
An issue of response time has recently arisen on an application server. The new release of a software package has also been installed on the server. The configuration of the network has changed recently. To identify the problem, individuals from both teams responsible for the recent changes begin to investigate the source of the problem. Which statement applies to this situation?
Scheduling will be easy if the network and software teams work independently.
It will be difficult to isolate the problem if two teams are implementing changes independently.
Results from changes will be easier to reconcile and document if each team works in isolation.
Only results from the software package should be tested as the network is designed to accommodate the proposed software platform.


20
Refer to the exhibit. RIPv2 has been configured on all routers in the network. Routers R1 and R3 have not received any RIP routing updates. What will fix the issue?
Enable RIP authentication on R2.
Issue the ip directed-broadcast command on R2.
Change the subnet masks to 10.11.12.0/8 and 172.16.40.0/16 on R2.
Enable CDP on R2 so that the other routers will receive routing updates.


21
What is tunneling?
using digital certificates to ensure that data endpoints are authentic
creating a hash to ensure the integrity of data as it traverses a network
using alternate paths to avoid access control lists and bypass security measures
encapsulating an entire packet within another packet for transmission over a network


22
Which IEEE 802.16 broadband wireless technology allows users to connect to the ISP at speeds comparable to DSL and cable?
Wi-Fi
satellite
WiMAX
Metro Ethernet


23
What are two effective measures for securing routers? (Choose two.)
Protect all active router interfaces by configuring them as passive interfaces.
Configure remote administration through VTY lines for Telnet access.
Use quotes or phrases to create pass phrases.
Disable the HTTP server service.
Enable SNMP traps.



24
Which option correctly defines the capacity through the local loop guaranteed to a customer by the service provider?
BE
DE
CIR
CBIR



25
Which technology is used to dynamically map next hop, network layer addresses to virtual circuits in a Frame Relay network?
Inverse ARP
LMI
DLCI
FECN



26
A company is looking for a WAN solution to connect its headquarters site to four remote sites. What are two advantages that dedicated leased lines provide compared to a shared Frame Relay solution? (Choose two.)
reduced jitter
reduced costs
reduced latency
the ability to burst above guaranteed bandwidth
the ability to borrow unused bandwidth from the leased lines of other customers



27
A network administrator is tasked with maintaining two remote locations in the same city. Both locations use the same service provider and have the same service plan for DSL service. When comparing download rates, it is noticed that the location on the East side of town has a faster download rate than the location on the West side of town. How can this be explained?
The West side has a high volume of POTS traffic.
The West side of town is downloading larger packets.
The service provider is closer to the location on the East side.
More clients share a connection to the DSLAM on the West side.


28
Refer to the exhibit. All devices are configured as shown in the exhibit. PC1 is unable to ping the default gateway. What is the cause of the problem?
The default gateway is in the wrong subnet.
STP has blocked the port that PC1 is connected to.
Port Fa0/2 on S2 is assigned to the wrong VLAN.
S2 has the wrong IP address assigned to the VLAN30 interface.



29
Refer to the exhibit. Partial results of the show access-lists and show ip interface FastEthernet 0/1 commands for router Router1 are shown. There are no other ACLs in effect. Host A is unable to telnet to host B. Which action will correct the problem but still restrict other traffic between the two networks?
Apply the ACL in the inbound direction.
Apply the ACL on the FastEthernet 0/0 interface.
Reverse the order of the TCP protocol statements in the ACL.
Modify the second entry in the list to permit tcp host 172.16.10.10 any eq telnet .



30
Refer to the exhibit. Which statement correctly describes how Router1 processes an FTP request that enters interface s0/0/0 and is destined for an FTP server at IP address 192.168.1.5?
The router matches the incoming packet to the statement that was created by the access-list 201 deny icmp 192.168.1.0 0.0.0.255 any command, continues comparing the packet to the remaining statements in ACL 201 to ensure that no subsequent statements allow FTP, and then the router drops the packet.
The router reaches the end of ACL 101 without matching a condition and drops the packet because there is no statement that was created by the access-list 101 permit ip any any command.
The router matches the incoming packet to the statement that was created by the access-list 101 permit ip any 192.168.1.0 0.0.0.255 command and allows the packet into the router.
It matches the incoming packet to the statement that was created by the access-list 201 permit ip any any command and allows the packet into the router.



31
Which three guidelines would help contribute to creating a strong password policy? (Choose three.)
Once a good password is created, do not change it.
Deliberately misspell words when creating passwords.
Create passwords that are at least 8 characters in length.
Use combinations of upper case, lower case, and special characters.
Write passwords in locations that can be easily retrieved to avoid being locked out.
Use long words found in the dictionary to make passwords that are easy to remember.



32
Refer to the exhibit. A network administrator is creating a prototype to verify the new WAN design. However, the communication between the two routers cannot be established. Based on the output of the commands, what can be done to solve the problem?
Replace the serial cable .
Replace the WIC on RA.
Configure RA with a clock rate command.
Issue a no shutdown interface command on RB.


33
A network administrator is instructing a technician on best practices for applying ACLs. Which suggestion should the administrator provide?
Named ACLs are less efficient than numbered ACLs.
Standard ACLs should be applied closest to the core layer.
ACLs applied to outbound interfaces are the most efficient.
Extended ACLs should be applied closest to the source that is specified by the ACL.




34
A network technician analyzes the network and notices late collisions. The collisions occur accompanied by jabber that originates from the server. What is the likely cause of the problem?
faulty switch port
web server CPU overload
faulty NIC in the web server
misconfiguration of web server services



35
Refer to the exhibit. A network administrator is attempting to configure a Frame Relay network. The administrator enters the commands as shown in the exhibit on R2, but the Frame Relay PVCs are inactive. What is the problem?
The incorrect DLCI numbers are being configured on R2.
The S0/0/0 interface on R2 needs to be point-to-point.
The frame-relay map commands are missing the cisco keyword at the end.
A single router interface cannot connect to more than one Frame Relay peer at a time



36
What functionality do access control lists provide in the implementation of dynamic NAT on a Cisco router?
define which addresses can be translated
define which addresses are assigned to a NAT pool
define which addresses are allowed out the router
define which addresses can be accessed from the inside network



37
Refer to the exhibit. Which data transmission technology is being represented?
TDM
PPP
HDLC
SLIP


38
When Frame Relay encapsulation is used, what feature provides flow control and exchanges information about the status of virtual circuits?
LCP
LMI
DLCI
Inverse ARP



39
An administrator is configuring a dual stack router with IPv6 and IPv4 using RIPng. The administrator receives an error message when trying to enter the IPv4 routes into RIPng. What is the cause of the problem?
When IPv4 and IPv6 are configured on the same interface, all IPv4 addresses are over-written in favor of the newer technology.
Incorrect IPv4 addresses are entered on the router interfaces.
RIPng is incompatible with dual-stack technology.
IPv4 is incompatible with RIPng.



40
Which two statements are true about IPv6 link local addresses? (Choose two.)
They begin with the 2000::/3 prefix.
They begin with the FE80::/10 prefix.
They are assigned by IANA to an organization.
They must be manually configured by the administrator.
They are assigned to a host by a stateless autoconfiguration process.


41
A network administrator has changed the VLAN configurations on his network switches over the past weekend. How can the administrator determine if the additions and changes improved performance and availability on the company intranet?

Conduct a performance test and compare with the baseline that was established previously.
Interview departmental secretaries and determine if they think load time for web pages has improved.
Determine performance on the intranet by monitoring load times of company web pages from remote sites.
Compare the hit counts on the company web server for the current week to the values that were recorded in previous weeks.


42
An administrator learns of an e-mail that has been received by a number of users in the company. This e-mail appears to come from the office of the administrator. The e-mail asks the users to confirm their account and password information. Which type of security threat does this e-mail represent?
cracking
phishing
phreaking
spamming
43
Which type of ACL will permit traffic inbound into a private network only if an outbound session has already been established between the source and destination?
extended
reflexive
standard
time-based
44
Refer to the exhibit. From the output of the show interfaces and ping commands, at which layer of the OSI model is a fault indicated?
application
transport
network
data link
physical
45
Which combination of Layer 2 protocol and authentication should be used to establish a link without sending authentication information in plain text between a Cisco and a non-Cisco router?
PPP with PAP
PPP with CHAP
HDLC with PAP
HDLC with CHAP
46
Which Frame Relay flow control mechanism is used to signal routers that they should reduce the flow rate of frames?
DE
BE
CIR
FECN
CBIR
47
Which IP address and wildcard mask would be used in an ACL to block traffic from all hosts on the same subnet as host 192.168.16.43/28?
access-list 10 deny 192.168.16.0 0.0.0.31
access-list 10 deny 192.168.16.16 0.0.0.31
access-list 10 deny 192.168.16.32 0.0.0.16
access-list 10 deny 192.168.16.32 0.0.0.15
access-list 10 deny 192.168.16.43 0.0.0.16
48
Compared with IDS systems, what can IPS systems do to provide further protection of computer systems?
detect potential attacks
stop the detected attack from executing
update OS patches for computer systems
scan computer systems for viruses and spyware
49
Refer to the exhibit. A network administrator configures a standard access control list on Router1 to prohibit traffic from the 192.168.0.0/24 network from reaching the Internet. The access control list also permits traffic from the 192.168.0.0/24 network to reach the 192.168.1.0/24 network. On which interface and in which direction should the access control list be applied?
interface Fa0/0, inbound
interface Fa0/0, outbound
interface S0/0/0, inbound
interface S0/0/0, outbound
50
Refer to the exhibit. The corporate network that is shown has been assigned network 172.16.128.0/19 for use at branch office LANs. If VLSM is used, what mask should be used for addressing hosts at Branch4 with minimal waste from unused addresses?
/19
/20
/21
/22
/23
/24
51
Refer to the exhibit. This serial interface is not functioning correctly. Based on the output shown, what is the most likely cause?
improper LMI type
interface reset
PPP negotiation failure
unplugged cable
52
While troubleshooting a problem with an e-mail server, an administrator observes that the switch port used by the server shows "up, line protocol up". The administrator cannot ping the server. At which layer of the OSI model is the problem most likely to be found?
application layer
network layer
data link layer
physical layer