Jumat, 07 Januari 2011

CCNA Quiz Chapter 9 Discovery 3


  1. Refer to the exhibit. All IP addresses have been correctly configured and all interfaces are up. Based on the information shown, which two statements describe what will occur while testing the network?
>> RTA and RTB are able to ping each other’s serial interfaces >> RTA and RTB do not learn any routes from each other through the RIP process
  1. Which utility is able to detect and monitor different types of traffic on a network and trigger an alarm when an excessive amount of a specified packet type is seen?
>> SNMP
  1. Refer to the exhibit. The network administrator configured the ACL to deny the LAN access to a web server with known viruses. However, the users can still reach this server. What could be the cause of the problem?
>> the access list should be applied inbound on the interface instead of outbound
  1. Refer to the exhibit. An administrator has been adding new VLANs to Sw-2 and notices that the new information is not recognized by Sw-3. Given the output of the show vtp status command, what is the reason why information is not shared in this VTP domain?
>> Sw-3 is configured for transparent mode
  1. Refer to the exhibit. Two neighboring routers are not able to establish connectivity. Based on the output of the debug ppp authentication command, which statement is true?
>> an incorrect hash string is received from the remote router
  1. Refer to the exhibit. The ACME company implements VLANs across its network infrastructure to further control the network traffic. The network administrator issued the show vlan command on SW2 to verify the VLAN configuration. Which statement is true?
>> traffic in each VLAN will not be seen in other VLANs
  1. What is one way to limit the size of a failure domain?
>> create redundant paths wherever possible
  1. Refer to the exhibit. The server was just added to the network and no hosts are able to connect to it. What could be the problem?
>> the IP address assigned to the server is the broadcast address for this subnetwork
  1. A technician is troubleshooting a loss of connectivity and suspects that an incorrectly configured ACL is the cause. Which two commands can the technician use to verify that the ACL is incorrectly configured?
>> show running config >> show access-lists
  1. Refer to the exhibit. Why is neighbor 192.168.199.137 not a DROTHER?
>> it is participating in OSPF over a point to point interface

0 komentar:

Posting Komentar