1
Which
mechanism
is
used
to
create
a
floating
static
route?
administrative
distance
cost
hop
count
passive
interface
2
Which
is
true
regarding
Frame
Relay
LMI?
The
LMI
type
must
be
manually
configured.
LMI
is
a
signalling
standard
between
two
DCE
devices.
There
are
three
LMI
types
standardized
by
ANSI,
ITU‐T,
and
Cisco.
Routers
at
each
end
of
a
Frame
Relay
virtual
circuit
must
always
use
the
same
LMI
type.
3
Refer
to
the
exhibit.
The
complete
configuration
of
a
Frame
Relay
interface
on
the
Chicago
router
is
shown.
How
does
the
Chicago
router
know
which
DLCI
is
mapped
to
the
IP
address
of
the
remote
router?
DE
CIR
FECN
Inverse
ARP
4
Which
bit
is
set
by
a
Frame
Relay
switch
to
inform
the
source
station
that
there
is
congestion
on
the
network?
BECN
CIR
DE
FCS
FECN
5
Which
two
statements
about
split
tunnels
are
true?
(Choose
two.)
Local
LAN
printing
will
use
the
VPN
tunnel.
The
traffic
load
on
the
VPN
server
is
increased.
Traffic
to
the
corporate
network
will
be
encrypted.
There
is
a
reduced
security
risk
to
the
corporate
network.
All
traffic
travels
across
the
VPN
tunnel
from
client
to
server.
Traffic
to
public
web
sites
and
general
Internet
navigation
is
not
encrypted.
6
Refer
to
the
exhibit.
Two
directly
connected
routers
are
unable
to
ping
each
other
through
the
only
active
serial
interfaces.
What
is
the
problem?
The
IP
addressing
scheme
is
incorrect.
Loopbacks
should
be
set
on
R1
and
R2.
PPP
encapsulation
needs
to
be
configured
on
R1.
The
bandwidth
settings
must
be
the
same
on
R1
and
R2.
A
no
shutdown
command
needs
to
be
configured
on
both
serial
interfaces.
7
When
identifying
VPN
requirements
for
endpoint
users,
what
care
must
be
taken
to
protect
the
network
when
remote
users
log
in
from
unsecured
public
locations?
Ensure
that
VPN
user
traffic
does
not
traverse
the
public
network.
Ensure
that
the
VPN
user
traffic
does
not
slow
down
internally
sourced
traffic
on
the
network.
Ensure
that
VPN
traffic
accessing
internal
network
devices
is
filtered
before
it
is
unencrypted.
Ensure
that
the
incoming
data
from
a
VPN
client
is
unencrypted
before
reaching
the
VPN
endpoint.
Ensure
that
remote
users
can
only
access
network
resources
that
are
appropriate
to
their
job
function.
8
What
are
two
components
a
network
designer
considers
when
planning
a
VPN?
(Choose
two.)
encryption
algorithm
for
privacy
and
security
encapsulation
protocol
to
use
when
creating
the
VPN
tunnel
switching
technology
to
optimize
VPN
WAN
throughput
tunneling
technology
for
guarding
against
data
corruption
routing
protocol
on
the
gateway
for
optimum
performance
9
What
tool
can
help
ease
the
configuration
of
VPN
servers
on
routers?
Cisco
SDM
PIX
Firewall
Cisco
VPN
Concentrator
Cisco
Adaptive
Security
Appliances
10
Refer
to
the
exhibit.
What
is
placed
in
the
address
field
of
a
frame
that
will
travel
from
the
Orlando
office
to
the
DC
office?
MAC
address
of
the
Orlando
router
MAC
address
of
the
DC
router
192.168.1.25
192.168.1.26
DLCI
100
DLCI
200
11
A
network
administrator
issued
the
command
show
frame‐relay
pvc.
The
response
from
the
router
shows
the
status
of
a
PVC
as
deleted.
What
is
the
reason
for
this
status?
The
DLCI
is
using
the
wrong
LMI
type.
The
DLCI
is
usable
but
has
little
activity.
The
DLCI
is
programmed
in
the
switch
but
the
circuit
is
not
usable.
The
DLCI
configured
on
the
CPE
device
does
not
match
the
DLCI
on
the
interface.
12
IPSec
operates
at
which
layer
of
the
OSI
model?
application
network
datalink
transport
13
Which
three
algorithms
can
be
used
to
encrypt
user
data
in
an
IPSec
VPN
framework?
(Choose
three.)
3DES
AES
Diffie‐Hellman
DES
ESP
SHA
14
A
company
uses
serial
interfaces
on
its
border
router
to
connect
to
branch
offices
through
WAN
connections.
The
security
policy
dictates
that
the
encapsulation
should
use
PPP
with
authentication
protocol
CHAP.
Which
statement
is
true
about
the
configuration
requirement
of
CHAP?
Both
the
username
and
password
are
case
sensitive.
Neither
the
username
nor
the
password
is
case
sensitive.
The
username
is
case
sensitive
but
the
password
is
not
case
sensitive.
The
password
is
case
sensitive
but
the
username
is
not
case
sensitive.
15
Refer
to
the
exhibit.
What
statement
is
true
about
the
configuration
shown
for
R2?
R2
is
configured
as
the
Frame
Relay
switch.
R2
is
configured
as
the
main
site
in
a
multipoint
Frame
Relay
WAN
prototype.
R2
is
configured
as
the
main
site
in
a
point‐to‐point
Frame
Relay
WAN
prototype.
R2
is
configured
as
a
remote
site
in
a
multipoint
Frame
Relay
WAN
prototype.
R2
is
configured
as
a
remote
site
in
a
point‐to‐point
Frame
Relay
WAN
prototype.
16
What
is
used
to
identify
the
path
to
the
next
Frame
Relay
switch
in
a
Frame
Relay
network?
CIR
DLCI
FECN
BECN
17
Which
two
statements
are
true
regarding
VPN
security?
(Choose
two.)
Users
may
only
establish
a
VPN
connection
from
secure
locations
and
never
from
public
areas.
Users
that
connect
to
a
network
through
a
VPN
do
not
have
to
log
in
to
resources
on
the
network.
Users
that
connect
to
a
network
through
a
VPN
are
are
considered
trusted
users
on
the
network.
Users
may
establish
a
VPN
connection
from
unsecure
locations
such
as
airports
and
hotel
lobbies.
Users
that
connect
to
a
network
through
a
VPN
should
have
access
to
all
the
resources
on
the
network.
18
Which
PVC
status
suggests
that
the
router
recognizes
the
DLCI
configured
on
its
interface
as
being
present
on
the
Frame
Relay
switch,
but
the
PVC
associated
with
the
DLCI
is
not
capable
of
end‐to‐end
communication?
active
deleted
inactive
idle
19
Which
statement
identifies
the
IP
address
design
for
subinterfaces
that
are
configured
for
a
Frame
Relay
network?
Multipoint
configurations
require
the
IP
address
of
each
subinterface
on
each
router
to
be
in
its
own
subnet.
Multipoint
configurations
require
IP
addresses
for
each
subinterface
on
each
router
to
be
a
part
of
the
same
subnet.
Point‐to‐point
configurations
require
IP
addresses
for
each
subinterface
on
each
router
to
be
a
part
of
the
same
subnet.
Point‐to‐point
configurations
do
not
require
IP
addresses
on
each
subinterface
on
each
router.
Multipoint
configurations
do
not
require
IP
addresses
on
each
subinterface
on
each
router.
20
Refer
to
the
exhibit.
Which
router
command
is
used
to
associate
a
Layer
2
address
with
the
corresponding
Layer
3
address?
Miller(config‐if)#
frame‐relay
map
ip
172.16.150.1
110
Miller(config‐if)#
frame‐relay
map
ip
172.16.150.1
112
Miller(config‐if)#
frame‐relay
map
ip
172.16.150.2
110
Miller(config‐if)#
frame‐relay
map
ip
172.16.150.2
112
21
An
IP
address
has
been
assigned
to
the
S0/0/0
interface
of
a
new
Cisco
router.
The
administrator
wishes
to
quickly
test
basic
connectivity
with
the
serial
interface
of
an
adjoining
Cisco
router
via
the
use
of
the
default
WAN
protocol.
Which
WAN
protocol
will
be
used
for
this
test?
PPP
Frame
Relay
DSL
HDLC
ATM
22
What
is
one
benefit
of
using
a
network
simulation
software
package?
The
network
design
can
be
tested
before
it
is
actually
implemented.
Simulation
software
packages
are
quickly
updated
to
support
new
network
technologies
and
devices.
Simulated
devices
have
the
same
features
as
actual
devices,
allowing
for
detection
of
all
potential
problems.
Software
packages
can
simulate
all
possible
network
traffic
conditions,
giving
an
accurate
prediction
of
network
performance.
23
Two
directly
connected
routers
are
able
to
ping
each
other
through
the
Serial
0/0/0
interfaces.
A
network
administrator
changes
the
encapsulation
on
one
router
to
PPP,
and
the
other
is
left
at
the
default
value.
What
statement
would
appear
in
the
output
of
the
show
interfaces
command
issued
on
one
of
the
routers?
Serial
0/0/0
is
up,
line
protocol
is
up
Serial
0/0/0
is
down,
line
protocol
is
down
Serial
0/0/0
is
up,
line
protocol
is
down
Serial
0/0/0
is
down,
line
protocol
is
up
Serial
0/0/0
is
administratively
down,
line
protocol
is
down
24
What
statement
correctly
defines
the
purpose
of
the
split
horizon
rule?
marks
the
route
unreachable
in
a
routing
update
that
is
sent
to
other
routers
limits
the
number
of
subinterfaces
that
can
be
associated
with
one
physical
interface
prevents
routers
from
advertising
a
network
through
the
interface
from
which
the
update
came
limits
the
number
of
hops
a
packet
can
traverse
through
the
network
before
it
should
be
discarded
prevents
routers
from
accepting
higher
cost
routes
to
networks
previously
marked
as
inaccessible
before
the
timer
expires