Accessing the WAN-1

$7.50

SKU: AMSEQ-001 Category:

PART A

 

Accessing the WAN-1 Amity Assignments

1. Compare MPLS and IPSec-VPNs as WAN technologies?
What are the advantages and disadvantages each technology?

2. Is there a way to direct FC3 to use MS-CHAP V2 authentication across a PPP dialup connection? If so, how?

 

3. What protocol enables dynamic Frame Relay mapping? .When LMI Auto sense is in effect, what message type(s) does the DTE send to the DCE?
4. What is the Frame Relay broadcast queue?
5. How many data-link connection identifier (DLCI)s can an interface support? Can Frame Relay Inverse Address Resolution Protocol (IARP) work without Local Management Interface (LMI)?
6. What are the three types of VPNs? What type of VPNs link outside customers, suppliers, partners, or communities of interest to an enterprise customer’s network over a shared infrastructure using dedicated connections?

 

PART B – Assignment solution for Amity

1. Which is the most secure encryption algorithm: DES, 3DES, or Diffie-Hellman?

2. How do cryptography-based keys ensure the validity of data transferred across the network?

3. In a sub netted environment, how does the DHCP server discover what subnet a request has come from? If a physical LAN has more than one logical subnet, how can different groups of clients be allocated addresses on different subnets?

CASE STUDY Solution for Amity

You need to troubleshoot a Cisco router at the Toronto office of How2Pass Inc. The router loses its configuration each time it is rebooted. You study the output displayed in the exhibit. What is the cause of the problem?

Exhibit:—– output omitted —-
Cisco 2620 (MPC860) processor (revision 0x200) with 16384/2048K bytes of memory.
Processor board ID JAD05076EF6 (3878188963)
M860 processor: part number 0, mask 49
Bridging software.
X.25 software, Version 3.0.0.
2 Ethernet/IEEE 802.3 interface(s)
2 Serial(sync/async) network interface(s)
2 Low speed serial(sync/async) network interface(s)32K bytes of non-volatile configuration memory.
16384K bytes of processor board System flash (Read/Write)Configuration register is 0x2142

 

 

 

PART C – MCQ for Amity MBA Courses

1. Which PPP authentication methods will you use when configuring PPP on an interface of a Cisco router? (Select two options.)

  1. SSL
  2. SLIP
  3. PAP
  4. LAPB
  5. CHAP
  6. VNP

2. If NVRAM lacks boot system commands, where does the router look for the Cisco IOS by default?

  1. ROM
  2. RAM
  3. Flash
  4. Bootstrap
  5. Startup-.config

 

  1. What could be the rationale behind using passive-interface command when configuring a router?
    1. Allows interfaces to share common IP addresses.
    2. Allows an interface to remain up without the aid of keepalives.
    3. Allows a router to send routing and not receive updates via that interface.
    4. Allows a routing protocol to forward updates that is missing its IP address.
    5. Allows a router to receive routing updates on an interface but not send updates via that interface.

 

  1. Which of the following are benefits of segmenting a network with a router? (Select all that apply)
    1. Broadcasts are not forwarded across the router.
    2. All broadcasts are completely eliminated.
    3. Adding a router to the network decreases latency.
    4. Filtering can occur based on Layer 3 information.
    5. Routers are more efficient than switches and will process the data more quickly.
    6. None of the above.
  2. If an Ethernet port on router was assigned an IP address of 172.16.112.1/20, what is the maximum number of hosts allowed on this subnet?
    1. 2046
    2. 8190
    3. 4094
    4. 4096
    5. 1024

 

  1. The Frame Relay circuit between router A and router B is experiencing congestion. Which type of notification are used to alleviate the congestion? (Choose three)

  1. DE
  2. BECN
  3. DLCI 100 is Down
  4. CIR
  5. FECN

 

 

  1. At which OSI layer does data translation and code formatting occur?
    1. Network
    2. Physical
    3. Data link
    4. Transport
    5. Session
    6. Presentation
  2. Which one of the following is a reason to use a hardware address?
    1. To transmit a packet from one local device to another local device.
    2. To transmit a frame from one interface to another interface.
    3. To obtain a vendor code/serial number from the user.
    4. To transmit data from one local device to remote device across Internet.
    5. To contain logical information about a device to use an end-to-end transmission.
  3. What does the concept route aggregation mean when one talks about using variable subnet masking?
    1. Combining routes to multiple networks into one supernet.
    2. Deleting unusable addresses through the creation of many subnets.
    3. Calculating the available host addresses in the AS.
    4. Reclaiming unused space by means of changing the subnet size.
  4. What PPP protocol provides dynamic addressing, authentication, and multilink?
    1. HDLC
    2. LCP
    3. NCP
    4. X.25
  5. Study the network topology exhibit carefully, in particular the two switches SW1, SW2, and the router RT3. Which statements are true in this scenario? (Select two)

    1. The hosts on the 192.168.1.0 network form one collision domain, and the hosts on the 192.168.2.0 network form a second collision domain.
    2. Each host is in a separate collision domain.
    3. All the devices in both networks will receive a broadcast to 255.255.255.255 sent by host A.
    4. Only the devices in network 192.168.1.0 will receive a broadcast to 255.255.255.255 sent by host A.
    5. All the devices on both networks are members of the same collision domain.
  1. What is the purpose of Inverse ARP?
    1. It is used to map a known DLCI to an IP address
    2. It is used to map a known DLCI to a MAC address
    3. It is used to map a known IP address to a MAC address
    4. It is used to map a known MAC address to an IP address
    5. It is used to map a known MAC address to DLCI
  2. You want to configure a router for load balancing across 4 unequal cost paths on your network. Which of the following routing protocols can you use? (Choose two)
    1. RIP v1
    2. RIP v2
    3. OSPF
    4. IGRP
    5. EIGRP
    6. VLSM
  3. At what layer data is split into segments
    1. Transport
    2. LAN
    3. Session
    4. Data Link
  4. Host A is communicating with the server. What will be the source MAC address of the frames received by Host A from the server?
    1. The MAC address of Host A.
    2. The MAC address of the server network interface.
    3. The MAC address of router interface E1.
    4. The MAC address of router interface E0.
  5. What switching method examines the destination MAC address as the frame is being received and then begins forwarding the frame prior to receiving the entire frame?
    1. Fragment Free
    2. Store and Forward
    3. Modified Cut Through
    4. Cut Through
  6. You work as network administrator at Brain dump. Your trainee is configuring a router with both physical and logical interfaces. He asks you what factor determines the OSPF router ID. What should you tell him?
    1. The lowest IP address of any interface.
    2. The highest IP address of any interface.
    3. The highest IP address of any logical interface.
    4. The middle IP address of any logical interface.
    5. The lowest IP address of any physical interface.
    6. The highest IP address of any physical interface.
    7. The lowest IP address of any logical interface.
  7. Which of the following routes will be used to forward data in a situation where a routing table contains static, RIP, and IGRP routes destined to the same network with each set to its default administrative distance?
    1. The IGRP route
    2. The static route
    3. The RIP route
    4. All three will load balance.

19. What is the basic characteristic of switches and hubs?

  1. Hubs cannot filter frames.
  2. Using hubs is costly with regard to bandwidth availability.
  3. Switches do and can not forward broadcasts.
  4. Switches are more efficient than hubs in processing frames.
  5. Switches increase the number of collision domains in the network.

20. When you consider half-duplex and full-duplex Ethernet, what are unique for half-duplex Ethernet? (Select two options.)

  1. Half-duplex Ethernet operates in a shared collision domain.
  2. Half-duplex Ethernet operates in an exclusive broadcast domain.
  3. Half-duplex Ethernet has efficient throughput.
  4. Half-duplex Ethernet has lower effective throughput.
  5. Half-duplex Ethernet operates in an exclusive collision domain.
  1. Which of the following about Routing Protocols is correct? (choose all that apply)
  1. RIP 2 is a Distance Vector Protocol
  2. The RIP 1 uses bandwidth and delay as the metric
  3. RIP 1 uses subnet mask
  4. The holdown timer value for RIP is 240 sec
  5. The Update timer value of IGRP is 90 sec
  1. What command is used to delete the configuration stored in NVRAM?
    1. erase startup-config
    2. erase running-config
    3. delete nvram
    4. erase nvram
  2. What is the maximum number of hops that OSPF allows before marking a network as unreachable?
    1. 15
    2. 16
    3. 255
    4. Unlimited
    5. 99
  3. Which routing protocol would allow a network administrator scalability, VLSM support and minimize overhead if the network administrator wants to merge different networks all using routers from multiple vendors?
    1. VTP
    2. RIP
    3. IGRP
    4. EIGRP
    5. OSPF
  4. Two routers Rtr1 and Rtr2 are both configured with RIP only. What will be the result when Rtr1 receives a routing update that contains a higher cost path to a network already in its routing table?
    1. The update information will replace the existing routing table entry.
    2. The update information will be added to the existing routing table.
    3. The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence.
    4. The update will be ignored and no further action will be taken.
  5. Two routers Rtr1 and Rtr2 are both configured with RIP only. What will be the result when Rtr1 receives a routing update that contains a higher cost path to a network already in its routing table?
    1. The update information will replace the existing routing table entry.
    2. The update information will be added to the existing routing table.
    3. The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence.
    4. The update will be ignored and no further action will be taken.
  6. What switching method examines the destination MAC address as the frame is being received and then begins forwarding the frame prior to receiving the entire frame?
    1. Modified Cut Through
    2. Store and Forward
    3. Cut Through
    4. Fragment Free
  7. Given the the following network diagram, assume that port 1 through 3 are assigned to VLAN 1 and ports 4 through 6 are assigned to VLAN 2 on each switch. The switches are interconnected over a trunked link.

Which of the following conditions would verify VLAN and trunk operation? (choose 3)

    1. A. Host 1-1 can ping Host 1-2
    2. B. Host 1-1 can ping Host 4-2
    3. C. Host 1-1 can not ping Host 1-2
    4. D. Host 4-1 can not ping Host 1-2
    5. E. Host 4-1 can ping Host 4-2
  1. By looking at the configuration, Which additional command must be issued on the Branch router before interesting traffic will be sent to the Remote router?

Hostname: Branch Hostname: Remote
PH# 123-6000, 123-6001 PH# 123-8000, 123-8001
SPID1: 32055512360001 SPID1: 32055512380001
SPID2: 32055512360002 SPID2: 32055512380002

isdn switch-type basic ni
username Remote password cisco
interface bri0
ip address 10.1.1.1 255.255.255.0
encapsulation ppp
ppp authentication chap
isdn spid1 41055512360001
isdn spid2 41055512360002
dialer map ip 10.1.1.2 name Remote 1238001
dialer-list 1 protocol ip permit

    1. (config-if)# dialer-group 1
    2. (config-if)# dialer-list 1
    3. (config-if)# dialer map 1
    4. (config-if)# dialer-route 1
  1. You are the network administrator of the RouterSim global software Company. You receive a call from a user who is unable to reach a server at a remote site. After further review you discover the following info:

Local PC 190.0.3.35/24
Default Gateway 190.0.3.1
Remote Server 190.0.5.250/24

You then conduct the following tests from the offending local PC: Ping 127.0.0.1 – Unsuccessful
Ping 190.0.3.35 – Successful
Ping 190.0.3.1 – Unsuccessful
Ping 190.0.5.250 – Unsuccessful

Which of the following problems would create the test results listed above?

    1. TCP/IP not correctly installed
    2. Local physical layer problem
    3. NIC not functioning
    4. Remote physical layer problem
  1. Choose three reasons why the networking industry uses a layered model. (Choose 3)
    1. Allow changes in one layer to occur without changing other layers
    2. To get Gigabit speeds on LANs
    3. Clarify what general functions is to be done rather than how to do it
    4. To create filter tables on LANs
    5. Order network troubleshooting steps
  2. What is a disadvantage to using bridges in your network?

A. Filters by MAC address

B. Stops broadcast storms

C. Doesn’t stop broadcast storms

D. Can only use up to 4 bridges in any LAN

  1. Which wireless data communication type has a high data rate but is limited to very short distances?
    1. Infrared
    2. Broadband Personal Communication Service (PCS)
    3. Narrowband
    4. Spread spectrum
  2. Ethernet networks are broadcast domains and collision domains. How the hosts on an Ethernet network will know when to resume transmissions after a collision has occurred? (Choose all that apply)
    1. The router on the segment will signal that the collision has cleared.
    2. The jam signal indicates that the collision has been cleared.
    3. The hosts will attempt to resume transmission after a time delay has expired.
    4. The destination host sends a request to the source for retransmission.
    5. An electrical pulse indicates that the collision has cleared.
  3. Which command must be entered when connecting two routers without external DCE devices via a serial link?
    1. Serial up.
    2. Dte rate.
    3. Dce rate.
    4. Clock rate.
    5. Line protocol up.

36. What is a trunk link?

  1. A link that is only part of one VLAN and is referred to as the native VLAN of the port
  2. A link that can carry multiple VLANs
  3. A switch port connected to the Internet
  4. Data and voice capability on the same interface

37. In _________, the station configuration is unbalanced. We have one primary station and multiple secondary stations.

a. ABM

b. NRM

c. ARM

d. NBM
38 .In _________, the configuration is balanced. The link is point-to-point, and each station can function as a primary and a secondary.

 

a. ABM

b. NRM

c. ARM

d. NBM

 

39 .In PPP, the ________ is responsible for establishing, maintaining, configuring, and terminating links

 

a.NCP

b.LCP

c.CHAP

d. PAP

 

40. In PPP, _______ is a three-way hand-shaking authentication protocol in which the password is kept secret; it is never sent online.

 

a.NCP

b.LCP

c.CHAP

d.PAP

Reviews

There are no reviews yet.

Be the first to review “Accessing the WAN-1”

Your email address will not be published. Required fields are marked *

PlaceholderAccessing the WAN-1
$7.50