CCNA INCD2 640-816 Real Exam Questions

The 640-816 Interconnecting Cisco Networking Devices Part 2 (ICND2) is the exam associated with the Cisco Certified Network Associate certification. Candidates can prepare for this exam by taking the Interconnecting Cisco Networking Devices Part 2 (ICND2) v1.0 course. This exam tests a candidate’s knowledge and skills required to successfully install, operate, and troubleshoot a small to medium size enterprise branch network. The exam covers topics on VLSM and IPv6 addressing; extending switched networks with VLANs; configuring, verifying and troubleshooting VLANs; the VTP, RSTP, OSPF and EIGRP protocols; determining IP routes; managing IP traffic with access lists; NAT and DHCP; establishing point-to- point connections; and establishing Frame Relay connections.

» Read more

CCNA INCD1 640-822 Real Exam Questions

The 640-822 Interconnecting Cisco Networking Devices Part 1 (ICND1) is the exam associated with the Cisco Certified Entry Network Technician certification and a tangible first step in achieving the Cisco Certified Network Associate certification. Candidates can prepare for this exam by taking the Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 course. This exam tests a candidate’s knowledge and skills required to successfully install, operate, and troubleshoot a small branch office network. The exam includes topics on networking fundamentals; connecting to a WAN; basic security and wireless concepts; routing and switching fundamentals; the TCP/IP and OSI models; IP addressing; WAN technologies; operating and configuring IOS devices; configuring RIPv2, static and default routing; implementing NAT and DHCP; and configuring simple networks.

» Read more

Cisco CCNA 640-802 Real Exam Questions

The 640-802 CCNA is the composite exam associated with the Cisco Certified Network Associate certification. Candidates can prepare for this exam by taking the Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 and the Interconnecting Cisco Networking Devices Part 2 (ICND2) v1.0 courses. This exam tests a candidate’s knowledge and skills required to install, operate, and troubleshoot a small to medium size enterprise branch network. The topics include connecting to a WAN; implementing network security; network types; network media; routing and switching fundamentals; the TCP/IP and OSI models; IP addressing; WAN technologies; operating and configuring IOS devices; extending switched networks with VLANs; determining IP routes; managing IP traffic with access lists; establishing point-to-point connections; and establishing Frame Relay connections.

» Read more

CCNA (640-802) Lab – RIPv2 SIMULATOR

Central Florida Widgets recently installed a new router in their WinterPark office. Complete the network installation by performing the initial router configurations and configuring RIPV2 routing using the router command line interface (CLI) on the WinterPark router.

Configure the router per the following requirements:

Name of the router is WinterPark
Enable-secret password is te23lith
The password to access user EXEC mode using the console is Con231D
The password to allow telnet access to the router is toyo12ta
IPV4 addresses must be configured as follows:
Ethernet network 209.165.202.128/27 – router has last assignable host address in subnet
Serial network is 192.0.2.192/28 – router has last assignable host address in the subnet. Interfaces should be enabled.
Router protocol is RIP V2

Corrent Answer:

(1) Name the router:

Router>enable
Router#configure terminal
Router(config)#hostname WinterPark

(2) Set secret password:

WinterPark(config)#enable secret te23lith

(3) Set password for the console:

WinterPark(config)#line console 0
WinterPark(config-line)#password Con231D
WinterPark(config-line)#login
WinterPark(config-line)#exit

(4) Set the Telnet password:

WinterPark(config)#line vty 0 4
WinterPark(config-line)#password toyo12ta
WinterPark(config-line)#login
WinterPark(config-line)#exit

(5) Assign IP address for Ethernet interface (Fa0/0):

The Ethernet network 209.165.202.128/27 has:

Increment: 32 (/27 = 255.255.255.224 or 1111 1111.1111 1111.1111 1111.1110 0000)
Network address: 209.165.202.128
Broadcast address: 209.165.202.159 (because 128 + 32 – 1 = 159)

Therefore the last assignable host address in this subnet is 209.165.202.158 and we will assign it to Fa0/0 interface with these commands:

WinterPark(config)#interface fa0/0
WinterPark(config-if)#ip address 209.165.202.158 255.255.255.224
WinterPark(config-if)#no shutdown
WinterPark(config-if)#exit

(6) Assign IP address for Serial interface (S0/0/0):

Serial network 192.0.2.192/28 has:

Increment: 16 (/28 = 255.255.255.240 or 1111 1111.1111 1111.1111 1111.1111 0000)
Network address: 192.0.2.192
Broadcast address: 192.0.2.207 (because 192 + 16 – 1 = 207)

So the last assignable host address in this subnet is 192.0.2.207. Finally we assign it to s0/0/0 interface:

WinterPark(config)#interface s0/0/0
WinterPark(config-if)#ip address 192.0.2.207 255.255.255.240
WinterPark(config-if)#no shutdown
WinterPark(config-if)#exit

(7) Configure RIP v2 routing protocol:

WinterPark(config)#router rip
WinterPark(config-router)#version 2
WinterPark(config-router)#network 209.165.202.128
WinterPark(config-router)#network 192.0.2.207
WinterPark(config-router)#end
WinterPark#copy running-config startup-config

That's all.

CCNA (640-802) Lab – NAT SIMULATOR

A network associate is configuring a router for the CCNA Training company to provide internet access. The ISP has provided the company six public IP addresses of 198.18.184.105 198.18.184.110. The company has 14 hosts that need to access the internet simultaneously. The hosts in the CCNA Training company LAN have been assigned private space addresses in the range of 192.168.100.17 – 192.168.100.30.

The following have already been configured on the router:
– The basic router configuration
– The appropriate interfaces have been configured for NAT inside and NAT outside
– The appropriate static routes have also been configured (since the company will be a stub network, no routing protocol will be required.)
– All passwords have been temporarily set to "cisco"

The task is to complete the NAT configuration using all IP addresses assigned by the ISP to provide Internet access for the hosts in the Weaver LAN. Functionality can be tested by clicking on the host provided for testing.

Configuration information
  router name – Weaver
  inside global addresses – 198.18.184.105 198.18.184.110/29
  inside local addresses – 192.168.100.17 – 192.168.100.30/28
  number of inside hosts – 14

Correct Answer:

The CCNA Training company has 14 hosts that need to access the internet simultaneously but we just have 6 public IP addresses from 198.18.184.105 to 198.18.184.110/29. Therefore we have to use NAT overload (or PAT)

Double click on the Weaver router to open it

Router>enable
Router#configure terminal

First you should change the router's name to Weaver

Router(config)#hostname Weaver

Create a NAT pool of global addresses to be allocated with their netmask (/29 = 255.255.255.248). There were reports that the simulator in the real exam did not accept "prefix-length" keryword so you should use "netmask" keyword.

Weaver(config)#ip nat pool mypool 198.18.184.105 198.18.184.110 netmask 255.255.255.248

Create a standard access control list that permits the addresses that are to be translated

Weaver(config)#access-list 1 permit 192.168.100.16 0.0.0.15

Establish dynamic source translation, specifying the access list that was defined in the prior step

Weaver(config)#ip nat inside source list 1 pool mypool overload

This command translates all source addresses that pass access list 1, which means a source address from 192.168.100.17 to 192.168.100.30, into an address from the pool named mypool (the pool contains addresses from 198.18.184.105 to 198.18.184.110)

Overload keyword allows to map multiple IP addresses to a single registered IP address (many-to-one) by using different ports
The question said that appropriate interfaces have been configured for NAT inside and NAT outside statements.

This is how to configure the NAT inside and NAT outside, just for your understanding:

Weaver(config)#interface fa0/0
Weaver(config-if)#ip nat inside

Weaver(config-if)#exit

Weaver(config)#interface s0/0
Weaver(config-if)#ip nat outside
Weaver(config-if)#end

Finally, we should save all your work with the following command:

Weaver#copy running-config startup-config

Check your configuration by going to "Host for testing" and type:

C:\>ping 192.0.2.114

The ping should work well and you will be replied from 192.0.2.114

That’s all.

JN0-400 Real Exam Questions (Part 2)

Note: Highlight for Answers

1: What are two features of JUNOS software? (Choose two.)

A.JUNOS facilitates separate control and forwarding planes.
B.All processes use shared memory to make efficient use of available resources.
C.The functionality of JUNOS is made possible through multiple processes that are dependant on each other.
D.All processes run in their own protected memory space to prevent against complete system failure when a single process fails.
Correct Answers: A D

2: Which two statements are correct regarding the DHCP snooping feature on EX-series switches? (Choose two.)

A.DHCP snooping forwards DHCPACK messages from DHCP servers on untrusted interfaces.
B.DHCP snooping drops DHCPOFFER messages from DHCP servers on untrusted interfaces.
C.DHCP snooping drops DHCPDISCOVER messages from DHCP clients on trusted interfaces.
D.DHCP snooping treats access ports as untrusted interfaces and trunk ports as trusted interfaces by default.
Correct Answers: B D

3: Which statement is true regarding the EX-series file system?

A.The file system must be cleaned manually after every upgrade.
B.The file system must be cleaned manually before every upgrade.
C.Contents in the /var directory are automatically archived for future software rollbacks.
D.Contents in the /var directory are automatically removed upon a successful software upgrade.
Correct Answers: D

4: When configuring a redundant trunk group (RTG) on an interface, which restriction would apply?

A.The interface cannot be configured as a Layer 2 trunk.
B.The gratuitous-ARP-reply must be disabled on the interface.
C.Spanning Tree Protocol (STP) cannot be configured on the interface.
D.The interface must be configured as a Layer 3 interface with an assigned IP address.
Correct Answers: C

5: Which statement is true regarding J-Web access?

A.Only HTTP can be used to access J-Web.
B.J-Web access is available only through the me0 interface.
C.J-Web access uses the same authentication method as the CLI.
D.The web-management service is enabled in the factory-default configuration.
Correct Answers: C

6: Which statement is correct about Dynamic ARP Inspection (DAI)?

A.DAI is configured on a per-port basis.
B.DAI is configured on a Layer 3 interface.
C.DAI requires DHCP snooping to be configured.
D.DAI disables the interface when an incorrect ARP packet is received.
Correct Answers: C

7: Which command shows the VRRP status for all interfaces?

A.show vrrp
B.show route vrrp
C.show vrrp terse
D.show interfaces vrrp
Correct Answers: A

8: Click the Exhibit button.
In the exhibit, to which hierarchy level will the user be directed based upon the last command issued?


A.[edit]
root#
B.[edit protocols]
root#
C.[edit protocols ospf]
root#
D.[edit protocols ospf area]
root#
Correct Answers: C

9: Which two configuration options are valid methods for troubleshooting an EX-series switch? (Choose two.)

A.debug
B.syslog
C.monitor
D.traceoptions
Correct Answers: B D

10: Which two major components make up the control and forwarding planes for an EX-series switch? (Choose two.)

A.Routing Engine
B.Switching Engine
C.Switching Fabric Module
D.Packet Forwarding Engine
Correct Answers: A D

JN0-400 Real Exam Questions (Part 1)

Note: Highlight for Answers

1: Within a virtual chassis, which type of switch maintains the forwarding table?

A.line card
B.master switch
C.routing switch
D.forwarding switch
Correct Answers: B

2: Which built-in security mechanism in the Link Layer Discovery Protocol (LLDP) can be used to encrypt advertisements?

A.There is no encryption in LLDP.
B.A plain-text password can be used.
C.MD5 hashing of the password can be used.
D.SHA-1 hashing of the password can be used.
Correct Answers: A

3: What are three key features of virtual chassis? (Choose three.)

A.dedicated active and standby switch fabrics
B.dedicated master and backup routing engines
C.ability to configure vcp-0 and vcp-1 interfaces to run at various speeds
D.ability to upgrade all members of a virtual chassis from the master switch
E.ability to interconnect members of a virtual chassis using the 10-Gigabit Ethernet uplink ports
Correct Answers: B D E

4: Which two actions are available when configuring the MAC limiting feature? (Choose two.)

A.Drop the traffic.
B.Change the forwarding-class of the traffic.
C.Redirect the traffic with changed loss-priority.
D.Shut down the interface so traffic will be blocked.
Correct Answers: A D

5: You are configuring the voice VLAN feature on an EX-series switch on interface ge-0/0/5.
Which configuration would you use?

A.ethernet-switching-options {
voice-vlan {
interface ge-0/0/5.0 {
vlan voice-over-ip;
forwarding-class expedited-forwarding;
}
B.ethernet-switching-options {
voip {
interface ge-0/0/5.0 {
member-vlan voice-over-ip;
forwarding-class expedited-forwarding;
}
C.ethernet-switching-options {
voip {
interface ge-0/0/5.0 {
vlan voice-over-ip;
forwarding-class expedited-forwarding;
}
D.ethernet-switching-options {
voice-vlan {
interface ge-0/0/5.0 {
member-vlan voice-over-ip;
forwarding-class expedited-forwarding;
}
Correct Answers: C

6: You want to configure a static default route to the gateway 10.1.1.1. Which set command will accomplish this task?

A.set routes static route 0.0.0.0/0 gateway 10.1.1.1
B.set protocols static route 0.0.0.0/0 next-hop 10.1.1.1
C.set family inet static route 0.0.0.0/0 next-hop 10.1.1.1
D.set routing-options static route 0.0.0.0/0 next-hop 10.1.1.1
Correct Answers: D

7: Which three are included in the factory-default configuration? (Choose three.)

A.RSTP
B.LLDP
C.SNMP
D.user authentication
E.family ethernet-switching for all ports
Correct Answers: A B E

8: Which directory contains the rollback 4 configuration?

A./config
B./var/config
C./var/db/rollback
D./config/db/config
Correct Answers: D

9: Which statement describes a benefit of Link Layer Discovery Protocol-Media Endpoint Discovery (LLDP-MED)?

A.Allows an LLDP-MED-enabled switch to deliver VLAN and Class of Service (CoS) settings to a neighboring IP phone.
B.Allows an LLDP-MED-enabled switch to disable the interface when an invalid LLDP-MED advertisement is received from a neighboring IP phone.
C.Allows an LLDP-MED-enabled switch to forward the advertisements received from a neighboring IP phone on one LAN segment to another segment.
D.Allows an LLDP-MED-enabled switch to request an LLDP-MED advertisement from a neighboring IP phone when a periodic update is not received in a specific interval.
Correct Answers: A

10: Which statement is correct about the single-secure mode of 802.1X?

A.It does not require any supplicant on the interface; no supplicant is able to gain access.
B.It allows any one supplicant on the interface to be authenticated; once authentication is successful, any other devices on the same interface will gain access.
C.It allows any number of supplicants on the interface to be authenticated; only supplicants with their own successful authentication are allowed access at the same time.
D.It allows any one supplicant on the interface to be authenticated; once authentication is successful, only the successfully authenticated supplicant is allowed access at one time.
Correct Answers: D

E20-001 Real Exam Questions (Part 2)

Note: Highlight for Answers

1: Click on the Exhibit button. Which type of backup topology is shown in the exhibit?

A.Direct
B.LAN
C.SAN
D.Mixed
Correct Answers: D

2: What is a set of CLARiiON disks used to provide storage space to a host?

A.Disk Array Enclosure
B.Disk Processor Enclosure
C.Logical Unit Number
D.RAID Group
Correct Answers: D

3: What are replicated in storage array based remote replication?

A.I/Os to source devices
B.Reads from source devices
C.Writes to source devices
D.Writes to target devices
Correct Answers: C

4: An application uses ten 9 GB devices. A full volume local replica of the application is required every 6 hours. Each replica will be kept for 24 hours. How many replica devices are required?

A.50
B.10
C.30
D.40
Correct Answers: D

5: What best describes a Fibre Channel SAN?

A.Dedicated storage network
B.Global interconnectivity network
C.Multi-protocol storage network
D.Multipurpose system network
Correct Answers: A

6: Which storage method will make data most accessible?

A.Jukebox
B.Magnetic Disk
C.Optical disk
D.Tape
Correct Answers: B

7: What is a feature of Internal DAS?

A.File level I/O utilization
B.High CPU I/O utilization
C.Local storage provisioning
D.Simultaneous volume level operating system accessibility
Correct Answers: C

8: Which aspect of monitoring will allow you to predict the possible failure of FC Switch ports before the ports actually fail?

A.Capacity
B.Health
C.Performance
D.Security
Correct Answers: C

9: What are the three key data center management activities that are interdependent?’
A.Installation, Configuration, Problem Solving
B.Manageability, Integrity, Cost
C.Provisioning, Monitoring, Reporting
D.Scalability, Accessibility, Security
Correct Answers: C

10: What is host memory?

A.Connection for parallel communication devices
B.Control point for all host activities and resources
C.High speed interconnect between the CPU and memory
D.Temporary location for commands and data
Correct Answers: D

11: Which remote replication method is most affected by the distance between source and target?

A.Asynchronous
B.Disk buffering
C.Log shipping
D.Synchronous
Correct Answers: D

12: Which Celerra component is used to manage and configure the NAS solution?

A.Control Station
B.Data Mover
C.Disk Array Enclosure
D.Storage Processor
Correct Answers: A

13: When is it necessary to hold application I/O to ensure a consistent copy?

A.Just after creating a point in time replica
B.Just before creating a point in time replica
C.Only when an application spans multiple hosts
D.Only when an application spans multiple storage arrays
Correct Answers: B

14: Which statement is true about iSCSI names?

A.Every initiator or target has a unique iSCSI name
B.iSCSI name is derived from the IP address
C.Only a target requires an iSCSI name
D.Only an initiator requires an iSCSI name
Correct Answers: A

15: What is a standard layer that resides between managed objects and management software?

A.CIFS
B.FC-SW
C.HDA
D.SMI-S
Correct Answers: D

1 505 506 507 508 509 515