If a severity 1 problem is unresolved in four hours, the problem is escalated to which person?
Athe TAC director
Bthe TAC manager
Cthe TAC duty manager
Dthe Vice President of Technical Services
Which are the two benefits of the star network topology over the bus network topology? (Choose two.)
ADisruption of the entire network is not required when adding new machines.
BAny problem which leaves the network inoperable can be traced to the central hub.
CThis network type requires less cable as compared to linear bus topology.
DThe performance of one of the numerous nodes cannot reflect on the performance of other nodes.
EThe performance of the entire network is directly dependent on the performance of the hub.
The PE and CE interfaces are in the UP/UP state. The junior Network Engineer has validated Layer 3 functionality by pinging the adjacent interface, however the customer is unable to access the provider network. What should be your next troubleshooting step?
AValidate that the encapsulation method is utilizing Point-to-Point Protocol
BValidate that the destination customer network is in the correct VRF
CValidate that the circuit clocking is inaccurate and needs to be synchronized on both sides
DCheck the physical connection between both devices to ensure stability
EIdentify incorrect RADIUS configuration is present on the PE device
FCheck that an access-list is mis-configured on the loopback 0 interface and needs to be corrected
What are two differences between WAN and LAN? (Choose two.)
AThe customer has explicit control of their own WAN.
BThe customer can modify the service provider route distinguishers.
CThe customer has explicit control of their LAN.
DThe customer is aware of the infrastructure within the WAN.
EWANs will differ from LANs with attributes such as latency and distance.
Which of the following correctly pairs the dotted decimal subnet mask with the correct number of binary bits that represent the subnet mask?
A255.255.255.192 and /25
B255.255.255.248 and /28
C255.255.255.224 and /26
D255.255.255.248 and /27
E255.255.255.240 and /28
F255.255.255.240 and /16
What are two benefits of a star network topology? (Choose two.)
ADisruption of the entire network is not required when adding new machines.
BAny problem which leaves the network inoperable can be traced to the central hub.
CThis network type requires less cable as compared to linear bus topology.
DThe performance of one of the numerous nodes cannot reflect on the performance of other nodes.
EThe performance of the entire network is directly dependent on the performance of the hub.
You are having problems browsing to http://www.cisco.com from your laptop that is running Windows. Your laptop is connected directly to a default gateway, which is a Cisco ISR G2 router. Which four options are the basic troubleshooting steps that you should use to troubleshoot this issue? (Choose four.)
AIssue the ipconfig command from the Windows command line on your laptop to determine your laptop IP address and the default gateway IP address.
BIssue the ipconfig /all command from the Windows command line on your laptop to determine the DNS server IP address.
CIssue the ping {default gateway IP address} command from the Windows command line on your laptop to verify connectivity to the default gateway.
DIssue the ping {DNS server IP address} command from the Windows command line on your laptop to verify connectivity to the DNS server.
EIssue the ping tcp www.cisco.com 80 command from the Windows command line on your laptop to verify TCP port 80 connectivity to the www.cisco.com server.
FFrom the ISR G2 CLI, issue the ping tcp www.cisco.com 80 command to verify TCP port 80 connectivity to the www.cisco.com server.
DRAG DROP -
Drag the network device functions or features from the left and drop them on the correct network devices on the right.
Select and Place:
DRAG DROP -
Drag the routers from the left and drop them on the layer that they belong to on the right. Not all options on the left are used.
Select and Place:
DRAG DROP -
Drag the network characteristics from the left and drop them on the correct network type on the right.
Select and Place:
Which statement about IPv6 global unicast addresses is true?
AThe first 3 bits is 001.
BThe first 4 bits is 0011.
CThe first 4 bits is 1111.
DThe first 16 bits is FE80 in hex.
EThe first 16 bits is FF00 in hex.
FThe first 16 bits is 2002 in hex.
DRAG DROP -
Drag the Cisco IOS XR CLI command from the left and drop it on the most appropriate OSI layer(s) on the right that can be used to verify the operations at that
OSI layer.
Select and Place:
Given the IP address 10.106.170.145 255.248.0.0, which three options are the subnet that this IP address belongs to, the host IP address range on this subnet, and the subnet broadcast IP address?
Asubnet = 10.104.0.0/13
Bsubnet = 10.106.0.0/13
Csubnet = 10.112.0.0/13
Dhost IP address range = 10.104.0.1 to 10.111.255.254
Ehost IP address range = 10.106.0.1 to 10.106.255.254
Fhost IP address range = 10.106.0.1 to 10.119.255.254
Given the IP address of 209.168.200.155/27, which two options are the subnet that this IP address belongs to and the subnet broadcast IP address? (Choose two.)
A209.168.200.64 255.255.255.224
B209.168.200.96 255.255.255.224
C209.168.200.128 255.255.255.224
D209.168.200.95
E209.168.200.127
F209.168.200.159
DRAG DROP -
Drag the concepts from the left and drop them on the correct descriptions on the right.
Select and Place:
Which is a valid IPv6 Link Local address?
AFF00::1
B224.0.0.5::1
CFE80::1
DFE70::1
E169.254.0.0/16
DRAG DROP -
Drag the methods from the left and drop them on the best descriptions on the right.
Select and Place:
DRAG DROP -
Drag the IPv4 leading address bits on the left and drop them on the correct type of IPv4 addresses on the right. Not all options on the left are used.
Select and Place:
What is the size difference in bits between an IPv4 address and an IPv6 address?
A128
B100
C98
D96
E32
Given the subnet of 209.165.201.0/27, which subnet range will make the most efficient use of the address block for connecting to customer edge devices?
A209.165.201.1/32
B209.165.201.1/31
C209.165.201.1/30
D209.165.201.1/29
E209.165.201.1/24
DRAG DROP -
Drag the IPv6 address type from the left and drop it on the matching description on the right. Not all IPv6 address types are used.
Select and Place:
Given a ring topology, which loop prevention mechanism provides the fastest reconvergence time after a link failure?
ARapid Per-VLAN Spanning Tree Protocol
BResilient Ethernet Protocol
CMultiple Spanning Tree Protocol
DSpanning Tree Protocol
Refer to the exhibit.
Given the Class C IP network of 192.168.1.0, using VLSM, which five subnets meet the requirements in the exhibit? (Choose five.)
A192.168.1.0/27
B192.168.1.32/27
C192.168.1.48/27
D192.168.1.48/28
E192.168.1.64/28
F192.168.1.80/28
Which three of the following components must be elected before the Spanning Tree Protocol can converge in a switched LAN? (Choose three.)
ADesignated ports
BAlternate ports
CConverged ports
DRoot bridge
ERoot ports
FBackup ports
Which three statements about the ARP function are true? (Choose three.)
AARP is used to determine an IP address.
BAn ARP request is broadcast at Layer 3.
CAn ARP response is broadcast at Layer 2.
DARP tables are maintained on Layer 3 devices.
EThe destination MAC address of an ARP request is that of the ARP responder.