Sponsor

CCNA1 R&S ITN v5.0 Final Exam Skill Assessment – CLI command answers

Thứ Năm, 20 tháng 2, 2014

CCNA1 v5.0 NB_ITN Practice Skills Assessment – PT - CLI Command Answers

UPDATED 29 Ago. 2014

Download File .PKA
You will practice and be assessed on the following skills:
  • Configuration of initial IOS device settings
  • Design and calculation of IPv4 addressing
  • Configuration of IOS device interfaces including IPv4 and IPv6 addressing when appropriate
  • Addressing of network hosts with IPv4 and IPv6 addresses
  • Enhancing device security, including configuration of the secure transport protocol for remote device configuration
  • Configuration of a switch management interface
Requirements by device:
  • Town Hall router:
  • Configuration of initial router settings
  • Interface configuration and IPv4 and IPv6 addressing
  • Device security enhancement or “device hardening”
  • Secure transport for remote configuration connections as covered in the labs.
  • Backup of the configuration file to a TFTP server
  • Administration Switch:
  • Enabling basic remote management by Telnet
  • PC and Server hosts:
  • IPv4 full addressing
  • IPv6 addressing
CCNA 1 ITN Skill Exam PT 2014

DeviceInterfaceIPv4 AddressSubnet MaskIPv4 Default GatewayIPv6 AddressIPv6 Default Gateway
Town HallG0/0192.168.1.126255.255.255.2242001:DB8:ACAD:A::1/64N/A
G0/1192.168.1.158255.255.255.2402001:DB8:ACAD:B::1/64N/A
Administration SwitchVlan 1N/AN/A
Reception HostNIC192.168.1.97255.255.255.224192.168.1.1262001:DB8:ACAD:A::FFFE80::1
Operator HostNIC192.168.1.98255.255.255.224192.168.1.1262001:DB8:ACAD:A::15FE80::1
IT HostNIC192.168.1.145255.255.255.240192.168.1.1582001:DB8:ACAD:B::FFFE80::1
TFTP ServerNIC192.168.1.146255.255.255.240192.168.1.1582001:DB8:ACAD:B::15FE80::1

Step 1:

Design an IPv4 addressing scheme and complete the Addressing Table based on the following requirements. Use the table above to help you organize your work.
a. Subnet the 192.168.1.0/24 network to provide 30 host addresses per subnet while wasting the fewest addresses.
b. Assign the fourth subnet to the IT Department LAN.
c. Assign the last network host address (the highest) in this subnet to the G0/0 interface on Town Hall.
d. Starting with the fifth subnet, subnet the network again so that the new subnets will provide 14 host addresses per subnet while wasting the fewest addresses.
e. Assign the second of these new 14-host subnets to the Administration LAN.
f. Assign the last network host address (the highest) in the Administration LAN subnet to the G0/1 interface of the Town Hall router.
g. Assign the second to the last address (the second highest) in this subnet to the VLAN 1 interface of the Administration Switch.
h. Configure addresses on the hosts using any of the remaining addresses in their respective subnets.

Step 2: Configure the Town Hall Router.

a. Configure the Town Hall router with all initial configurations that you have learned in the course so far:
· Configure the router hostname: Middle
· Protect device configurations from unauthorized access with the encrypted password.
· Secure all of the ways to access the router using methods covered in the course and labs.
· Newly-entered passwords must have a minimum length of 10 characters.
· Prevent all passwords from being viewed in clear text in device configuration files.
· Configure the router to only accept in-band management connections over the protocol that is more secure than Telnet, as was done in the labs. Use the value 1024 for encryption key strength.
· Configure user authentication for in-band management connections.
b. Configure the two Gigabit Ethernet interfaces using the IPv4 addressing values you calculated and the IPv6 values provided in the addressing table.
· Reconfigure the link local addresses as was practiced in the labs. The IPv6 link-local Interface ID should match the IPv6 unicast Interface ID as is practiced in the labs.
· Document the interfaces in the configuration file.

Step 3: Configure the Administration Switch.

Configure Administration Switch for remote management.

Step 4: Configure and Verify Host Addressing.

a. Use the IPv4 addressing from Step 1 and the IPv6 addressing values provided in the addressing table to configure all host PCs with the correct addressing.
b. Use the router interface link-local addresses as the IPv6 default gateways on the hosts.
c. All hosts should be able to ping each other over IPv4.

Step 5: Backup the Configuration of the Town Hall Router to TFTP.

a. Complete the configuration of the TFTP server using the IPv4 addressing values from Step 1 and the values in the addressing table.
b. Backup the running configuration of Town Hall to the TFTP Server. Use the default file name.

Answer

Router>
Router>enable
Router#configure terminal
Router(config)#interface g0/0
Router(config-if)#ip address 192.168.1.126 255.255.255.224
Router(config-if)#description IT Department LAN
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface g0/1
Router(config-if)#ip address 192.168.1.158 255.255.255.240
Router(config-if)#description Administration LAN
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#ipv6 unicast-routing
Router(config)#interface g0/0
Router(config-if)#ipv6 address 2001:db8:acad:A::1/64
Router(config-if)#ipv6 address FE80::1 link-local
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface g0/1
Router(config-if)#ipv6 address 2001:db8:acad:B::1/64
Router(config-if)#ipv6 address FE80::1 link-local
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#
Router(config)#hostname Middle
Middle(config)#Enable secret class12345
Middle(config)#line console 0
Middle(config-line)#password ccna5.net2014
Middle(config-line)#login
Middle(config-line)#exit
Middle(config)#line vty 0 15
Middle(config-line)#password ccna5.net2014
Middle(config-line)#login
Middle(config-line)#exit
Middle(config)#line aux 0
Middle(config-line)#password ccna5.net2014
Middle(config-line)#login
Middle(config-line)#exit
Middle(config)#
Middle(config)#Banner motd “Authorized Access Only”
Middle(config)#security password min-length 10
Middle(config)#service password-encryption
Middle(config)#ip domain-name ccna5.net
Middle(config)#username cisco secret ccna5.net2014
Middle(config)#crypto key generate rsa
The name for the keys will be: Middle.cisco.local
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.
How many bits in the modulus [512]: 1024
% Generating 1024 bit RSA keys, keys will be non-exportable…[OK]
Middle(config)#line vty 0 15
Middle(config-line)#login local
Middle(config-line)#transport input ssh
Middle(config-line)#exit
Middle(config)#
Middle# copy running-config startup-config
—————————————–
Administration Switch
ip default-gateway 192.168.1.158
—————————————–
Reception Host
IPv4
IP address: 192.168.1.97
Mask: 255.255.255.224
default gateway: 192.168.1.126
IPv6
IPv6 address: 2001:DB8:ACAD:A::FF/64
default gateway: FE80::1
—————————————–
Operator Host
IPv4
IP address: 192.168.1.98
Mask: 255.255.255.224
default gateway: 192.168.1.126
IPv6
IPv6 address:  2001:DB8:ACAD:A::15/64
default gateway: FE80::1
—————————————–
IT Host
IPv4
IP address: 192.168.1.145
Mask: 255.255.255.240
default gateway:  192.168.1.158
IPv6
IPv6 address: 2001:DB8:ACAD:B::FF/64
default gateway: FE80::1
—————————————–
SERVER TFTP
IPv4
IP address: 192.168.1.146
Mask: 255.255.255.240
default gateway: 192.168.1.158
IPv6
IPv6 address: 2001:DB8:ACAD:B::15/64
default gateway: FE80::1
—————————————–
Backup the Configuration of the Town Hall Router to TFTP.
Middle#copy running-config tftp
Address or name of remote host []? 192.168.1.146
Destination filename [Router-confg]? [Press Enter]
—————————————–

Read more ...

CCNA 1 R&S ITN v5.0 Chapter 6 Skill Assessment – Packet Tracer

Thứ Năm, 20 tháng 2, 2014

CCNA 1 R&S ITN v5.0 Chapter 6 Skill Assessment – Packet Tracer

Subscribe Youtube Channel Download File .PKZ
ccna-1-chapter-6-skill-assessment

Science Router Configuration

Science>enable
Science#configure terminal
Science(config)#enable secret cisco
Science(config)#line console 0
Science(config-line)#password cisco
Science(config-line)#login
Science(config-line)#exit
Science(config)#line vty 0 4
Science(config-line)#password cisco
Science(config-line)#login
Science(config-line)#exit
Science(config)#line aux 0
Science(config-line)#password cisco
Science(config-line)#login
Science(config-line)#exit
Science(config)#service password-encryption
Science(config)#banner motd “Authorized Personnel Only”
Science(config)#interface g0/0
Science(config-if)#ip address 172.16.5.1 255.255.255.0
Science(config-if)#no shutdown
Science(config-if)#description Bio LAN
Science(config-if)#exit
Science(config)#interface g0/1
Science(config-if)#ip address 192.168.5.1 255.255.255.0
Science(config-if)#no shutdown
Science(config-if)#description Phys LAN
Science(config-if)#end
Science#write
Building configuration…
[OK]

Bio Switch Configuration

Switch>enable
Switch#configure terminal
Switch(config)#hostname Bio
Bio(config)#enable secret class
Bio(config)#line console 0
Bio(config-line)#password cisco
Bio(config-line)#login
Bio(config-line)#exit
Bio(config)#line vty 0 4
Bio(config-line)#password cisco
Bio(config-line)#login
Bio(config-line)#exit
Bio(config)#service password-encryption
Bio(config)#banner motd “Authorized Personnel Only”
Bio(config)#interface vlan 1
Bio(config-if)#ip address 172.16.5.2 255.255.255.0
Bio(config-if)#no shutdown
Bio(config-if)#description Bio – Science LAN
Bio(config-if)#exit
Bio(config)#ip default-gateway 172.16.5.1
Bio(config)#end
Bio#write
Building configuration…
[OK]

Phys Switch Configuration

Switch>enable
Switch#configure terminal
Switch(config)#hostname Phys
Phys(config)#enable secret class
Phys(config)#line console 0
Phys(config-line)#password cisco
Phys(config-line)#login
Phys(config-line)#exit
Phys(config)#line vty 0 4
Phys(config-line)#password cisco
Phys(config-line)#login
Phys(config-line)#exit
Phys(config)#service password-encryption
Phys(config)#banner motd “Authorized Personnel Only”
Phys(config)#interface vlan 1
Phys(config-if)#ip address 192.168.5.252 255.255.255.0
Phys(config-if)#no shutdown
Phys(config-if)#description Phys – Science LAN
Phys(config-if)#exit
Phys(config)#ip default-gateway 192.168.5.1
Phys(config)#end
Phys#write
Building configuration…
[OK]

Bio 1

172.16.5.10
255.255.255.0
172.16.5.1

Bio 2

172.16.5.11
255.255.255.0
172.16.5.1

Phys 1

192.168.5.10
255.255.255.0
192.168.5.1

Phys 2

192.168.5.11
255.255.255.0
192.168.5.1
Read more ...

CCNA 1 R&S ITN v5.0 Pretest Exam Answers 2014

Thứ Năm, 20 tháng 2, 2014

CCNA 1 R&S ITN v5.0 Pretest Exam Answers 2014

1


The failure rate in a certain brand of network interface card has been determined to be 15%. How many cards could be expected to fail in a company that has 80 of the cards installed?
10
12*
15
8

If a technician uses an average of 2 cans of compressed air per week for cleaning, how many cans should be ordered for 8 technicians over the next 10 weeks?
16
20
200
80
160*

A local real estate company can have its 25 computer systems upgraded for $1000. If the company chooses only to upgrade 10 systems, how much will the upgrade cost if the same rate is used?
$100
$200
$400*
$600
$500

Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.
11100111*
11100101
11101110
11110110
11011011
11110010

Which is a characteristic of the Internet?
It is not centrally governed.*
It is localized to specific geographic locations.
It uses only physical addresses.
It uses private IP addressing.

Which command can be used to test connectivity between two computers that are attached to a network?
nbtstst -s
ifconfig
winipcfg
ping*
ipconfig

Which two devices provide permanent data storage? (Choose two.)
hard drive*
keyboard
Blu-Ray disc*
RAM
monitor
9
10 
Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list below.
A1
BA*
85
B3
1C
90
11 
What is a function of the BIOS?
provides graphic capabilities for games and applications
provides temporary data storage for the CPU
enables a computer to connect to a network
performs a power-on self test of internal components*
12 
A person-hour is the amount of work that the average worker can do in one hour. It is anticipated that a company-wide system upgrade will take approximately 60 person-hours to complete. How long will it take five technicians to perform the refresh?
8 hours
10 hours
5 hours
12 hours*
13
14
15
16 
A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement?
MAN
WAN*
WLAN
LAN
17 
Which subnet would include the address 192.168.1.96 as a usable host address?
192.168.1.64/29
192.168.1.64/26*
192.168.1.32/28
192.168.1.32/27
18 
What is the purpose of having a converged network?
to achieve fault tolerance and high availability of data network infrastructure devices
to reduce the cost of deploying and maintaining the communication infrastructure*
to provide high speed connectivity to all end devices
to make sure that all types of data packets will be treated equally
19 
A user is having problems accessing the Internet. The command ping www.cisco.com fails. However, pinging the IP address of cisco.com with the command ping 198.133.219.25 is successful. What is the problem?
The default gateway is incorrect.
There is a problem with DNS.*
The address of the ARP cache is incorrect.
The web server is down.
20

Refer to the exhibit. Host_A is preparing to send data to Server_B. How will Host_A address the packets and frames that will carry this data? (Choose two.)
The packet destination will be addressed with the IP address of the Router_B interface that is attached to Router_A.
The frame destination will be addressed with the MAC address of Server_B.
The packet destination will be addressed with the IP address of Server_B.*
The frame destination will be addressed with the MAC address of Switch_A.
The packet destination will be addressed with the IP address of the Router_A LAN interface.
The frame destination will be addressed with the MAC address of the Router_A LAN interface.*
21 
Which three IP addresses are private ? (Choose three.)
10.1.1.1*
224.6.6.6
172.32.5.2
172.16.4.4*
192.167.10.10
192.168.5.5*
22 
What is the general term that is used to describe a piece of data at any layer of a networking model?
segment
frame
protocol data unit*
packet
23 
Which function is provided by TCP?
detection of missing packets*
path determination for data packets
communication session control
data encapsulation
24 
Which option shows the proper notation for an IPv6 address?
2001.0db8.3c55.0015.abcd.ff13
2001-0db8-3c55-0015-abcd-ff13
2001,0db8,3c55,0015,abcd,ff13
2001:0db8:3c55:0015::abcd:ff13*
25

Refer to the exhibit.
Using the network in the exhibit, what would be the default gateway address for host A in the 192.133.219.0 network?
192.133.219.1*
192.133.219.0
192.135.250.1
192.31.7.1
26 
Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address?
NAT*
DHCP
SMB
HTTP
ARP
DNS
27 
A technician uses the ping 127.0.0.1 command. What is the technician testing?
the TCP/IP stack on a network host*
connectivity between two adjacent Cisco devices
connectivity between two PCs on the same network
physical connectivity of a particular PC and the network
connectivity between a PC and the default gateway
28 
What is the purpose of ICMP messages?
to ensure the delivery of an IP packet
to inform routers about network topology changes
to provide feedback of IP packet transmissions*
to monitor the process of a domain name to IP address resolution
29 
Which basic process is used to select the best path for forwarding data?
encapsulation
addressing
routing*
switching
30 
Which wireless security procedure should be used to hide the WLAN ID from wireless clients?
Configure WEP only on the access point.
Configure MAC address filtering on the access point.
Decrease the antenna spectrum on each wireless client.
Install WAP on the wireless clients.
Disable the broadcast of the SSID on the access point.*
31 
What statement describes the function of the Address Resolution Protocol?
ARP is used to discover the MAC address of any host on the local network.*
ARP is used to discover the IP address of any host on the local network.
ARP is used to discover the IP address of any host on a different network.
ARP is used to discover the MAC address of any host on a different network.
32 
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
dial-up
cell modem
satellite
DSL*
cable modem
33 
What is an advantage of using IPv6 ?
higher bandwidth
more addresses for networks and hosts*
more frequencies
faster connectivity
34 
Which device should be used for enabling a host to communicate with another host on a different network?
router*
hub
switch
host
35 
What is the purpose of the routing process?
to encapsulate data that is used to communicate across a network
to select the paths that are used to direct traffic to destination networks*
to convert a URL name into an IP address
to provide secure Internet file transfer
to forward traffic on the basis of MAC addresses
36 
Which type of connector does a network interface card use?
DIN
RJ-11
RJ-45*
PS-2
37 
Why would a network administrator use the tracert utility?
to display the IP address, default gateway, and DNS server address for a PC
to check information about a DNS name in the DNS server
to determine the active TCP connections on a PC
to identify where a packet was lost or delayed on a network*
38 
How does a networked server manage requests from multiple clients for different services?
The server uses IP addresses to identify different services.
Each request is tracked through the physical address of the client.
The server sends all requests through a default gateway.
Each request is assigned source and destination port numbers.*
39 
Which protocol translates a website name such as www.cisco.com into a network address?
FTP
DHCP
HTTP
DNS*
40

Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of the default gateway address?
It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.*
It is the IP address of Switch1 that connects PC1 to other devices on the same LAN.
It is the IP address of the Router1 interface that connects the company to the Internet.
It is the IP address of the ISP network device located in the cloud.
Read more ...

CCNA 1 R&S ITN Chapter 11 v5.0 Exam Answers 2014

Thứ Năm, 20 tháng 2, 2014

CCNA 1 R&S ITN Chapter 11 v5.0 Exam Answers 2014


1 Which two statements about a service set identifier (SSID) are true? (Choose two.)
responsible for determining the signal strength
used to encrypt data sent across the wireless network
all wireless devices on the same WLAN must have the same SSID
consists of a 32-character string and is not case sensitive
tells a wireless device to which WLAN it belongs
2 Which type of network attack involves the disabling or corruption of networks, systems, or services?
access attacks
denial of service attacks
reconnaissance attacks
malicious code attacks
3 Which command will backup the configuration that is stored in NVRAM to a TFTP server?
copy tftp running-config
copy startup-config tftp
copy running-config tftp
copy tftp startup-config
4  Open the PT Activity. 
How long will a user be blocked if the user exceeds the maximum allowed number of unsuccessful login attempts?
3 minutes
1 minute
4 minutes
2 minutes
5 Fill in the blank. Do not use abbreviations.
The ”   show version      ” command that is issued on a router is used to verify the value of the software configuration register.
6 What is a security feature of using NAT on a network?
denies all packets that originate from private IP addresses
allows internal IP addresses to be concealed from external users
denies all internal hosts from communicating outside their own network
allows external IP addresses to be concealed from internal users
7 A network administrator has determined that various computers on the network are infected with a worm. Which sequence of steps should be followed to mitigate the worm attack?
containment, quarantine, treatment, and inoculation
treatment, quarantine, inoculation, and containment
inoculation, containment, quarantine, and treatment
containment, inoculation, quarantine, and treatment
8 Which WLAN security protocol generates a new dynamic key each time a client establishes a connection with the AP?
PSK
WPA
EAP
WEP
9 Refer to the exhibit. Baseline documentation for a small company had ping round trip time statistics of 36/97/132 between hosts H1 and H3. Today the network administrator checked connectivity by pinging between hosts H1 and H3 that resulted in a round trip time of 1458/2390/6066. What does this indicate to the network administrator?
Something is causing interference between H1 and R1.
H3 is not connected properly to the network.
Performance between the networks is within expected parameters.
Connectivity between H1 and H3 is fine.
Something is causing a time delay between the networks.
10 When should an administrator establish a network baseline?
when the traffic is at peak in the network
when there is a sudden drop in traffic
at the lowest point of traffic in the network
at regular intervals over a period of time
11 A ping fails when performed from router R1 to directly connected router R2. The network administrator then proceeds to issue the show cdp neighbors command. Why would the network administrator issue this command if the ping failed between the two routers?
The network administrator wants to verify the IP address configured on router R2.
The network administrator suspects a virus because the ping command did not work.
The network administrator wants to determine if connectivity can be established from a non-directly connected network.
The network administrator wants to verify Layer 2 connectivity.
12 Which statement is true about CDP on a Cisco device?
To disable CDP globally, the no cdp enable command in interface configuration mode must be used.
The show cdp neighbor detail command will reveal the IP address of a neighbor only if there is Layer 3 connectivity.
CDP can be disabled globally or on a specific interface.
Because it runs at the data link layer, the CDP protocol can only be implemented in switches.
13 What is the purpose of issuing the commands cd nvram: then dir at the privilege exec mode of a router?
to list the content of the NVRAM
to clear the content of the NVRAM
to copy the directories from the NVRAM
to direct all new files to the NVRAM
14 A network administrator checks the security log and notices there was unauthorized access to an internal file server over the weekend. Upon further investigation of the file system log, the administrator notices several important documents were copied to a host located outside of the company. What kind of threat is represented in this scenario?
identify theft
data loss
information theft
disruption of service
15 If a configuration file is saved to a USB flash drive attached to a router, what must be done by the network administrator before the file can be used on the router?
Edit the configuration file with a text editor.
Use the dir command from the router to remove the windows automatic alphabetization of the files on the flash drive.
Convert the file system from FAT32 to FAT16.
Change the permission on the file from ro to rw.
16 Which network design consideration would be more important to a large corporation than to a small business?
Internet router
redundancy
firewall
low port density switch
17 Which protocol supports rapid delivery of streaming media?
TCP
RTP
SNMP
PoE
18 Refer to the exhibit. An administrator is trying to troubleshoot connectivity between PC1 and PC2 and uses the tracert command from PC1 to do it. Based on the displayed output, where should the administrator begin troubleshooting?
SW2
R1
R2
PC2
SW1
19 Which two statements characterize wireless network security? (Choose two.)
Wireless networks offer the same security features as wired networks.
An attacker needs physical access to at least one network device to launch an attack
Using the default IP address on an access point makes hacking easier.
Some RF channels provide automatic encryption of wireless data.
With SSID broadcast disabled, an attacker must know the SSID to connect.
20 Which two actions can be taken to prevent a successful attack on an email server account? (Choose two.)
Never send the password through the network in a clear text.
Never use passwords that need the Shift key.
Never allow physical access to the server console.
Limit the number of unsuccessful attempts to log in to the server.
Only permit authorized access to the server room.
21 How should traffic flow be captured in order to best understand traffic patterns in a network?
when it is from a subset of users
during low utilization times
when it is on the main network segment only
during peak utilization times
22 What do WLANs that conform to IEEE 802.11 standards allow wireless user to do?
use wireless mice and keyboards
create a one-to-many local network using infrared technology
use cell phones to access remote services over very large areas
connect wireless hosts to hosts or services on a wired Ethernet network
23 Fill in the blank.
”   VoIP   “ defines the protocols and technologies that implement the transmission of voice data over an IP network.
24 Fill in the blank. Do not use abbreviations.
The show    ”  file systems ”    command provides information about the amount of available and free flash memory and its permissions for reading or writing data.
Read more ...

Advertisment