CH 9

Is this your test? Login to manage it. If not, you can develop an exam just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Refer to the exhibit. Based on the debug aaa authentication and debug tacacs outputs, which statement is true?
2.
1 point
What is the first step in troubleshooting connectivity issues in a secured network environment?
3.
1 point
Refer to the exhibit. The network administrator has decided to create an IPsec tunnel between the HQ and BRANCH routers. What two changes must be made to the existing ACL in order to allow the formation of the tunnel? (Choose two.)
4.
1 point
Refer to the exhibit. Router R1 no longer receives routing updates from other EIGRP neighbors. Based on the output in the exhibit, what could be the cause of this problem?
5.
1 point
Which technology prevents CPU overloading of infrastructure devices?
6.
1 point
Refer to the exhibit. Which statement about the debug radius authentication
output is correct?
7.
1 point
Refer to the exhibit. Based on the provided debug aaa authorization and debug tacacs command output, which statement is true?
8.
1 point
Refer to the exhibit. A network administrator issued the show ip inspect sessions command on R1 to investigate the status of the firewall. What two facts can be determined from the output? (Choose two.)
9.
1 point
Which three control plane protocols influence the data structures used by the data plane to forward unicast packets in the core network? (Choose three.)
10.
1 point
Refer to the exhibit. A network administrator is attempting to connect a branch office to headquarters through a VPN tunnel. The tunnel is reported as being active at both ends, but the 10.2.2.0/24 network is not appearing in the routing table at the branch end. The administrator has determined that the problem is with the branch office configuration. Based on the output as shown, why is the 10.2.2.0/24 network not appearing in the routing table?
11.
1 point
When audit trails are enabled with the ip inspect audit-trail command, which messages will appear in the syslog? (di ko sure 'to walang sagot hehe)
12.
1 point
What would be the outcome of the no service password-recovery command enabled on the router?
13.
1 point
Refer to the exhibit. A legitimate user experienced a problem while attempting to gain access to the router EXEC shell. To investigate the situation, a network administrator issued debug tacacs and debug aaa authentication commands on the router. Based on the provided output, what could be the problem?
14.
1 point
What is considered a control plane issue?
15.
1 point
Which two security features could be implemented in the network control plane? (Choose two.)
16.
1 point
Which two features should be enabled to secure DHCP and ARP? (Choose two.)
17.
1 point
A network administrator has received a report from a user about being unable to access the server that houses employee records. The server is on a restricted VLAN and the user workstation is not assigned to this VLAN. What step should the administrator take next?
18.
1 point
Refer to the exhibit. An administrator has implemented a stateful IOS firewall configuration that allows internal users access to Internet websites. However, users have reported that they cannot do so. Based on the configuration in the exhibit, what change should be made to allow the firewall to function as planned?
19.
1 point
Refer to the exhibit. A network technician has just configured router East to establish a tunnel to router West. After the configuration is applied, tunnel 1 is flapping. What needs to be done to stop this flapping?
20.
1 point
Refer to the exhibit. What is the expected behavior of the configured firewall when internal hosts attempt to access web sites on the Internet?