| ]

Question 1

Drag and drop the Cisco IOS commands that would be used to configure the dialer interface portion of a PPPoE client implementation where the client is facing the internet and private IP addressing is used on the internal network.

InterfaceDialer0_drag_drop.jpg

Answer:

InterfaceDialer0_answer.jpg

1) ip mtu 1492
2) dialer pool 1
3) ip nat outside
4) encapsulation PPP
5) ip address negotiated

Explanation:

The dialer interface indicates how to handle traffic from the clients. For example, default routing information, the encapsulation protocol, the dialer pool to use. Notice that we have to use the "ip nat outside", not "ip nat inside" because the dialer 0 interface is the logical interface connecting to the Internet.

InterfaceDialer0_nat_inside_outside.jpg

For other commands (ip mtu 1492,dialer pool 1, encapsulation PPP and IP address negotiated) please read PPPoE Lab Sim

Question 2

Drag and drop the Cisco IOS commands that would be used to configure the physical interface portion of a PPPoE client configuration.

physicalInterfacePPPoE.jpg

Answer:

physicalInterfacePPPoE_answer.jpg

1) no ip address
2) pppoe enable
3) pppoe-client dialer-pool-number 1

Explanation:

This portion of the configuration enables the PPPoE functionality on the interface as well as assigning it to a dialer pool. This configuration element is required when using PPPoE over an Ethernet interface. Interface Ethernet 0/1 is bound to the logical dialer interface and an ATM permanent virtual circuit (PVC) is automatically provisioned across it.

NOTE: As of Cisco IOS Software Release 12.2(13)T and later, the PPPoE client functionality was separated from the VPDN functionality, resulting in changes to the PPPoE client configuration. The configuration examples in this chapter are post-12.2(13)T examples.

(Reference: ISCW - Offical Exam Certification Guide)

Question 3

Drag the correct statements about MPLS-based VPN on the left to the boxes on the right (Not all statements will be used)

MPLS-based-VPN.jpg

Answer:

MPLS-based-VPN_answer.jpg

1) The VPN routers are contained in the IPv4 routing tables of the PE routers
2) RT are attributes attached to VPNv4 BGP routes to indicate their VPN memberships
3) RD are attributes attached to VPNv4 BGP routes to allow overlapping VPN address spaces

Question 4

Drag and drop the steps in the process for provisioning a cable modem to connect to a headend on the above to the below in the order defined by the DOCSIS standard.

CableModem_DOCSIS.jpg

Answer:

CableModem_answer.jpg

Explanation:

1) Scan and lock the downstream frequency: At power-on, the cable modem scans and locks the downstream path for the allocated RF data channel in order for physical and data link layers to be established.

2) Obtain upstream parameters: The cable modem listens to the management messages arriving via the downstream path. These include information regarding how and when to communicate in the upstream path. These are used to establish the upstream physical and data link layers.

3) Establish Layer 1 and 2 communications: Connection established from Cable modem (CM) to Cable modem termination system (CMTS) to build physical and data link layers.

4) Acquire IP configuration parameters via DHCP: After Layer 1 and 2 are established, Layer 3 can be allocated as well. This is done by the DHCP server.

5) Register and ensure QoS settings with the CMTS: The CM negotiates traffic types and QoS settings with the CMTS.

6) IP network initialization: Once Layers 1, 2, and 3 are established and the configuration file is pulled from the TFTP server, the CM provides routing
services for hosts on the subscriber side of the CM. It also performs some Network Address Translation (NAT) functions so that multiple hosts might
be represented by a single public IP address.

(Reference: ISCW - Offical Exam Certification Guide)

Question 5

Drag the IPsec protocol description from the above to the correct protocol type on the below (Not all descriptions will be used)

IPSec_Protocol.jpg

Answer:

IPSec_Protocol_answer.jpg

1) AH: Provides a framework for authenticating and securing data.
2) ESP: Provides a framework for encrypting, authenticating and securing data.
3) IKE: Provides a framework for the negotiation on security parameters and establishes authenticated keys.

Question 6

Drag and drop each management protocol on the above to the correct category on the below

ManagementProtocol.jpg

Answer:

ManagementProtocol_answer.jpg

Secure:

1) SSH
2) SSL
3) IPSec
4) SNMPv3

Unsecure:

1) NTP
2) Telnet
3) Syslog
4) SNMPv2

Question 7

Drag and drop each function on the above to the hybrid fiber-coaxial architecture component that it describes on the below.

fiber-coaxial_architecture.jpg

Answer:

fiber-coaxial_architecture_answer.jpg

Question 8

Drag the DSL technologies on the left to their maximum(down/up) data rate values on the below.

DSL_Technologies.jpg

Answer:

DSL_Technologies_answer.jpg

Question 9

Drag the DSL local loop topic on the left to the correct descriptions on the right.

DSL_LocalLoop.jpg

Answer:

DSL_LocalLoop_answer.jpg

1) wire gauge
2) signal attenuation
3) crosstalk
4) bridge tap
5) load coil