Question 1
Drag and drop the Cisco IOS commands that would be used to configure the dialer interface portion of a PPPoE client implementation where the client is facing the internet and private IP addressing is used on the internal network.
Answer:
1) ip mtu 1492
2) dialer pool 1
3) ip nat outside
4) encapsulation PPP
5) ip address negotiated
Explanation:
The dialer interface indicates how to handle traffic from the clients. For example, default routing information, the encapsulation protocol, the dialer pool to use. Notice that we have to use the "ip nat outside", not "ip nat inside" because the dialer 0 interface is the logical interface connecting to the Internet.
For other commands (ip mtu 1492,dialer pool 1, encapsulation PPP and IP address negotiated) please read PPPoE Lab Sim
Question 2
Drag and drop the Cisco IOS commands that would be used to configure the physical interface portion of a PPPoE client configuration.
Answer:
1) no ip address
2) pppoe enable
3) pppoe-client dialer-pool-number 1
Explanation:
This portion of the configuration enables the PPPoE functionality on the interface as well as assigning it to a dialer pool. This configuration element is required when using PPPoE over an Ethernet interface. Interface Ethernet 0/1 is bound to the logical dialer interface and an ATM permanent virtual circuit (PVC) is automatically provisioned across it.
NOTE: As of Cisco IOS Software Release 12.2(13)T and later, the PPPoE client functionality was separated from the VPDN functionality, resulting in changes to the PPPoE client configuration. The configuration examples in this chapter are post-12.2(13)T examples.
(Reference: ISCW - Offical Exam Certification Guide)
Question 3
Drag the correct statements about MPLS-based VPN on the left to the boxes on the right (Not all statements will be used)
Answer:
1) The VPN routers are contained in the IPv4 routing tables of the PE routers
2) RT are attributes attached to VPNv4 BGP routes to indicate their VPN memberships
3) RD are attributes attached to VPNv4 BGP routes to allow overlapping VPN address spaces
Question 4
Drag and drop the steps in the process for provisioning a cable modem to connect to a headend on the above to the below in the order defined by the DOCSIS standard.
Answer:
Explanation:
1) Scan and lock the downstream frequency: At power-on, the cable modem scans and locks the downstream path for the allocated RF data channel in order for physical and data link layers to be established.
2) Obtain upstream parameters: The cable modem listens to the management messages arriving via the downstream path. These include information regarding how and when to communicate in the upstream path. These are used to establish the upstream physical and data link layers.
3) Establish Layer 1 and 2 communications: Connection established from Cable modem (CM) to Cable modem termination system (CMTS) to build physical and data link layers.
4) Acquire IP configuration parameters via DHCP: After Layer 1 and 2 are established, Layer 3 can be allocated as well. This is done by the DHCP server.
5) Register and ensure QoS settings with the CMTS: The CM negotiates traffic types and QoS settings with the CMTS.
6) IP network initialization: Once Layers 1, 2, and 3 are established and the configuration file is pulled from the TFTP server, the CM provides routing
services for hosts on the subscriber side of the CM. It also performs some Network Address Translation (NAT) functions so that multiple hosts might
be represented by a single public IP address.
(Reference: ISCW - Offical Exam Certification Guide)
Question 5
Drag the IPsec protocol description from the above to the correct protocol type on the below (Not all descriptions will be used)
Answer:
1) AH: Provides a framework for authenticating and securing data.
2) ESP: Provides a framework for encrypting, authenticating and securing data.
3) IKE: Provides a framework for the negotiation on security parameters and establishes authenticated keys.
Question 6
Drag and drop each management protocol on the above to the correct category on the below
Answer:
Secure:
1) SSH
2) SSL
3) IPSec
4) SNMPv3
Unsecure:
1) NTP
2) Telnet
3) Syslog
4) SNMPv2
Question 7
Drag and drop each function on the above to the hybrid fiber-coaxial architecture component that it describes on the below.
Answer:
Question 8
Drag the DSL technologies on the left to their maximum(down/up) data rate values on the below.
Answer:
Question 9
Drag the DSL local loop topic on the left to the correct descriptions on the right.
Answer:
1) wire gauge
2) signal attenuation
3) crosstalk
4) bridge tap
5) load coil