Download New Updated (Spring 2015) Cisco 100-101 Actual Tests 81-90




Drag and Drop



Correct Answer:





The following commands are entered on the router:


Burbank(config)# enable secret fortress

Burbank(config)# line con 0

Burbank(config-line)# login

Burbank(config-line)# password n0way1n

Burbank(config-line)# exit

Burbank(config)# service password-encryption


What is the purpose of the last command entered?


A.      to require the user to enter an encrypted password during the login process

B.      to prevent the vty, console, and enable passwords from being displayed in plain text in the configuration files

C.      to encrypt the enable secret password

D.      to provide login encryption services between hosts attached to the router


Correct Answer: B





What is the effect of using the service password-encryption command?


A.      Only the enable password will be encrypted.

B.      Only the enable secret password will be encrypted.

C.      Only passwords configured after the command has been entered will be encrypted.

D.      It will encrypt the secret password and remove the enable secret password from the


E.       It will encrypt all current and future passwords.


Correct Answer: E




An administrator has connected devices to a switch and, for security reasons, wants the

dynamically learned MAC addresses from the address table added to the running configuration.

What must be done to accomplish this?


A.      Enable port security and use the keyword sticky.

B.      Set the switchport mode to trunk and save the running configuration.

C.      Use the switchport protected command to have the MAC addresses added to the


D.      Use the no switchport port-security command to allow MAC addresses to be added to the



Correct Answer: A




A company has placed a networked PC in a lobby so guests can have access to the corporate directory. A security concern is that someone will disconnect the directory PC and re-connect their laptop computer and have access to the corporate network. For the port servicing the lobby, which three configuration steps should be performed on the switch to prevent this? (Choose three.)


A.      Enable port security.

B.      Create the port as a trunk port.

C.      Create the port as an access port.

D.      Create the port as a protected port.

E.       Set the port security aging time to 0.

F.       Statically assign the MAC address to the address table.

G.      Configure the switch to discover new MAC addresses after a set time of inactivity.


Correct Answer: ACF




Why would a network administrator configure port security on a switch?


A.      to prevent unauthorized Telnet access to a switch port

B.      to prevent unauthorized hosts from accessing the LAN

C.      to limit the number of Layer 2 broadcasts on a particular switch port

D.      block unauthorized access to the switch management interfaces


Correct Answer: B




How can you ensure that only the MAC address of a server is allowed by switch port Fa0/1?


A.      Configure port Fa0/1 to accept connections only from the static IP address of the server.

B.      Configure the server MAC address as a static entry of port security.

C.      Use a proprietary connector type on Fa0/1 that is incomputable with other host connectors.

D.      Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.


Correct Answer: B




Refer to the exhibit. An administrator cannot connect from R1 to R2. To troubleshoot this problem, the administrator has entered the command shown in the exhibit. Based on the output shown, what could be the problem?




A.      The serial interface is configured for half duplex.

B.      The serial interface does not have a cable attached.

C.      The serial interface has the wrong type of cable attached.

D.      The serial interface is configured for the wrong frame size.

E.       The serial interface has a full buffer.


Correct Answer: C






Refer to the exhibit. A TFTP server has recently been installed in the Atlanta office. The network administrator is located in the NY office and has made a console connection to the NY router. After establishing the connection they are unable to backup the configuration file and IOS of the NY router to the TFTP server. What is the cause of this problem?




A.      The NY router has an incorrect subnet mask.

B.      The TFTP server has an incorrect IP address.

C.      The TFTP server has an incorrect subnet mask.

D.      The network administrator computer has an incorrect IP address.


Correct Answer: C




If a host experiences intermittent issues that relate to congestion within a network while

remaining connected, what could cause congestion on this LAN?


A.      half-duplex operation

B.      broadcast storms

C.      network segmentation

D.      multicasting


Correct Answer: B


Free VCE & PDF File for Cisco 100-101 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …