Cisco Systems 2 Network Router User Manual


 
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 147 -
B. Permit all packets matching the last of the destination address and accept all source address.
C. Permit all packets from the third subnet of the network address to all destinations.
D. Permit all packets matching the host bits in the source address to all destinations.
E. Permit all packets to destination matching the first three octets in the destination address..
Answer: A
Q. 242
Which of the following should be done prior to backing up an IOS image to a network server? (Choose
three.)
A. Make sure that the network server can be accessed.
B. Check that the authentication for access is set.
C. Assure that the network server adequate space for the code image.
D. Verify any file naming and path requirements.
E. Make sure that the server can load and run the bootstrap code.
Answer: A, C, D
Q. 243
A network administrator is verifying the configuration of a newly installed host by establishing an ftp
connection to a remote server.
Which layer of the protocol stack is the network administrator using for this operation?
A. application
B. presentation
C. session
D. transport
E. data link
F. internet
Answer: A