tough and challenge questions from a cisco exam.need help. thankyou very much

Discussion in 'Cisco' started by 8221129, Apr 1, 2006.

  1. 8221129


    Apr 1, 2006
    Likes Received:
    1. Scenario: You have to connect Dell PowerEdge 2850 server to Cisco
    Catalyst 2950-24 switch.
    · Question: What would your port(s) configuration be to ensure maximum
    network throughput ?

    2. Scenario: You have 2 Cisco catalyst 4509 switches in your branch,
    connected to each other using Gig port on Sup Module. VLAN 1 is you
    primary VLAN for users. See below for the configuration of the VLAN on
    both switches.
    4509-1 config:
    interface Vlan1
    ip address
    no ip redirects
    standby 1 ip
    standby 1 priority 105
    standby 1 preempt

    4509-2 config:
    interface Vlan1
    ip address
    no ip redirects
    standby 1 ip
    standby 1 priority 100

    · Question: Which switch should be the root device for Spanning tree ?
    Answer: Based on the HSRP configuration, 4509-1 will be the root device
    for spanning tree.

    3. Scenario: 2 branch offices connected through managed private LAN,
    routers R1 and R4 belongs to you, routers R2 and R3 are managed routers
    and you have no control over it. You want to run OSPF as a routing
    protocol across those 2 branches.

    · Question: How you can achieve this.

    4. Scenario: Small branch office has Cisco Catalyst 2950G-24 switch and
    Cisco 1841 router with 2 Fast Ethernet interfaces. Fa0/0 connected to
    Private line pointed to headoffice, Fa0/1 connected to switch. Internal
    network in the office - You have to create separate
    network in this office for test equipment (i.e, devices on
    this network should be able to connect to your headoffice network and
    to old branch network (

    · Question: How you can do this ?

    5. Scenario: Small branch office has own Internet connection terminated
    on Cisco PIX 501, (see configuration below). Your office has a site to
    site VPN connection to the headoffice.

    interface ethernet0 10baset
    interface ethernet1 100full
    nameif ethernet0 outside security0
    nameif ethernet1 inside security100
    enable password <skipped> encrypted
    passwd <skipped> encrypted
    hostname ScarPix
    fixup protocol dns maximum-length 512
    fixup protocol ftp 21
    fixup protocol h323 h225 1720
    fixup protocol h323 ras 1718-1719
    fixup protocol http 80
    fixup protocol ils 389
    fixup protocol rsh 514
    fixup protocol rtsp 554
    fixup protocol sip 5060
    fixup protocol sip udp 5060
    fixup protocol skinny 2000
    fixup protocol smtp 25
    fixup protocol sqlnet 1521
    fixup protocol tftp 69
    name TCA-Main
    name Lang
    access-list in_out_nat0_acl permit ip
    access-list in_out_nat0_acl permit ip
    access-list out_crypto_20 permit ip Lang
    access-list out_crypto_20 permit ip
    pager lines 24
    logging on
    mtu outside 1500
    mtu inside 1500
    ip address outside pppoe setroute
    ip address inside
    ip audit info action alarm
    ip audit attack action alarm
    pdm history enable
    arp timeout 14400
    nat (inside) 0 access-list in_out_nat0_acl
    timeout xlate 3:00:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225
    timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
    timeout uauth 0:05:00 absolute
    aaa-server TACACS+ protocol tacacs+
    aaa-server RADIUS protocol radius
    aaa-server LOCAL protocol local
    aaa authentication telnet console LOCAL
    aaa authentication ssh console LOCAL
    http server enable
    http inside
    no snmp-server location
    no snmp-server contact
    snmp-server community public
    no snmp-server enable traps
    floodguard enable
    sysopt connection permit-ipsec
    crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
    crypto map out_map 20 ipsec-isakmp
    crypto map out_map 20 match address out_crypto_20
    crypto map out_map 20 set peer
    crypto map out_map 20 set transform-set ESP-3DES-SHA
    crypto map out_map interface outside
    isakmp enable outside
    isakmp key ******** address netmask
    no-xauth no-config-mode
    isakmp policy 20 authentication pre-share
    isakmp policy 20 encryption 3des
    isakmp policy 20 hash sha
    isakmp policy 20 group 2
    isakmp policy 20 lifetime 86400
    telnet timeout 5
    ssh outside
    ssh timeout 5
    console timeout 0
    vpdn group Bell request dialout pppoe
    vpdn group Bell localname <skipped>
    vpdn username <skipped> password *********
    dhcpd address inside
    dhcpd wins
    dhcpd lease 3600
    dhcpd ping_timeout 750
    dhcpd domain
    dhcpd auto_config outside
    username <skipped> password <skipped> encrypted privilege 15
    terminal width 80
    : end

    · Question: Can they use own internet connection for internet access
    and if not, what you would change in config to allow this.
    PIX Version 6.3(3)

    6. Scenario: Small office has Internet Connection terminated on Cisco
    PIX firewall all local computers connected to Cisco Catalyst 2950
    switch. You need to create additional subnet on internal branch
    network, this new subnet must have Internet access and ability to talk
    to existing internal subnet.
    · Question: How you can achive this if:
    a) You have Cisco PIX 501
    b) You have Cisco PIX 506
    c) You have Cisco PIX 515 with 2 Ethernet interfaces
    d) You have Cisco PIX 515 with 3 Ethernet interfaces
    8221129, Apr 1, 2006
    1. Advertisements

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments (here). After that, you can post your question and our members will help you out.