Showing posts with label CCNA 4. Show all posts
Showing posts with label CCNA 4. Show all posts

Thursday, February 6, 2014

CCNA 4 Chapter 1 -2014

1. Which statement is true about the differences between a WAN and a LAN?
A WAN often relies on the services of carriers, such as telephone or cable companies, but a LAN does not.

2. A U.S. company requires a WAN connection used only to transfer sales data from individual stores to the home office. All transfers will occur after business hours. The required bandwidth for this connection is estimated to be less than 38 kbps. Which type of connection requires the least investment for this company?
analog dialup

3. What are two advantages of an analog PSTN WAN connection? (Choose two.)
low cost
availability

4. Which WAN technology uses a fixed payload of 48 bytes and is transported across both switched and permanent virtual circuits?
ATM

Tuesday, February 4, 2014

CCNA 4 Chapter 2 -2014

1. Refer to the exhibit. Router R1, the DCE device, has just been configured for PPP encapsulation with authentication. What series of commands will allow another router, the DTE device, to communicate over its serial 0/0/0 interface to router R1?
Router(config)# hostname R3
R3(config)# username R1 password Cisco
R3(config)# interface Serial 0/0/0
R3(config-if)# encapsulation ppp
R3(config-if)# ip address 172.16.3.3 255.255.255.0
R3(config-if)# ppp authentication chap

2. Which serial communications DTE/DCE interface standard is used to provide high-speed connectivity of up to 52 Mbps between LANs and is found on many high-end Cisco routers?
EIA/TIA-612/613 (HSSI)

3. Which three statements are true regarding LCP? (Choose three.)
It is responsible for negotiating link establishment.
It terminates the link upon user request or the expiration of an inactivity timer.
It can test the link to determine if link quality is sufficient to bring up the link.

4. Refer to the exhibit. On the basis of the show interface Serial0/0 output, how many NCP sessions have been established?
Two

Monday, February 3, 2014

CCNA 4 Chapter 3 -2014

1. Which three actions might a Frame Relay switch perform when it detects an excessive build-up of frames in its queue? (Choose three.)
Drops frames from the queue that have the DE bit set
Sets the FECN bit on all frames it receives on the congested link
Sets the BECN bit on all frames it places on the congested link

2. Which best describes the benefit of using Frame Relay as opposed to a leased line or ISDN service?
Customers only pay for the local loop and the bandwidth they purchase from the network provider.

3. Refer to the exhibit. Router R1 has been configured for Frame Relay connectivity to routers R2 and R3. What configuration option should be configured on the R2 and R3 serial interfaces in order for all routers to ping each other successfully?
R2(config-if)# frame-relay map ip 10.1.1.1 201 broadcast
R2(config-if)# frame-relay map ip 10.1.1.3 201 broadcast
R3(config-if)# frame-relay map ip 10.1.1.1 301 broadcast
R3(config-if)# frame-relay map ip 10.1.1.2 301 broadcast

4. Which two items allow the router to map data link layer addresses to network layer addresses in a Frame Relay network? (Choose two.)
Inverse ARP
LMI status messages

Sunday, February 2, 2014

CCNA 4 Chapter 4 -2014

1. Which two statements are true regarding network security? (Choose two.)
Both experienced hackers who are capable of writing their own exploit code and inexperienced individuals who download exploits from the Internet pose a serious threat to network security.
Protecting network devices from physical damage caused by water or electricity is a necessary part of the security policy.

2. Which two statements are true about network attacks? (Choose two.)
A brute-force attack searches to try every possible password from a combination of characters.
Devices in the DMZ should not be fully trusted by internal devices, and communication between the DMZ and internal devices should be authenticated to prevent attacks such as port redirection.

3. Users are unable to access a company server. The system logs show that the server is operating slowly because it is receiving a high level of fake requests for service. Which type of attack is occurring?
DoS

4. Refer to the exhibit. What is the purpose of the "ip ospf message-digest-key 1 md5 cisco" statement in the configuration?
to specify a key that is used to authenticate routing updates

CCNA 4 Chapter 5 -2014

1. The following commands were entered on a router:
Router(config)# access-list 2 deny 172.16.5.24
Router(config)# access-list 2 permit any
The ACL is correctly applied to an interface. What can be concluded about this set of commands?
The wildcard mask 0.0.0.0 is assumed.

2. Interface s0/0/0 already has an IP ACL applied inbound. What happens when the network administrator attempts to apply a second inbound IP ACL?
The second ACL is applied to the interface, replacing the first.

3. Which two statements are correct about extended ACLs? (Choose two)
Extended ACLs evaluate the source and destination addresses.
Port numbers can be used to add greater definition to an ACL.

4. Which benefit does an extended ACL offer over a standard ACL?
In addition to the source address, an extended ACL can also filter on destination address, destination port, and source port.

Saturday, February 1, 2014

CCNA 4 Chapter 6 -2014

1. Which two protocols can be used to encapsulate traffic that is traversing a VPN tunnel? (Choose two.)
IPSec
PPTP

2. What are the three main functions of a secure VPN? (Choose three.)
Authentication
Data confidentiality
Data integrity

3. Data confidentiality through a VPN can be enhanced through the use of which three encryption protocols? (Choose three.)
AES
DES
RSA

4. While monitoring traffic on a cable network, a technician notes that data is being transmitted at 38 MHz. Which statement describes the situation observed by the technician?
Data is being transmitted from the subscriber to the headend.

Thursday, January 30, 2014

CCNA 4 Chapter 7 -2014

1. Refer to the exhibit. Traffic exiting R1 is failing translation. What part of the configuration is most likely incorrect?
Access-list statement

2. Refer to the exhibit. What is the purpose of the command marked with an arrow shown in the partial configuration output of a Cisco broadband router?
defines which addresses can be translated

3. How many bits of an IPv6 address are used to identify the interface ID?
64

4. Refer to the exhibit. How many IPv6 broadcast domains exist in this topology?
0

Tuesday, January 28, 2014

CCNA 4 Chapter 8 -2014

1. What combination of IP address and wildcard mask should be used to specify only the last 8 addresses in the subnet 192.168.3.32/28?
192.168.3.40 0.0.0.7

2. Excessive broadcasts are generally a symptom of a problem at which layer?
Data link

3. Refer to the exhibit. Which three pieces of information can be determined by analyzing the output shown? (Choose three.)
A carrier detect signal is present.
Keepalives are being received successfully.
The LCP negotiation phase is complete.

4. A network administrator has received complaints that users on a local LAN can retrieve e-mail from a remote e-mail server but are unable to open web pages on the same server. Services at which two layers of the OSI model should be investigated during the troubleshooting process? (Choose two.)
Transport layer
Application layer

Thursday, January 23, 2014

CCNA 4 Final Exam Answers -2014

1. What functionality do access control lists provide in the implementation of dynamic NAT on a Cisco router?
define which addresses can be translated

2. Which three guidelines would help contribute to creating a strong password policy? (Choose three.)
Deliberately misspell words when creating passwords.
Create passwords that are at least 8 characters in length.
Use combinations of upper case, lower case, and special characters.

3. Refer to the exhibit. Every time the administrator reboots this router, the boot process ends in setup mode. What is a possible problem?
The configuration register is set to ignore the startup configuration.

4. Which option correctly defines the capacity through the local loop guaranteed to a customer by the service provider?
CIR