Skip to main content

Posts

Showing posts from July 23, 2009

CCNA v4 - E4 - Module 6 (100%)

1. Which two Layer 1 requirements are outlined in the Data-over-Cable Service Interface Specification (DOCSIS)? (Choose two.)   channel widths   modulation techniques 2. Which is an example of symmetric-key encryption?   pre-shared key 3. Which two statements are valid solutions for a cable ISP to reduce congestion for users? (Choose two.)   allocate an additional channel   subdivide the network to reduce users on each segment 4. While monitoring traffic on a cable network, a technician notes that data is being transmitted at 38 MHz. Which statement describes the situation observed by the technician?   Data is being transmitted from the subscriber to the headend. 5. After conducting research to learn about common remote connection options for teleworkers, a network administrator has decided to implement remote access over broadband to establish VPN connections over the public Internet. What is the result of this solution?   The connection has increased security and reliable connectivit

CCNA v4 - E4 - Module 5 (100%)

1. Refer to the exhibit. What will be the effect of the configuration that is shown?   Users attempting to access hosts in the 192.168.30.0/24 network will be required to telnet to R3. 2. Which three parameters can ACLs use to filter traffic? (Choose three.)   protocol suite   source address   destination address 3. Refer to the exhibit. How does this access list process a packet with the source address 10.1.1.1 and a destination of 192.168.10.13?   It is dropped because it does not match any of the items in the ACL. 4 .Which two statements are correct about extended ACLs? (Choose two)   Extended ACLs evaluate the source and destination addresses.   Port numbers can be used to add greater definition to an ACL. 5. Where should a standard access control list be placed?   close to the destination 6. Which three statements describe ACL processing of packets? (Choose three.)   An implicit deny any rejects any packet that does not match any ACL statement.   A packet can either be rejected or

CCNA v4 - E4 - Module 4 (100%)

1. What is the best defense for protecting a network from phishing exploits?   Schedule training for all users. 2. What are three characteristics of a good security policy? (Choose three.)   It defines acceptable and unacceptable use of network resources.   It communicates consensus and defines roles.   It defines how to handle security incidents. 3. The Cisco IOS image naming convention allows identification of different versions and capabilities of the IOS. What information can be gained from the filename c2600-d-mz.121-4? (Choose two.)   The software is version 12.1, 4th revision.   The IOS is for the Cisco 2600 series hardware platform. 4. Refer to the exhibit. What is accomplished when both commands are configured on the router?   The commands disable the services such as echo, discard, and chargen on the router to prevent security vulnerabilities. 5. Which two conditions should the network administrator verify before attempting to upgrade a Cisco IOS image using a TFTP server? (C

CCNA 2 FINAL (Latest version 100/100)

1 Refer to the exhibit. Two routers are unable to establish an adjacency. What is the possible cause for this? The two routers are connected on a multiaccess network. (true answer)  The hello and dead intervals are different on the two routers. They have different OSPF router IDs. They have different process IDs. 2 What is the function of the OSPF LSR packet? It is used to confirm the receipt of LSUs. It is used to establish and maintain adjacency with other OSPF routers. (true answer)  It is used by the receiving routers to request more information about any entry in the DBD. It is used to check the database synchronization between routers. 3 Refer to the exhibit. The hosts that are connected to R2 are unable to ping the hosts that are connected to R1. How can this problem be resolved? Configure the router ID on both routers. (true answer)  Configure the R2 router interfaces for area 0. Configure a loopback interface on both routers. Configure the proper subnet masks on the router int