Skip to main content

Posts

Showing posts with the label CCNA4

CCNA Exploration 4 Chapter 6 Exam Answers

1. Refer to the exhibit. A VPN tunnel has been established between the HQ Office and the Branch Office over the public Internet. Which three mechanisms are required by the devices on each end of the VPN tunnel to protect the data from being intercepted and modified? (Choose three.) The devices must use a dedicated Layer 2 connection. The devices must have the VPN client software installed. The two parties must inspect the traffic against the same ACLs. The two parties must establish a secret key used by encryption and hash algorithms. The two parties must agree on the encryption algorithm to be used over the VPN tunnel. The devices must be authenticated before the communication path is considered secure. 2. Refer to the exhibit. All users have a legitimate purpose and the necessary permissions to access the Corporate network. Based on the topology shown, which locations are able to establish VPN connectivity with the Corporate network? Locations C, D, and E can support VPN connectivity

CCNA 4 Final Exam V4.0 2010

1 . What functionality do access control lists provide in the implementation of dynamic NAT on a Cisco router? define which addresses can be translated define which addresses are assigned to a NAT pool define which addresses are allowed out the router define which addresses can be accessed from the inside network 2 . Which three guidelines would help contribute to creating a strong password policy? (Choose three.) Once a good password is created, do not change it. Deliberately misspell words when creating passwords. Create passwords that are at least 8 characters in length. Use combinations of upper case, lower case, and special characters. Write passwords in locations that can be easily retrieved to avoid being locked out. Use long words found in the dictionary to make passwords that are easy to remember. 3 . Refer to the exhibit. Every time the administrator reboots this router, the boot process ends in setup mode. What is a possible problem? There is insufficient RAM for the IOS t

CCNA 4 Chapter 8

1 . What combination of IP address and wildcard mask should be used to specify only the last 8 addresses in the subnet 192.168.3.32/28? 192.168.3.32 0.0.0.7 192.168.3.32 0.0.0.15 192.168.3.40 0.0.0.7 192.168.3.40 0.0.0.15 2 . Excessive broadcasts are generally a symptom of a problem at which layer? physical data link network transport 3 . Refer to the exhibit. Which three pieces of information can be determined by analyzing the output shown? (Choose three.) A carrier detect signal is present. Keepalives are being received successfully. Default encapsulation is used on this serial link. Packets passing this interface cannot exceed 1 KB in size. The reliability of this link is very low. The LCP negotiation phase is complete. 4 . A network administrator has received complaints that users on a local LAN can retrieve e-mail from a remote e-mail server but are unable to open web pages on the same server. Services at which two layers of the OSI model should be investigated during the t

CCNA4 Final 2010

1 Which encapsulation protocol when deployed on a Cisco router over a serial interface is only compatible with another Cisco router? PPP SLIP HDLC Frame Relay 2 What is a characteristic feature of a worm? exploits a known vulnerability attaches to executable programs masquerades as a legitmate program lies dormant until triggered by an event, time, or date 3 An administrator is configuring a dual stack router with IPv6 and IPv4 using RIPng. The administrator receives an error message when trying to enter the IPv4 routes into RIPng. What is the cause of the problem? When IPv4 and IPv6 are configured on the same interface, all IPv4 addresses are over-written in favor of the newer technology. Incorrect IPv4 addresses are entered on the router