Skip to main content

Posts

Showing posts with the label CCNA4 Chapter 6

CCNA Exploration 4 Chapter 6 Exam Answers

1. Refer to the exhibit. A VPN tunnel has been established between the HQ Office and the Branch Office over the public Internet. Which three mechanisms are required by the devices on each end of the VPN tunnel to protect the data from being intercepted and modified? (Choose three.) The devices must use a dedicated Layer 2 connection. The devices must have the VPN client software installed. The two parties must inspect the traffic against the same ACLs. The two parties must establish a secret key used by encryption and hash algorithms. The two parties must agree on the encryption algorithm to be used over the VPN tunnel. The devices must be authenticated before the communication path is considered secure. 2. Refer to the exhibit. All users have a legitimate purpose and the necessary permissions to access the Corporate network. Based on the topology shown, which locations are able to establish VPN connectivity with the Corporate network? Locations C, D, and E can support VPN connectivity

CCNA v4 - E4 - Module 6 (100%)

1. Which two Layer 1 requirements are outlined in the Data-over-Cable Service Interface Specification (DOCSIS)? (Choose two.)   channel widths   modulation techniques 2. Which is an example of symmetric-key encryption?   pre-shared key 3. Which two statements are valid solutions for a cable ISP to reduce congestion for users? (Choose two.)   allocate an additional channel   subdivide the network to reduce users on each segment 4. While monitoring traffic on a cable network, a technician notes that data is being transmitted at 38 MHz. Which statement describes the situation observed by the technician?   Data is being transmitted from the subscriber to the headend. 5. After conducting research to learn about common remote connection options for teleworkers, a network administrator has decided to implement remote access over broadband to establish VPN connections over the public Internet. What is the result of this solution?   The connection has increased security and reliable connectivit

CCNA v4 - E4 - Module 6 (100%)

http://p4s-ccna.blogspot.com http://testccna-4u.blogspot.com 1. Which two Layer 1 requirements are outlined in the Data-over-Cable Service Interface Specification (DOCSIS)? (Choose two.) channel widths modulation techniques 2. Which is an example of symmetric-key encryption? pre-shared key 3. Which two statements are valid solutions for a cable ISP to reduce congestion for users? (Choose two.) allocate an additional channel subdivide the network to reduce users on each segment 4. While monitoring traffic on a cable network, a technician notes that data is being transmitted at 38 MHz. Which statement describes the situation observed by the technician? Data is being transmitted from the subscriber to the headend. 5. After conducting research to learn about common remote connection options for teleworkers, a network administrator has decided to implement remote access over broadband to establish VPN connections over the public Internet. What is the result of this solution? The conn