Skip to main content

Posts

Showing posts with the label CCNA4

All Answer CCNA1, CCNA2, CCNA3, CCNA4, CCNA Final

http://www.4shared.com/file/138281712/49a03690/CCNA1_chapter_1.html http://www.4shared.com/file/138281721/fb8434e9/CCNA1_chapter_2_v1.html http://www.4shared.com/file/138281726/65e0a14a/CCNA1_chapter_2_v2.html http://www.4shared.com/file/138281738/9b43bd0c/CCNA1_chapter_3_v1.html http://www.4shared.com/file/138281742/34d7c2d5/CCNA1_chapter_3_v2.html http://www.4shared.com/file/138281754/c4af56a1/CCNA1_chapter_4_v1.html http://www.4shared.com/file/138281759/ba1e2a1c/CCNA1_chapter_4_v2.html http://www.4shared.com/file/138281768/e6344949/CCNA1_chapter_5_v1.html http://www.4shared.com/file/138281770/f1f4f03a/CCNA1_chapter_5_v2.html http://www.4shared.com/file/138281777/6f906599/CCNA1_chapter_6_v1.html http://www.4shared.com/file/138281780/766cecf5/CCNA1_chapter_6_v2.html http://www.4shared.com/file/138281789/fb05451/CCNA1_chapter_7_v1.html http://www.4shared.com/file/138281792/8179bc98/CCNA1_chapter_7_v2.html http://www.4shared.com/file/138281802/5be740ec/CCNA1_chapter_8_v1.html http://www

CCNA4 chapter 1

This is version CCNA Semester 4 chapter 1 hope they can help you get 100/100. good luck! You can download here Version1

CCNA4: Final Exam

Review Notes, v. 3.1 1.1.1 Private addressing 1.1.2 Major NAT and PAT features Dynamic NAT is designed to map a private IP address to a public address. Any IP address from a pool of public IP addresses is assigned to a network host. Overloading, or Port Address Translation (PAT), maps multiple private IP addresses to a single public IP address. Multiple addresses can be mapped to a single address because each private address is tracked by a port number. 1.1.3 Configuring NAT and PAT The access list must permit only those addresses that are to be translated. Remember that there is an implicit “deny all” at the end of each access list. 1.1.4 Configuring DHCP - Typically, a DHCP server will be configured to assign much more than an IP address. Other IP configuration values such as the default gateway can be set from the DHCP configuration mode. Using the default-router command sets the default gateway. - A default router must be defined for clients 2.1.1 WAN devices - For digital lines, a

CCNA 4 Final

1. A network administrator is asked to design a system to allow simultaneous access to the Internet for 250 users. The ISP for this network can only supply five public IPs. What can be used to accomplish this task? routable translation dynamic translation static translation • port address translation 2. The LAN attached to the Ethernet interface of the Raleigh router shown in the graphic is addressed with private IP addresses. If one public IP is assigned to the company, which commands could be used in a configuration that allows all devices with private IPs in this network to access the Internet? (Choose two.) • ip nat inside source list 1 interface serial0 overload ip nat outside source list 1 interface serial0 overload ip nat inside serial0 • ip nat inside source list 1 pool Raleigh overload ip nat inside Raleigh overload ip inside nat source list 1 interface serial0 Raleigh 3. The command output shown in the graphic was taken from a Cisco 806 broadband router. Which kind of address

CCNA 4 Final New version

1. Identify the factors that contribute to congestion on an Ethernet LAN. (Choose three.) • improper placement of enterprise level servers • addition of hosts to a physical segment replacement of hubs with workgroup switches • increasing use of bandwidth intensive network applications migration to full-duplex Ethernet within the LAN 2. Which of the following are examples of TCP/IP application layer protocols? (Choose three.) • a terminal emulation protocol that supports remote console connections with various network devices a protocol created by IBM that makes it easier for mainframes to connect to remote offices • a protocol responsible for transporting electronic mail on TCP/IP networks and the Internet a protocol that controls the rate at which data is sent to another computer • a protocol that exchanges network management information between a network device and a management console 3. Which of the following eliminates switching loops? hold-down timers poison reverse • spanning tr

CCNA v4 - E4 - Module 6 (100%)

1. Which two Layer 1 requirements are outlined in the Data-over-Cable Service Interface Specification (DOCSIS)? (Choose two.)   channel widths   modulation techniques 2. Which is an example of symmetric-key encryption?   pre-shared key 3. Which two statements are valid solutions for a cable ISP to reduce congestion for users? (Choose two.)   allocate an additional channel   subdivide the network to reduce users on each segment 4. While monitoring traffic on a cable network, a technician notes that data is being transmitted at 38 MHz. Which statement describes the situation observed by the technician?   Data is being transmitted from the subscriber to the headend. 5. After conducting research to learn about common remote connection options for teleworkers, a network administrator has decided to implement remote access over broadband to establish VPN connections over the public Internet. What is the result of this solution?   The connection has increased security and reliable connectivit

CCNA v4 - E4 - Module 5 (100%)

1. Refer to the exhibit. What will be the effect of the configuration that is shown?   Users attempting to access hosts in the 192.168.30.0/24 network will be required to telnet to R3. 2. Which three parameters can ACLs use to filter traffic? (Choose three.)   protocol suite   source address   destination address 3. Refer to the exhibit. How does this access list process a packet with the source address 10.1.1.1 and a destination of 192.168.10.13?   It is dropped because it does not match any of the items in the ACL. 4 .Which two statements are correct about extended ACLs? (Choose two)   Extended ACLs evaluate the source and destination addresses.   Port numbers can be used to add greater definition to an ACL. 5. Where should a standard access control list be placed?   close to the destination 6. Which three statements describe ACL processing of packets? (Choose three.)   An implicit deny any rejects any packet that does not match any ACL statement.   A packet can either be rejected or

CCNA v4 - E4 - Module 4 (100%)

1. What is the best defense for protecting a network from phishing exploits?   Schedule training for all users. 2. What are three characteristics of a good security policy? (Choose three.)   It defines acceptable and unacceptable use of network resources.   It communicates consensus and defines roles.   It defines how to handle security incidents. 3. The Cisco IOS image naming convention allows identification of different versions and capabilities of the IOS. What information can be gained from the filename c2600-d-mz.121-4? (Choose two.)   The software is version 12.1, 4th revision.   The IOS is for the Cisco 2600 series hardware platform. 4. Refer to the exhibit. What is accomplished when both commands are configured on the router?   The commands disable the services such as echo, discard, and chargen on the router to prevent security vulnerabilities. 5. Which two conditions should the network administrator verify before attempting to upgrade a Cisco IOS image using a TFTP server? (C

CCNA v4 - E4 - Module 7 (100%) -> latest

http://p4s-ccna.blogspot.com http://testccna-4u.blogspot.com 1. Refer to the exhibit. IPv6 address 2006:1::1/64 eui-64 has been configured on the router FastEthernet0/0 interface. Which statement accurately describes the EUI-64 identifier configuration? The configuration will derive the interface portion of the IPv6 address from the MAC address of the interface. 2. Refer to the exhibit. Which address or addresses represent the inside global address? 209.165.20.25 3. Your organization is issued the IPv6 prefix of 2001:0000:130F::/48 by your service provider. With this prefix, how many bits are available for your organization to create subnetworks? 16 4. What are two benefits of NAT? (Choose two.) It saves public IP addresses. It adds a degree of privacy and security to a network . 5. What is true regarding the differences between NAT and PAT? PAT uses unique source port numbers to distinguish between translations. http://p4s-ccna.blogspot.com http://testccna-4u.blogspot.com

CCNA v4 - E4 - Module 6 (100%)

http://p4s-ccna.blogspot.com http://testccna-4u.blogspot.com 1. Which two Layer 1 requirements are outlined in the Data-over-Cable Service Interface Specification (DOCSIS)? (Choose two.) channel widths modulation techniques 2. Which is an example of symmetric-key encryption? pre-shared key 3. Which two statements are valid solutions for a cable ISP to reduce congestion for users? (Choose two.) allocate an additional channel subdivide the network to reduce users on each segment 4. While monitoring traffic on a cable network, a technician notes that data is being transmitted at 38 MHz. Which statement describes the situation observed by the technician? Data is being transmitted from the subscriber to the headend. 5. After conducting research to learn about common remote connection options for teleworkers, a network administrator has decided to implement remote access over broadband to establish VPN connections over the public Internet. What is the result of this solution? The conn

CCNA v4 - E4 - Module 5 (100%)

http://p4s-ccna.blogspot.com http://testccna-4u.blogspot.com 1. Refer to the exhibit. What will be the effect of the configuration that is shown?    Users attempting to access hosts in the 192.168.30.0/24 network will be required to telnet to R3. 2. Which three parameters can ACLs use to filter traffic? (Choose three.)    protocol suite    source address    destination address 3. Refer to the exhibit. How does this access list process a packet with the source address 10.1.1.1 and a destination of 192.168.10.13?    It is dropped because it does not match any of the items in the ACL. 4 .Which two statements are correct about extended ACLs? (Choose two)    Extended ACLs evaluate the source and destination addresses.    Port numbers can be used to add greater definition to an ACL. http://p4s-ccna.blogspot.com http://testccna-4u.blogspot.com 5. Where should a standard access control list be placed?    close to the destination 6. Which three statements describe ACL processing of packets? (Ch

CCNA v4 - E4 - Module 4 (100%)

http://p4s-ccna.blogspot.com http://testccna-4u.blogspot.com 1. What is the best defense for protecting a network from phishing exploits?    Schedule training for all users. 2. What are three characteristics of a good security policy? (Choose three.)    It defines acceptable and unacceptable use of network resources.    It communicates consensus and defines roles.    It defines how to handle security incidents. 3. The Cisco IOS image naming convention allows identification of different versions and capabilities of the IOS. What information can be gained from the filename c2600-d-mz.121-4? (Choose two.)    The software is version 12.1, 4th revision.    The IOS is for the Cisco 2600 series hardware platform. 4. Refer to the exhibit. What is accomplished when both commands are configured on the router?    The commands disable the services such as echo, discard, and chargen on the router to prevent security vulnerabilities. 5. Which two conditions should the network administrator verify

CCNA v4 - E4 - Module 1 (100%)

 http://p4s-ccna.blogspot.com      http://testccna-4u.blogspot.com 1. Which statement about WAN protocols is correct?    Most WAN protocols use HDLC or a variant of HDLC as a framing mechanism. 2. Which statement is true of the functionality of the layers in the hierarchical network model?    The distribution layer aggregates WAN connections at the edge of the campus. 3. Which WAN technology uses a fixed payload of 48 bytes and is transported across both switched and permanent virtual circuits?    ATM 4. A U.S. company requires a WAN connection used only to transfer sales data from individual stores to the home office. All transfers will occur after business hours. The required bandwidth for this connection is estimated to be less than 38 kbps. Which type of connection requires the least investment for this company?    analog dialup 5. What is an advantage of packet-switched technology over circuit-switched technology?    Packet-switched networks can efficiently use multiple routes ins