Skip to main content

Posts

CCNA 1 Final Exam 640 - 802

This Test is 85% Correct 1. A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC? --> Use the ping 127.0.0.1 command at the command prompt. 2. Refer to the exhibit. Which set of devices contains only intermediary devices? --> A, B, D, G 3. Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame? --> only computer D 4. Which password is automatically encrypted when it is created? --> enable secret 5. Which three statements characterize the transport layer protocols? (Choose three.) --> TCP and UDP port numbers are used by application layer protocols. --> TCP uses windowing and sequencing to provide reliable transfer of data. --> TCP is a connection-oriented protocol. UDP is a connectionless protocol. 6. Which type of media is immune to EMI and RFI?

CCNA1 FINAL 100%

Update today 1 A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC? Use the ipconfig /all command at the host�s command prompt. X Use the ping 127.0.0.1 command at the command prompt. Use the traceroute command at the command prompt to identify any failures on the path to the gateway. Use FTP to check for connectivity to remote sites. Download a troubleshooting tool from the PC manufacturer's website. 2 Refer to the exhibit. Which set of devices contains only intermediary devices? X A, B, D, G A, B, E, F C, D, G, I G, H, I, J 3 Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame? X only computer D only computer A and computer D only computer B, computer C, and computer D all computers 4 Which password is automatically encrypted when it is created? vt

Lab 2, Modelling the CCNA Topology

This lab will teach you how to model the CCNA lab topology in a WAN scale. Skills Required This lab assumes that you have already completed lab 1. The CCNA Lab Topology This is the topology used in the CCNA practical labs. Study the diagram to see the construct of this topology. Creating the Project Create a new project named ‘CCNA_Lab’ call the scenario ‘baseline’ . In the start-up wizard when choosing the network scale select the ‘choose from maps’ option and click ‘next’ . From the list of maps offered choose the ‘UK’ map and click ‘next’ . When selecting technologies for the project choose the Sm_Int_Model_List, ‘ethernet’ and ‘ethernet_advanced’ model groups and continue through the wizard until the project screen ope

PacketTrap Ping Scan 1.1.3301

PacketTrap Ping Scan is a FREE utility that sends ICMP ECHO requests across a network and rapidly builds a spreadsheet of responding nodes. DNS lookup information may optionally be provided by Ping Scan for each responding address. Follow the link and free download PacketTrap Ping Scan now. Download link 1: Download now Download link 2: Download now

CCNA4 Module 7(90,5%)

1 Why is it important to record baseline measurements of a prototype network? Test results show security weaknesses after the baseline tests are run. The baseline is the point at which the network is operating at its fullest potential. Baseline measurements define a point at which network traffic has exceeded the designed capabilities of the network. Test results are compared to the baseline to see how the test conditions increase processor use or decrease available bandwidth.***** 2 Refer to the exhibit. During prototype testing, verification of VLAN connectivity is being performed. Based on the information shown, what command produced the output? show spanning-tree show interfaces trunk******** show cdp neighbors show interfaces show ip interface brief 3 How do designers decide which network functions need to be included in the prototype test? They select the functions that align with the business goals.****** They select the functions that occur at the network core. They select the

CCNA4 Module 9 (77%)

CCNA Discovery 4 Module 9 Scored 77% 1 Upon completion of a proposal, a network design team must sell their ideas to two key stakeholders. Who are these two stakeholders? (Choose two.) Customers*** licensing boards cabling contractors*** internal management project implementation team 2 NetworkingCompany completes the installation of a network upgrade for a retail customer. All of the onsite tests complete successfully and the customer IT staff approves the results of the tests. The manager of the retail store contacts NetworkingCompany to inform the company that the store will not pay for the upgrade until a recently purchased software package is installed and tested on the network. Which two items that are contained in the proposal can the account manager refer to when discussing this issue with the store manager? (Choose two.) the project scope*** the bill-of-material the project timeline*** the terms and conditions the business goals of the customer the evaluation of the current ne

CCNA 3:Module 1

Options With Highlight Colours are Correct Answer 1. A network technician is asked to examine an existing switched network. Following this examination, the technician makes recommendations for adding new switches where needed and replacing existing equipment that hampers performance. The technician is given a budget and asked to proceed. Which two pieces of information would be helpful in determining necessary port density for new switches? (Choose two.) forwarding rate traffic flow analysis expected future growth number of required core connections number of hubs that are needed in the access layer to increase performance 2. Configuring communication between devices on different VLANs requires the use of which layer of the OSI model? Layer 1 Layer 3 Layer 4 Layer 5 3. What is the likely impact of moving a conventional company architecture to a completely converged network? Local analog phone service can be completely outsourced to cost-effective providers. The Ethernet VLAN structur