Skip to main content

Posts

CCNA v4 - E4 - Module 4 (100%)

http://p4s-ccna.blogspot.com http://testccna-4u.blogspot.com 1. What is the best defense for protecting a network from phishing exploits?    Schedule training for all users. 2. What are three characteristics of a good security policy? (Choose three.)    It defines acceptable and unacceptable use of network resources.    It communicates consensus and defines roles.    It defines how to handle security incidents. 3. The Cisco IOS image naming convention allows identification of different versions and capabilities of the IOS. What information can be gained from the filename c2600-d-mz.121-4? (Choose two.)    The software is version 12.1, 4th revision.    The IOS is for the Cisco 2600 series hardware platform. 4. Refer to the exhibit. What is accomplished when both commands are configured on the router?    The commands disable the services such as echo, discard, and chargen on the router to prevent security vulnerabilities. 5. Which two conditions should the network administrator verify

NEW CCNA3 FINAL

http://p4s-ccna.blogspot.com http://testccna-4u.blogspot.com 1. Refer to the exhibit. An administrator documented the output of a CAM table from an Ethernet switch as shown. What action will the switch take when it receives the frame shown at the bottom of the exhibit? discard the frame forward the frame out port 2 forward the frame out port 3 forward the frame out all ports ***forward the frame out all ports except port 3 add station 00-00-3D-1F-11-05 to port 2 in the forwarding table 2.Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown? This entry can only be removed from the MAC address table by a network administrator. When forwarding a frame to the device with address 0060.5c5b.cd23,the switch does not have to perform a lookup to determine Only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/18 ***The switch learned this MAC address from the source address in a frame received on Fa0/18 3. A new switch is to be a

CCNA v4 - E4 - Module 1 (100%)

 http://p4s-ccna.blogspot.com      http://testccna-4u.blogspot.com 1. Which statement about WAN protocols is correct?    Most WAN protocols use HDLC or a variant of HDLC as a framing mechanism. 2. Which statement is true of the functionality of the layers in the hierarchical network model?    The distribution layer aggregates WAN connections at the edge of the campus. 3. Which WAN technology uses a fixed payload of 48 bytes and is transported across both switched and permanent virtual circuits?    ATM 4. A U.S. company requires a WAN connection used only to transfer sales data from individual stores to the home office. All transfers will occur after business hours. The required bandwidth for this connection is estimated to be less than 38 kbps. Which type of connection requires the least investment for this company?    analog dialup 5. What is an advantage of packet-switched technology over circuit-switched technology?    Packet-switched networks can efficiently use multiple routes ins

CCNA v4 - E4 - Module 3 (100%)

1. Which best describes the benefit of using Frame Relay as opposed to a leased line or ISDN service?   Customers only pay for the local loop and the bandwidth they purchase from the network provider. 2. Which statement about Frame Relay subinterfaces is correct?    Point-to-point subinterfaces act like leased lines and eliminate split-horizon routing issues. 3. What best describes the use of a data-link connection identifier (DLCI)?   locally significant address used to identify a virtual circuit 4. What is created between two DTEs in a Frame Relay network?   virtual circuit 5. Which two items allow the router to map data link layer addresses to network layer addresses in a Frame Relay network? (Choose two.)    Inverse ARP    LMI status messages 6. Refer to the exhibit. What can be known about the configuration of router R1 from the output?    The command encapsulation frame-relay ietf has been used on the Serial 0/0/0 interface. 7. Refer to the exhibit. Which two outcomes occur from

CCNA v4 - E4 - Module 2 (100%)

1. Refer to the exhibit. What can be concluded about the function of the Serial 0/0/0 interface on the router after the commands are entered?    The serial link will be closed if the number of received packets at the destination node falls below 90 percent of the packets that are sent. 2. Refer to the exhibit. While troubleshooting a serial interface, a technician enters the command  show interface serial 0/0/0 . If the interface is in DCE mode, what two problems are likely to cause the indicated problem? (Choose two.)    The remote CSU or DSU has failed.    A timing problem has occurred on the cable. 3. Refer to the exhibit. What statement is true regarding the output shown?    The PAP passwords did not match, so the routers are trying CHAP authentication. 4. Why are serial connections preferred over parallel connections for long transmission lengths?    Parallel connections are subject to clock skew and to crosstalk between wires. 5. Which two statements are true about time-division

CCNA v4 - E3 - Module 7 (100%)

1. What will a wireless client transmit to discover the available WLAN networks?   probe request 2. Which function is provided by a wireless access point?   converts data from 802.11 to 802.3 frame encapsulation 3. Why is security so important in wireless networks?   Wireless networks broadcast data over a medium that allows easy access. 4. Refer to the exhibit. When configuring the wireless access point, which setting does the network administrator use to configure the unique identifier that client devices use to distinguish this wireless network from others?   Network Name (SSID) 5. Which access method does a wireless access point use to allow for multiple user connectivity and distributed access?   CSMA/CA 6. What does a wireless access point use to allow WLAN clients to learn which networks are available in a given area?   beacon 7. Which three devices do many wireless routers incorporate? (Choose three.)   gateway for connecting to other network infrastructures   built-in Ethernet