Skip to main content

Posts

CCNA v4 - E4 - Module 6 (100%)

http://p4s-ccna.blogspot.com http://testccna-4u.blogspot.com 1. Which two Layer 1 requirements are outlined in the Data-over-Cable Service Interface Specification (DOCSIS)? (Choose two.) channel widths modulation techniques 2. Which is an example of symmetric-key encryption? pre-shared key 3. Which two statements are valid solutions for a cable ISP to reduce congestion for users? (Choose two.) allocate an additional channel subdivide the network to reduce users on each segment 4. While monitoring traffic on a cable network, a technician notes that data is being transmitted at 38 MHz. Which statement describes the situation observed by the technician? Data is being transmitted from the subscriber to the headend. 5. After conducting research to learn about common remote connection options for teleworkers, a network administrator has decided to implement remote access over broadband to establish VPN connections over the public Internet. What is the result of this solution? The conn

CCNA v4 - E4 - Module 5 (100%)

http://p4s-ccna.blogspot.com http://testccna-4u.blogspot.com 1. Refer to the exhibit. What will be the effect of the configuration that is shown?    Users attempting to access hosts in the 192.168.30.0/24 network will be required to telnet to R3. 2. Which three parameters can ACLs use to filter traffic? (Choose three.)    protocol suite    source address    destination address 3. Refer to the exhibit. How does this access list process a packet with the source address 10.1.1.1 and a destination of 192.168.10.13?    It is dropped because it does not match any of the items in the ACL. 4 .Which two statements are correct about extended ACLs? (Choose two)    Extended ACLs evaluate the source and destination addresses.    Port numbers can be used to add greater definition to an ACL. http://p4s-ccna.blogspot.com http://testccna-4u.blogspot.com 5. Where should a standard access control list be placed?    close to the destination 6. Which three statements describe ACL processing of packets? (Ch

CCNA v4 - E4 - Module 4 (100%)

http://p4s-ccna.blogspot.com http://testccna-4u.blogspot.com 1. What is the best defense for protecting a network from phishing exploits?    Schedule training for all users. 2. What are three characteristics of a good security policy? (Choose three.)    It defines acceptable and unacceptable use of network resources.    It communicates consensus and defines roles.    It defines how to handle security incidents. 3. The Cisco IOS image naming convention allows identification of different versions and capabilities of the IOS. What information can be gained from the filename c2600-d-mz.121-4? (Choose two.)    The software is version 12.1, 4th revision.    The IOS is for the Cisco 2600 series hardware platform. 4. Refer to the exhibit. What is accomplished when both commands are configured on the router?    The commands disable the services such as echo, discard, and chargen on the router to prevent security vulnerabilities. 5. Which two conditions should the network administrator verify

NEW CCNA3 FINAL

http://p4s-ccna.blogspot.com http://testccna-4u.blogspot.com 1. Refer to the exhibit. An administrator documented the output of a CAM table from an Ethernet switch as shown. What action will the switch take when it receives the frame shown at the bottom of the exhibit? discard the frame forward the frame out port 2 forward the frame out port 3 forward the frame out all ports ***forward the frame out all ports except port 3 add station 00-00-3D-1F-11-05 to port 2 in the forwarding table 2.Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown? This entry can only be removed from the MAC address table by a network administrator. When forwarding a frame to the device with address 0060.5c5b.cd23,the switch does not have to perform a lookup to determine Only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/18 ***The switch learned this MAC address from the source address in a frame received on Fa0/18 3. A new switch is to be a

CCNA v4 - E4 - Module 1 (100%)

 http://p4s-ccna.blogspot.com      http://testccna-4u.blogspot.com 1. Which statement about WAN protocols is correct?    Most WAN protocols use HDLC or a variant of HDLC as a framing mechanism. 2. Which statement is true of the functionality of the layers in the hierarchical network model?    The distribution layer aggregates WAN connections at the edge of the campus. 3. Which WAN technology uses a fixed payload of 48 bytes and is transported across both switched and permanent virtual circuits?    ATM 4. A U.S. company requires a WAN connection used only to transfer sales data from individual stores to the home office. All transfers will occur after business hours. The required bandwidth for this connection is estimated to be less than 38 kbps. Which type of connection requires the least investment for this company?    analog dialup 5. What is an advantage of packet-switched technology over circuit-switched technology?    Packet-switched networks can efficiently use multiple routes ins

CCNA v4 - E4 - Module 3 (100%)

1. Which best describes the benefit of using Frame Relay as opposed to a leased line or ISDN service?   Customers only pay for the local loop and the bandwidth they purchase from the network provider. 2. Which statement about Frame Relay subinterfaces is correct?    Point-to-point subinterfaces act like leased lines and eliminate split-horizon routing issues. 3. What best describes the use of a data-link connection identifier (DLCI)?   locally significant address used to identify a virtual circuit 4. What is created between two DTEs in a Frame Relay network?   virtual circuit 5. Which two items allow the router to map data link layer addresses to network layer addresses in a Frame Relay network? (Choose two.)    Inverse ARP    LMI status messages 6. Refer to the exhibit. What can be known about the configuration of router R1 from the output?    The command encapsulation frame-relay ietf has been used on the Serial 0/0/0 interface. 7. Refer to the exhibit. Which two outcomes occur from