Skip to main content

Posts

CCNA 4 Final Exam V4.0 2010

1 . What functionality do access control lists provide in the implementation of dynamic NAT on a Cisco router? define which addresses can be translated define which addresses are assigned to a NAT pool define which addresses are allowed out the router define which addresses can be accessed from the inside network 2 . Which three guidelines would help contribute to creating a strong password policy? (Choose three.) Once a good password is created, do not change it. Deliberately misspell words when creating passwords. Create passwords that are at least 8 characters in length. Use combinations of upper case, lower case, and special characters. Write passwords in locations that can be easily retrieved to avoid being locked out. Use long words found in the dictionary to make passwords that are easy to remember. 3 . Refer to the exhibit. Every time the administrator reboots this router, the boot process ends in setup mode. What is a possible problem? There is insufficient RAM for the IOS t

CCNA1 Final <= NEWS 2010

1 What information is used at each hop to determine where the packet will be forwarded next? the IP packet header the incoming interface the transport layer PDU the source MAC address 2 Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue? issue the clock rate command on interface Serial 0/0/0 issue the description command on interface Serial 0/0/1 issue the ip address command on interface FastEthernet 0/0 issue the no shutdown command on interface FastEthernet 0/1 3 Refer to the exhibit. A network technician wants to connect host A to the console of a Cisco switch to initialize the configuration. What type of cable is req

CCNA 1 Final Exam 2010

1 . Refer to the exhibit. What is the correct destination socket number for a web page request from Host A to the web server? 00-08-a3-b6-ce-46 198.133.219.25:80 C 198.133.219.0/24 is directly connected, FastEthernet0/0 2 . Which prompt represents the appropriate mode used for the copy running-config startup-config command ? Switch-6J> Switch-6J# Switch-6J(config)# Switch-6J(config-if)# Switch-6J(config-line)# 3 . Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two) Router(config)# line vty 0 3 Router(config-line)# password c13c0 Router(config-line)# login The entries specify three Telnet lines for remote access. The entries specify four Telnet lines for remote access. The entries set the console and Telnet password to “c13c0″. Telnet access will be denied because the Telnet configuration is incomplete. Access will be permitted for Telnet using “c13c0″ as the password. 4

CCNA 4 Chapter 8

1 . What combination of IP address and wildcard mask should be used to specify only the last 8 addresses in the subnet 192.168.3.32/28? 192.168.3.32 0.0.0.7 192.168.3.32 0.0.0.15 192.168.3.40 0.0.0.7 192.168.3.40 0.0.0.15 2 . Excessive broadcasts are generally a symptom of a problem at which layer? physical data link network transport 3 . Refer to the exhibit. Which three pieces of information can be determined by analyzing the output shown? (Choose three.) A carrier detect signal is present. Keepalives are being received successfully. Default encapsulation is used on this serial link. Packets passing this interface cannot exceed 1 KB in size. The reliability of this link is very low. The LCP negotiation phase is complete. 4 . A network administrator has received complaints that users on a local LAN can retrieve e-mail from a remote e-mail server but are unable to open web pages on the same server. Services at which two layers of the OSI model should be investigated during the t

CCNA3 Final 2010

Link to this site if you copy my content. Thank Petter ! 1 . Which security protocol or measure would provide the greatest protection for a wireless LAN? WPA2 cloaking SSIDs shared WEP key MAC address filtering 2 . Refer to the exhibit. All trunk links are operational and all VLANs are allowed on all trunk links. An ARP request is sent by computer 5. Which device or devices will receive this message? only computer 4 computer 3 and RTR-A computer 4 and RTR-A computer 1, computer 2, computer 4, and RTR-A computer 1, computer 2, computer 3, computer 4, and RTR-A all of the computers and the router 3 . Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal? only hosts A and B only hosts A, B, and C only hosts A, B, C, and D only hosts A, B, C, and E 4 . Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destinatio

CCNA4 Final 2010

1 Which encapsulation protocol when deployed on a Cisco router over a serial interface is only compatible with another Cisco router? PPP SLIP HDLC Frame Relay 2 What is a characteristic feature of a worm? exploits a known vulnerability attaches to executable programs masquerades as a legitmate program lies dormant until triggered by an event, time, or date 3 An administrator is configuring a dual stack router with IPv6 and IPv4 using RIPng. The administrator receives an error message when trying to enter the IPv4 routes into RIPng. What is the cause of the problem? When IPv4 and IPv6 are configured on the same interface, all IPv4 addresses are over-written in favor of the newer technology. Incorrect IPv4 addresses are entered on the router