Skip to main content

Posts

CCNA Exploration 4 Chapter 6 Exam Answers

1. Refer to the exhibit. A VPN tunnel has been established between the HQ Office and the Branch Office over the public Internet. Which three mechanisms are required by the devices on each end of the VPN tunnel to protect the data from being intercepted and modified? (Choose three.) The devices must use a dedicated Layer 2 connection. The devices must have the VPN client software installed. The two parties must inspect the traffic against the same ACLs. The two parties must establish a secret key used by encryption and hash algorithms. The two parties must agree on the encryption algorithm to be used over the VPN tunnel. The devices must be authenticated before the communication path is considered secure. 2. Refer to the exhibit. All users have a legitimate purpose and the necessary permissions to access the Corporate network. Based on the topology shown, which locations are able to establish VPN connectivity with the Corporate network? Locations C, D, and E can support VPN connectivity

CCNA 1 Final Exam 2011 latest (hot hot hot)

  Hi! I have been posted content of ccna1 final exam (latest and only question.) I will post the answer and insert image on sunday. If you care, please subscribe your email an become a first person have full test content. Subcribe now  Some question  have not content because this question have images content. So that can you wait for me? SUNDAY 1. A user sees the command prompt: Router(config-if)# . What task can be performed at this mode? Reload the device. Perform basic tests. Configure individual interfaces. Configure individual terminal lines. 2. Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured? leaving host A leaving ATL leaving Dallas leavin

CCNA 3 Final Exam => latest version

1 . Which security protocol or measure would provide the greatest protection for a wireless LAN? WPA2 cloaking SSIDs shared WEP key MAC address filtering   2 . Refer to the exhibit. All trunk links are operational and all VLANs are allowed on all trunk links. An ARP request is sent by computer 5. Which device or devices will receive this message? only computer 4 computer 3 and RTR-A computer 4 and RTR-A computer 1, computer 2, computer 4, and RTR-A computer 1, computer 2, computer 3, computer 4, and RTR-A all of the computers and the router   3 . Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal? only hosts A and B only hosts A, B, and C only hosts A, B, C, and D only hosts A, B, C, and E   4 . Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.161. What will t

CCNA 2 Final Exam V4.0 Answers

1 . Refer to the exhibit. Given the topology shown in the exhibit, what three commands are needed to configure EIGRP on the Paris router ? (Choose three.) Paris(config)# router eigrp 100 Paris(config)# router eigrp Paris(config-router)# network 192.168.6.0 Paris(config-router)# network 192.168.7.0 Paris(config-router)# network 192.168.8.0 Paris(config-router)# network 192.168.9.0   2 . In a lab test environment, a router has learned about network 172.16.1.0 through four different dynamic routing processes. Which route will be used to reach this network? D 172.16.1.0/24 [90/2195456] via 192.168.200.1, 00:00:09, Serial0/0/0 O 172.16.1.0/24 [110/1012] via 192.168.200.1, 00:00:22, Serial0/0/0 R 172.16.1.0/24 [120/1] via 192.168.200.1, 00:00:17, Serial0/0/0 I 172.16.1.0/24 [100/1192] via 192.168.200.1, 00:00:09, Serial0/0/0   3 . Which routing protocol maintains a topology table separate from the routing table? IGRP RIPv1 RIPv2 EIGRP   4 . Refer to the exhibit. R1 a

CCNA 1 Final Exam Answers 2011

copy from http://news361.org   1 . Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.) Router(config)# line vty 0 3 Router(config-line)# password c13c0 Router(config-line)# login The entries specify three Telnet lines for remote access. The entries specify four Telnet lines for remote access. The entries set the console and Telnet password to "c13c0". Telnet access will be denied because the Telnet configuration is incomplete. Access will be permitted for Telnet using "c13c0" as the password. 2 . Which two actions could be taken by a router if a specific match is not made to a route in the routing table? (Choose two.) The packet will be discarded. The packet will be sent back to the source. The packet will be flooded out all interfaces. Neighboring routers are polled to find the best path. The packet will be forwarded to a default route if one is