Sunteți pe pagina 1din 16

CCNA 4 3. Fill in the blank.

Branch office networks and corporate


CHAPTER 1
headquarter networks can be connected
1. Match the scenario to the WAN solution. together using ____ VPN connections
(Not all options are used.) through the Internet infrastructure.
- A company has a headquarters and Answer: site to site
four remote locations. The
headquarters site will require more
bandwidth than the four remote 4. Which two technologies are categorized
sites. (Frame Relay) as private WAN infrastructures? (Choose
- A company requires higher two.)
download speeds than upload Answer: Frame Relay, MetroE
speeds and wants to use existing
phone lines. (DSL)
- A company would like guaranteed 5. A construction firm is building a power
bandwidth using a point-to-point plant at a remote and isolated mine site
link that requires minimal expertise and needs to connect the data network
to install and maintain. (T1) of the plant to the corporate network.
- A teleworker would like to bundle Which public technology is the most
the Internet connection with other suitable to meet the connection needs?
phone and TV services. (cable) Answer: satellite Internet
- A multisite college wants to connect
using Ethernet technology between
the sites. (MetroE) 6. Which public WAN technology provides
security by using encrypted tunnels over
Internet connections?
2. A new corporation needs a data network Answer: VPN
that must meet certain requirements.
The network must be fast and reliable to
transmit secure video conferencing calls 7. Which one of the WAN technologies is
between two branches. If cost is not a inadequate for video traffic but operates
consideration, which two types of WAN adequately for voice traffic?
infrastructure would best meet the Answer: ISDN BRI
requirements? (Choose two.)
Answer: private infrastructure,
dedicated 8. What is a disadvantage of leased lines?
Answer: high cost

9. Which WAN technology uses a fixed


payload of 48 bytes and is transported
across both switched and permanent
virtual circuits?
Answer: ATM
10. Match the private WAN technology to its 13. Which statement correctly describes a
application. (Not all options are used.) WAN technology?
- ISDN BRI (when 2 B channels and 1 Answer: MPLS can be used to deliver
D channel are used to provide any type of packet between sites.
additional capacity)
- dialup (when intermittent, low-
volume data transfers are needed) 14. Which medium do service providers use
- leased line (when permanent point- to transmit data over WAN connections
to-point dedicated connections are with SONET, SDH, and DWDM?
required) Answer: fiber optic
- VSAT (when connectivity in a
remote location is needed and
there are no service providers that 15. Which three traffic-related factors
offer WAN service) would influence selecting a particular
WAN link type? (Choose three.)
Answer: type of traffic, amount of
11. What is a characteristic of a WAN? traffic, security needs
Answer: WAN service providers include
carriers such as a telephone network or
satellite service. 16. Which two WAN infrastructure services
are examples of private connections?
(Choose two.)
12. Match each component of a WAN Answer: T1/E1, Frame Relay
connection to its description. (Not all
options are used.)
- customer premises equipment
(devices and inside wiring located
on the enterprise edge and which
connect to a carrier link)
- demarcation point (a point that is
established in a building or complex
to separate customer equipment
from service provider equipment)
- data terminal equipment (customer
devices that pass the data from a
customer network or host
computer for transmission over the
WAN)
- data communications equipment
(devices that put data on the local
loop)
CHAPTER 2 5. Match the transmission rate standards
with their designated bandwidth. (Not
1. Which two options are negotiated via
all options are used.)
NCP during the establishment of a PPP
- T1 (1.544 Mb/s)
connection that will use the IPv4
- DSO (64 Kb/s)
network layer protocol? (Choose two.)
- OC-1 (51.84 Mb/s)
Answer: the algorithm to compress TCP
- E1 (2.048 Mb/s)
and IP headers, an IPv4 address to use
- T3 (44.736 Mb/s)
for routing IP over the PPP link

6. During a PPP session establishment


2. What function does NCP perform in the
phase, which two messages are sent by
establishment of a PPP session?
the requested party if the options are
Answer: It completes the specific
not acceptable? (Choose two.)
configuration of the network layer
Answer: Configure-Nak, Configure-
protocol that is being used.
Reject

3. A network engineer is troubleshooting


7. Which PPP protocol allows a device to
an unsuccessful PPP multilink
specify an IP address for routing over the
connection between two routers. The
PPP link?
multilink interface has been created and
Answer: IPCP
assigned a number, the interface has
been enabled for multilink PPP, and the
interface has been assigned a multilink
8. Fill in the blank.
group number that matches the group
The default encapsulation for WAN
assigned to the member physical serial
interfaces is ______ on Cisco routers.
interfaces. The physical serial interfaces
Answer: HDLC
have also been enabled for PPP
multilink. Which additional command
should to be issued on the multilink
interface? 9. Which protocol is used by PPP to provide
Answer: ip address 192.168.10.1 authentication and protection from
255.255.255.252 playback attacks?
Answer: CHAP

4. With which layers of the OSI model do


the PPP control protocols interface?
Answer: NCP interfaces with Layer 3;
LCP interfaces with Layer 1
10. Match the PPP frame field to the
description. (Not all options are used.)
- a single byte that designates the
beginning or end of a PPP frame
(Flag)
- a byte filled with all 1s (Address)
- a field with 00000011 so that data
link establishment is not required
(Control)
- one (if compression allowed) or two
bytes (Protocol)
- 0 to 1500 bytes of information
(Data)
- up to 4 bytes for error detection
(Frame Check Sequence)

11. Fill in the blank.


When a Cisco router is being connected
to a non-Cisco router across a point-to-
point serial link, the ______
encapsulation should be configured.
Answer: PPP

12. Which PPP option enables load


balancing on PPP-enabled interfaces
that connect to a single destination?
Answer: Multilink

13. PPP authentication is performed at


which OSI layer?
Answer: Layer 2

14. Which additional functionality is


available on an interface when the
encapsulation is changed from HDLC to
PPP?
Answer: authentication
CHAPTER 3 8. File in the blank. Use the acronym.
PPP supports ______ authentication
1. Fill in the blank. Use only an acronym.
that can be used by ISPs to securely
_____ creates a PPP tunnel through the
authenticate users prior to providing
DSL connection for the purpose of
services.
sending PPP frames.
Answer: CHAP
Answer: PPPoE

9. Fill in the blank.


2. What equipment at the cable service
A _______ is a secure, reliable, cost-
provider office connects the office to the
effective way to allow remote users,
subscriber locations?
branches, and suppliers to connect to
Answer: CMTS
resources on the company network.
Answer: VPN

3. What are the two types of VPN


connections? (Choose two.)
10. What are the three methods of
Answer: site-to-site, remote access
establishing a VPN connection offered
by Cisco devices? (Choose three.)
Answer: GRE, IPsec, web-based SSL
4. What is an advantage offered by GRE
tunnels?
Answer: support for IP multicast
11. Match the broadband characteristic to
tunneling
the broadband type. (Not all options are
used.)
- bandwidth is shared by many users
5. What TCP port is used by BGP to (cable)
exchange messages between routers? - bandwidth is distance sensitive
Answer: 179 (DSL)
- area of coverage is limited to 1-2 km
(WiMax)
6. When a PPPoE configuration is being - ultimate high bandwidth solution
verified, which command can be used to (fiber-to-the-home)
verify the MTU size and encapsulation
type configured on a Cisco router?
Answer: show interface dialer 1 12.

7. What is the protocol that provides ISPs


the ability to send PPP frames over DSL
networks? Each line in the diagram represents a
Answer: PPPoE single connection from a user AS to an
ISP AS. In which multihomed
configuration is it necessary, if not
required, to use BGP to exchange
routing information?
Answer: D

13. Which two components are needed to


provide a DSL connection to a SOHO?
(Choose two.)
Answer: transceiver, DSLAM

14. What are two reasons a company would


use a VPN? (Choose two.)
Answer: to connect remote users to the
network, to allow suppliers to access
the network, to allow suppliers to
access the network

15.

Refer to the exhibit. Which routing


protocol would likely be used to
distribute routes between these
routers?
Answer: BGP

16. Here is a link to the PT Activity.


Open the PT Activity. Perform the tasks
in the activity and then answer the
question.
Which message is displayed by Web
Server1?
Answer: GRE UP!
CHAPTER 4 5. Which three statements describe ACL
processing of packets? (Choose three.)
1. Match each statement with the example
Answer: An implicit deny any rejects
subnet and wildcard that it describes.
any packet that does not match any ACL
(Not all options are used.)
statement,
- hosts in a subnet with the subnet
A packet can either be rejected
mask 255.255.252.0 (192.168.5.0
or forwarded as directed by the
0.0.3.255)
statement that is matched,
- all IP address bits must match
Each statement is checked only
exactly (host 192.168.15.12)
until a match is detected or until the
- the first valid host address in a
end of the ACL statement list is reached
subnet (192.168.15.65
255.255.255.240)
- subnetwork address of a subnet
6. A network administrator needs to
with 14 valid host addresses
configure a standard ACL so that only the
(192.168.15.144 0.0.0.15)
workstation of the administrator with
- addresses with a subnet mask of
the IP address 192.168.15.23 can access
255.255.255.248 (192.168.3.64
the virtual terminal of the main router.
0.0.0.7)
Which two configuration commands can
achieve the task? (Choose two.)
Answer: Router1(config)# access-list 10
2. Which IPv4 address range covers all IP
permit host 192.168.15.23
addresses that match the ACL filter
Router1(config)# access-list 10
specified by 172.16.2.0 with wildcard
permit 192.168.15.23 0.0.0.0
mask 0.0.1.255?
Answer: 172.16.2.0 to 172.16.3.255

7.

3. An administrator has configured an


access list on R1 to allow SSH
administrative access from host
172.16.1.100. Which command correctly
applies the ACL?
Answer: R1(config-line)# access-class 1
in
Refer to the exhibit. A network
administrator configures a named ACL
on the router. Why is there no output
4. A network administrator configures an displayed when the show command is
ACL with the command R1(config)# issued?
access-list 1 permit 172.16.0.0 Answer: The ACL name is case sensitive.
0.0.15.255. Which two IP addresses will
match this ACL statement? (Choose
two.)
Answer: 172.16.0.255, 172.16.15.36
8. Which statement describes a difference 14. Which three implicit access control
between the operation of inbound and entries are automatically added to the
outbound ACLs? end of an IPv6 ACL? (Choose three.)
Answer: Inbound ACLs are processed Answer: deny ipv6 any any, permit icmp
before the packets are routed while any any nd-ns, permit icmp any any nd-
outbound ACLs are processed after the na
routing is completed.

9. Which two keywords can be used in an


access control list to replace a wildcard
mask or address and wildcard mask pair?
(Choose two.)
Answer: host, any

10. What range of IP addresses is


represented by the network and
wildcard mask 192.168.70.0 0.0.0.127?
Answer: 192.168.70.0 to
192.168.70.127

11. Fill in the blanks. Use dotted decimal


format.
The wildcard mask that is associated
with 192.168.12.96/27 is _____.
Answer: 0.0.0.31

12. Which statement describes a


characteristic of standard IPv4 ACLs?
Answer: They filter traffic based on
source IP addresses only.

13. What is the only type of ACL available for


IPv6?
Answer: named extended
CHAPTER 5 5. Which three statements describe SPAN
and RSPAN? (Choose three.)
1. How can SNMP access be restricted to a
Answer: SPAN can be configured to
specific SNMP manager?
send a copy of traffic to a destination
Answer: Define an ACL and reference it
port on the same switch
by using the snmp-server community
SPAN can copy traffic on a
command.
source port or source VLAN to a
destination port on the same switch
RSPAN can be used to forward
2. Which service is enabled on a Cisco traffic to reach an IPS that is analyzing
router by default that can reveal traffic for malicious behavior
significant information about the router
and potentially make it more vulnerable
to attack?
6. True or False?
Answer: CDP
In the 802.1X standard, the client
attempting to access the network is
referred to as the supplicant.
Answer: true
3. Match each SNMP operation to the
corresponding description. (Not all
options are used.)
7. Which SNMPv2 configuration step is
- get-bulk-request (retrieving
required?
multiple rows in a table in a single
Answer: configuring the community
transmission)
string and access level
- get-next-request (sequentially
searching tables to retrieve a value
from a variable)
8. What are two characteristics of SNMP
- set-request (storing a value in a
community strings? (Choose two.)
specific variable)
Answer: SNMP read-only community
- get-response (replying to GET
strings can be used to get information
request and SET request messages
from an SNMP-enabled device.
that are sent by an NMS)
SNMP read-write community
strings can be used to set information
on an SNMP-enabled device.
4. What is an SNMP management agent?
Answer: software that is installed on
devices managed by SNMP
9. DHCP ______ is a mitigation technique
to prevent rogue DHCP servers from
providing false IP configuration
parameters.
Answer: snooping
10. 14. A company is designing a network
monitoring system and is considering
SNMPv3. What are three characteristics
of SNMPv3? (Choose three.)
Answer: It uses message integrity to
ensure that packets have not been
altered in transit.
Refer to the exhibit. Which statement is It uses authentication to
true about the local SPAN configuration determine if messages are from a valid
on switch SW1? source.
Answer: The SPAN session transmits to It uses encryption to scramble
a device on port Fa3/21 a copy of all the content of packets to prevent
traffic that is monitored on port Fa3/1. unauthorized access.

11. What are two types of switch ports that 15. What three services are provided by the
are used on Cisco switches as part of the AAA framework? (Choose three.)
defense against DHCP spoofing attacks? Answer: accounting, authorization,
(Choose two.) authentication
Answer: untrusted port, trusted DHCP
port

12. What mitigation plan is best for


thwarting a DoS attack that is creating a
switch buffer overflow?
Answer: Enable port security.

13. Which mode is used to configure SNMP?


Answer: global configuration mode
CHAPTER 6 7. True or False?
Network traffic can be marked at both
1. Which queuing method provides user-
Layer 2 and Layer 3 for QoS.
defined traffic classes where each traffic
Answer: true
class has a FIFO queue?
Answer: CBWFQ

8. What happens when the memory queue


of a device fills up and new network
2. What happens when an edge router
traffic is received?
using IntServ QoS determines that the
Answer: The network device will drop
data pathway cannot support the level
the arriving packets.
of QoS requested?
Answer: Data is not forwarded along
the pathway.
9. Which type of traffic does Cisco
recommend be placed in the strict
priority queue (PQ) when low latency
3. Fill in the blank.
queuing (LLQ) is being used?
Network performance is measured by
Answer: voice
the number of _____ per second that
can be transmitted.
Answer: bits
10. How many levels of priority are possible
when using class of service (CoS)
marking on frames?
4. Fill in the blank.
Answer: 8
_______ queuing uses a strict priority
queue to provide delay-sensitive traffic
preferential treatment over any other
11. Under which condition does congestion
traffic queue.
occur on a converged network with
Answer: LLQ
voice, video, and data traffic?
Answer: if the request for bandwidth
exceeds the amount of bandwidth
5. What is the default queuing method
available
used on the LAN interfaces of Cisco
devices?
Answer: FIFO
12. Which device would be classified as a
trusted endpoint?
Answer: IP phone
6. Fill in the blank.
When _____ -sensitive traffic is being
sent, it should be classified and marked
13. Which model is the only QoS model with
as close to the source as possible.
no mechanism to classify packets?
Answer: delay
Answer: best-effort
14. Which statement describes the QoS
classification and marking tools?
Answer: Marking is the adding of a
value to a packet header.
CHAPTER 7 6. True or False.
Cloud computing and virtualization are
1. Which component in a traditional
different terms that refer to the same
infrastructure device provides Layer 2
thing.
and Layer 3 functions to create data
Answer: false
paths within a network?
Answer: control plane

7. Which term describes the data


exchanges between virtual servers in a
2. Which network traffic management
data center?
technology is a basic element in SDN
Answer: east-west traffic
implementations?
Answer: OpenFlow

8. What is a characteristic of the two-tier


spine-leaf topology of the Cisco ACI
3. Which Cloud computing service would
fabric architecture?
be best for an organization that needs to
Answer: The leaf switches always attach
collaboratively create applications and
to the spines, but they never attach to
deliver them over the web?
each other.
Answer: PaaS

9.
4.

What is Fog computing?


Answer: It is a type of computing where
How many "things" are predicted to be
services are hosted where they are
interconnected on the Internet by 2020?
used, such as at the network edge or
Answer: 50 billion
with end devices.

10. A _____ is software that creates and


5. What is an example of an M2M
runs VM instances and can be installed
connection?
directly on hardware or run as an
Answer: a sensor in a garbage can
application on an OS.
signaling that it is full and delivering the
Answer: hypervisor
data to a GPS mapping system for the
sanitation truck to adjust its route for
pickups
11.

Today, over __% of things in the physical


world are still not connected to the
Internet. Select the answer that will
complete the statement.
Answer: 99

12. For a data center, what is the difference


in the server virtualization data traffic
compared with the traditional client-
server model?
Answer: There are significant data
exchanges between virtual servers.

13. What are three new challenges


associated with the rapid growth of the
IoT? (Choose three.)
Answer: integrating new things into
existing networks
securing new devices with
varying level of security
integrating many devices from
different vendors with custom
applications

14. What is a characteristic of data flow


processing in SDN?
Answer: Each data flow through the
network must be approved by the SDN
controller first.
CHAPTER 8 5. An attack has been launched within a
company and a host name has been
1. A network engineer is troubleshooting a
identified as the source. What command
network problem where users cannot
can a network technician use to
access the FTP server at the same IP
determine the IP address assigned to the
address where a website can be
host name?
successfully accessed. Which
Answer: nslookup
troubleshooting method would be the
best to apply in this case?
Answer: top-down
6. What are two reasons to create a
network baseline? (Choose two.)
Answer: to identify future abnormal
2. A network engineer is investigating an
network behavior
access issue to a web server. The web
to determine if the network can
server can access the Internet and the
deliver the required policies
local clients can open the web pages.
However, outside clients cannot access
the web pages. What is the most likely
7. A client calls the support desk and says
cause of the problem?
this to a technician: "I have just started
Answer: An ACL is blocking incoming
my computer and attempted to check e-
connections.
mail. The error 0x800ccc0d was
displayed. However, I was able to
connect to network drives and access
3. A network administrator issues the
the Internet." Which statement would
telnet www.cisco.com 25 command on
describe the status of this issue?
the workstation. What is the purpose of
Answer: The helpdesk has enough
this command?
information to begin finding a
Answer: to probe the server that
resolution.
provides the web service to determine
if it is also running an email service

8.

4. A network engineer is troubleshooting a


network that has recently been updated
Refer to the exhibit. A network
with a new routing protocol, but the
administrator issues the commands in
network is not working as expected. The
order to configure secure remote access
engineer is comparing the running
to the router. However, the
configuration from before and after the
administrator notices that sessions are
change was made. Which approach to
still being made over telent and are in
troubleshooting the problem is the
plain-text. What action should be taken
engineer using?
to encrypt the remote access traffic?
Answer: divide-and-conquer
Answer: Issue the no transport input
telnet ssh command and then issue the
transport input ssh command.
9. After gathering symptoms, if the 14. When is the most appropriate time to
troubleshooter determines that the measure network operations to
problem is located outside the control of establish a network performance
the organization, what is the next step? baseline?
Answer: Contact the administrator of Answer: at the same time each day
the external system. across a set period of average working
days, so that typical traffic patterns can
be established
10. Which statement describes the physical
topology for a LAN?
Answer: It defines how hosts and 15. Here is a link to the PT Activity.
network devices connect to the LAN. Open the PT Activity. Perform
the tasks in the activity instructions and
then answer the question.
11. Which command runs several other A user reports that PC0 cannot
show commands in order to generate visit the web server www.server.com.
many pages of detailed troubleshooting Troubleshoot the network configuration
information? to identify the problem.
Answer: show tech-support What is the cause of the problem?
Answer: Routing between HQ and
Branch is configured incorrectly.
12. Which feature sends simulated data
across the network and measures
performance between multiple network 16. Which troubleshooting tool can be used
locations? to pinpoint the distance to a break in a
Answer: IP SLA network cable?
Answer: cable tester

13. Users report that their PCs cannot access


the file server that is located in the
server farm at the headquarters
building. The support desk technician
checks the latest network update
reports and realizes that the router that
was connected to the network segment
of those users failed suddenly and has
just been replaced. What command
should the technician instruct the users
to issue on the PCs to solve the problem?
Answer: arp-d

S-ar putea să vă placă și