Sunteți pe pagina 1din 5

http://www.scribd.

com/doc/20735391/19512241-Take-Assessment-EWAN-Final-Exam-CCNA
-Exploration-Accessing-the-WAN-Version-40
http://ccnatut.com/take-assessment-ewan-final-exam-ccna-exploration-accessing-th
e-wan-version-4-0.html
http://www.cisco-exam.info/2009/03/take-assessment-ewan-final-exam-ccna.html
http://www.ccna4u.org/2010/11/ccna-4-final-questions-december-2010.html
http://ccnaexamanswers.com/ccna-exploration-4-final-exam-answers/#more-786

Which encapsulation protocol when deployed on a Cisco router over a serial inter
face is only compatible with another Cisco router?€
€HDLC
What is a characteristic feature of a worm?€
€Exploits a known vulnerability
An administrator is configuring a dual stack router with IPv6 and IPv4 using RIP
ng. The administrator receives an error message when trying to enter the IPv4 ro
utes into RIPng. What is the cause of the problem?€
€IPv4 is incompatible with RIPng
Which statement accurately describes a characteristic of a security policy?€
€It creates a basis for legal action if necessary.
Which characteristic of VPN technology prevents the contents of data communicati
ons from being read by unauthorized parties?€
€Confidentiality
Refer to the exhibit. A network administrator is configuring Frame Relay on rout
er HQ. It is desired that each Frame Relay PVC between the routers be in a separ
ate subnet. Which two commands on HQ will accomplish this task for the connectio
n to R1? (Choose two.)€
€HQ(config)# interface S0/0/0.1 point-to-point €HQ(config-if)# frame-relay map ip 17
2.16.1.1 255.255.255.0 301 broadcast
Refer to the exhibit. Router1 and Router2 are directly connected over a point-to
-point serial link. Router1 initiates a PPP session with Router2. Which statemen
t is true based on the configuration?€
€A hash value of the username and password are sent.
A technician has been asked to run Cisco SDM one-step lockdown on the router of
a customer. What will be the result of this process?€
€The router is tested for potential security problems and any necessary changes ar
e made.
Which two statements are true about creating and applying access lists? (Choose
two.)€
€There is an implicit deny at the end of all access lists.One access list per port
, per protocol, per direction is permitted.
Refer to the exhibit. Company ABC expanded its business and recently opened a ne
w branch office in another country. IPv6 addresses have been used for the compan
y network. The data servers Server1 and Server2 run applications which require e
nd-to-end functionality, with unmodified packets that are forwarded from the sou
rce to the destination. The edge routers R1 and R2 support dual stack configurat
ion. What solution should be deployed at the edge of the company network in orde
r to successfully interconnect both offices?€
€Manually configured IPv6 tunnel between the edge routers R1 and R2
A company uses a PVC with a committed information rate (CIR) of 128 kb/s and a c
ommitted burst information rate (CBIR) of 64 kb/s. The link is used to periodica
lly send updates at a rate of 144 kb/s. What will happen to the update traffic?€
€The traffic will be dropped at the CO for exceeding the committed information rat
e.
Refer to the exhibit. All devices are configured as shown in the exhibit. PC1 is
unable to ping the default gateway. What is the cause of the problem?€
€Port Fa0/2 on S2 is assigned to the wrong VLAN.
A system administrator must provide Internet connectivity for ten hosts in a sma
ll remote office. The ISP has assigned two public IP addresses to this remote of
fice. How can the system administrator configure the router to provide Internet
access to all ten users at the same time?€
€Configure dynamic NAT with overload.
Refer to the exhibit. From the output of the show interfaces and ping commands,
at which layer of the OSI model is a fault indicated?€
€Network
Refer to the exhibit. Results of the show vlan and show vtp status commands for
switches S1 and S2 are displayed in the exhibit. VLAN 11 was created on S1. Why
is VLAN 11 missing from S2?€
€The VTP domain names do not match.
Refer to the exhibit. What is the effect of the extended ACL when applied inboun
d on the S0/0/0 interface on R2?€
€Telnet traffic will be permitted only during the specified days and time range. A
ll other network traffic will be permitted any time.
Which three guidelines would help contribute to creating a strong password polic
y? (Choose three.)€
€Deliberately misspell words when creating passwords.€Create passwords that are at l
east 8 characters in length.€Use combinations of upper case, lower case, and speci
al characters.
Refer to the exhibit. How is the TCP/IP configuration information specified by t
he default-router and dns-server commands made available?€
€€A
Which variable is permitted or denied by a standard access control list?€
€Source IP address
When configuring a Frame Relay connection, what is the purpose of Inverse ARP?€
€To create a mapping of DLCI to Layer 3 addresses that belong to remote peers
An issue of response time has recently arisen on an application server. The new
release of a software package has also been installed on the server. The configu
ration of the network has changed recently. To identify the problem, individuals
from both teams responsible for the recent changes begin to investigate the sou
rce of the problem. Which statement applies to this situation?€
€t will be difficult to isolate the problem if two teams are implementing changes
independently.
What is the result when the command permit tcp 10.25.132.0 0.0.0.255 any eq smtp
is added to a named access control list and applied on the inbound interface of
a router?€
€Traffic using port 25 from the 10.25.132.0/24 is permitted to all destinations.
At what point in the PPP connection process does the authentication phase occur?€
€Before LCP begins the link establishment process
An administrator is unable to receive e-mail. While troubleshooting the problem,
the administrator is able to ping the local mail server IP address successfully
from a remote network and can successfully resolve the mail server name to an I
P address via the use of the nslookup command. At what OSI layer is the problem
most likely to be found?€
€Application layer
Refer to the exhibit. Which statement is true about the Frame Relay connection?€
€A congestion control mechanism is enabled on the Frame Relay connection.
A light manufacturing company wishes to replace its DSL service with a non-line-
of-sight broadband wireless solution that offers comparable speeds. Which soluti
on should the customer choose?€
€WiMAX
Refer to the exhibit. This router is being configured to use SDM, but the SDM in
terface of the router cannot be accessed. What is the cause of the problem?€
€The VTY lines are not configured correctly.
Which option correctly defines the capacity through the local loop guaranteed to
a customer by the service provider?€
€CIR
Refer to the exhibit. What is placed in the address field in the header of a fra
me that will travel from the DC router to the Orlando router?€
€DLCI 321
Where does a service provider assume responsibility from a customer for a WAN co
nnection?€
€Demarcation point
A company is looking for a WAN solution to connect its headquarters site to four
remote sites. What are two advantages that dedicated leased lines provide compa
red to a shared Frame Relay solution? (Choose two.)€
€Reduced jitterReduced latency
Refer to the exhibit. A host connected to Fa0/0 is unable to acquire an IP addre
ss from the DHCP server. The output of the debug ip dhcp server command shows “DHC
PD: there is no address pool for 192.168.3.17″. What is the problem?€
€The pool of addresses for the 192Network pool is configured incorrectly.
A network administrator is tasked with maintaining two remote locations in the s
ame city. Both locations use the same service provider and have the same service
plan for DSL service. When comparing download rates, it is noticed that the loc
ation on the East side of town has a faster download rate than the location on t
he West side of town. How can this be explained?€
€The service provider is closer to the location on the East side.
Which data link layer encapsulation protocol is used by default for serial conne
ctions between two Cisco routers?€
€HDLC
Which additional functionality is available on an interface when the encapsulati
on is changed from HDLC to PPP?€
€Authentication
When NAT is in use, what is used to determine the addresses that can be translat
ed on a Cisco router?€
€A
Refer to the exhibit. What statement is true about the core router devices?€
€They support multiple telecommunications interfaces of the highest speed and are
able to forward IP packets at full speed on all of those interfaces.
Refer to the exhibit. A network administrator has issued the commands that are s
hown on Router1 and Router2. A later review of the routing tables reveals that n
either router is learning the LAN network of the neighbor router. What is most l
ikely the problem with the RIPng configuration?€
€The RIPng process is not enabled on interfaces.
Which two protocols in combination should be used to establish a link with secur
e authentication between a Cisco and a non-Cisco router? (Choose two.)€
€PPPSLIP
Refer to the exhibit. This serial interface is not functioning correctly. Based
on the output shown, what is the most likely cause?€
€A
Which statement is true about NCP?€
€Each network protocol has a corresponding NCP.
Refer to the exhibit. Which statement correctly describes how Router1 processes
an FTP request packet that enters interface S0/0/0, and is destined for an FTP s
erver at IP address 172.16.1.5?€
€The router matches the incoming packet to the statement that was created by the a
ccess-list 101 permit ip any 172.16.1.0 0.0.0.255 command, ignores the remaining
statements in ACL 101, and allows the packet into the router.
Refer to the exhibit. RIPv2 has been configured on all routers in the network. R
outers R1 and R3 have not received any RIP routing updates. What will fix the is
sue?€
€Enable RIP authentication on R2.
Refer to the exhibit. What happens if the network administrator issues the comma
nds shown when an ACL called Managers already exists on the router?€
€The commands are added at the end of the existing Managers ACL.
Which security solution has the responsibility of monitoring suspicious processe
s that are running on a host and that might indicate infection of Trojan horse a
pplications?€
€Antivirus application
Which statement is true about wildcard masks?€
€A wildcard mask of 0.0.0.0 means the address should match exactly.
Refer to the exhibit. A network administrator is trying to backup the IOS softwa
re on R1 to the TFTP server. He receives the error message that is shown in the
exhibit, and cannot ping the TFTP server from R1. What is an action that can hel
p to isolate this problem?€
€Check that R1 has a route to the network where the TFTP server resides.
Refer to the exhibit. A network administrator is creating a prototype to verify
the new WAN design. However, the communication between the two routers cannot be
established. Based on the output of the commands, what can be done to solve the
problem?€
€Configure RA with a clock rate command.
Refer to the exhibit. From the output of the show interface commands, at which O
SI layer is a fault indicated?€
€Data link
Which type of ACL will permit traffic inbound into a private network only if an
outbound session has already been established between the source and destination

€Reflexive
Which IEEE 802.16 broadband wireless technology allows users to connect to the I
SP at speeds comparable to DSL and cable?€
€WiMAX
Which option represents a best practice for applying ACLs?€
€Extended ACLs should be applied closest to the source that is specified by the AC
L.

S-ar putea să vă placă și