CCNA4 Final 3
Which WAN technology can switch any type of payload based on labels?
PSTN
DSL
MPLS
T1/E1
What technology can be used to create a private WAN via satellite communications?
VPN
3G/4G cellular
Dialup
VSAT
WiMAX
Which public WAN access technology utilizes copper telephone lines to provide access to subscribers that are multiplexed into a single T3 link connection?
ISDN
DSL
Dialup
Cable
How many DS0 channels are bounded to produce a 1.544 Mb/s DS1 line?
2
12
24
28
Refer to the exhibit. Communication between two peers has failed. Based on the output that is shown, what is the most likely cause?
Interface reset
Unplugged cable
Improper cable type
PPP issue
Refer to the exhibit. Which type of Layer 2 encapsulation used for connection D requires Cisco routers?
Ethernet
PPPoE
HDLC
PPP
Which three statements are true about PPP? (Choose three.)
PPP can use synchronous and asynchronous circuits.
PPP can only be used between two Cisco devices.
PPP carries packets from several network layer protocols in LCPs.
PPP uses LCPs to establish, configure, and test the data-link connection.
PPP uses LCPs to agree on format options such as authentication, compression, and error detection.
A network administrator is evaluating authentication protocols for a PPP link. Which three factors might lead to the selection of CHAP over PAP as the authentication protocol? (Choose three.)
Establishes identities with a two-way handshake
Uses a three-way authentication periodically during the session to reconfirm identities
Control by the remote host of the frequency and timing of login events
Transmits login information in encrypted format
Uses an unpredictable variable challenge value to prevent playback attacks
Makes authorized network administrator intervention a requirement to establish each session
Which cellular or mobile wireless standard is considered a fourth generation technology?
LTE
GSM
CDMA
UMTS
A company is looking for the least expensive broadband solution that provides at least 10 Mb/s download speed. The company is located 5 miles from the nearest provider. Which broadband solution would be appropriate?
Satellite
DSL
WiMax
Cable
Which technology can ISPs use to periodically challenge broadband customers over DSL networks with PPPoE?
PAP
CHAP
HDLC
Frame Relay
What are the three core components of the Cisco ACI architecture? (Choose three.)
Application Network Profile
Application Policy Infrastructure Controller
Cisco Nexus Switches
Microsoft hypervisor
Cisco Information Server
Virtual Security Gateway
Which statement describes a feature of site-to-site VPNs?
The VPN connection is not statically defined.
VPN client software is installed on each host.
Internal hosts send normal, unencapsulated packets.
Individual hosts can enable and disable the VPN connection.
What are three features of a GRE tunnel? (Choose three.)
Creates nonsecure tunnels between remote sites
Transports multiple Layer 3 protocols
Creates additional packet overhead
Uses RSA signatures to authenticate peeers
Provides encryption to keep VPN traffic confidential
Supports hosts as GRE tunnel endpoints by installing Cisco VPN client software
Refer to the exhibit. What two commands are needed to complete the GRE tunnel configuration on router R1? (Choose two.)
R1(config-if)# tunnel source 209.165.202.129
R1(config-if)# tunnel source 172.16.2.1
R1(config-if)# tunnel destination 206.165.202.130
R1(config-if)# tunnel destination 172.16.2.2
R1(config-if)# tunnel source 209.165.202.130
R1(config-if)# tunnel destination 206.165.202.129
What does BGP use to exchange routing updates with neighbors?
TCP connections
Area numbers
Group identification numbers
Hellos
Refer to the exhibit. The network administrator that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server. Which extended ACL would be used to filter this traffic, and how would this ACL be applied? (Choose two.)
Access-list 105 permit ip host 10.0.70.23 host 10.0.54.5 access-list 105 permit tcp any host 10.0.54.5 eq www access-list 105 permit ip any any
Access-list 105 permit tcp host 10.0.54.5 any eq www access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 20 access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 21
Access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 20 access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 21 access-list 105 permit tcp 10.0.0.0 0.255.255.255 host 10.0.54.5 eq www access-list 105 deny ip any host 10.0.54.5 access-list 105 permit ip any any
R2(config)# interface gi0/0 R2(config-if)# ip access-group 105 in
R1(config)# interface gi0/0 R1(config-if)# ip access-group 105 out
R1(config)# interface s0/0/0 R1(config-if)# ip access-group 105 out
Refer to the exhibit. A router has an existing ACL that permits all traffic from the 172.16.0.0 network. The administrator attempts to add a new statement to the ACL that denies packets from host 172.16.0.1 and receives the error message that is shown in the exhibit. What action can the administrator take to block packets from host 172.16.0.1 while still permitting all other traffic from the 172.16.0.0 network?
Manually add the new deny statement with a sequence number of 5.
Manually add the new deny statement with a sequence number of 15.
Create a second access list denying the host and apply it to the same interface.
Add a deny any any statement to access-list 1.
Refer to the exhibit. What can be determined from this output?
The ACL is missing the deny ip any any ACE.
Because there are no matches for line 10, the ACL is not working.
The ACL is only monitoring traffic destined for 10.23.77.101 from three specific hosts.
The router has not had any Telnet packets from 10.35.80.22 that are destined for 10.23.77.101.
What is the only type of ACL available for IPv6?
Named standard
Named extended
Numbered standard
Numbered extended
Which IPv6 ACL command entry will permit traffic from any host to an SMTP server on network 2001:DB8:10:10::/64?
Permit tcp any host 2001:DB8:10:10::100 eq 25
Permit tcp host 2001:DB8:10:10::100 any eq 25
Permit tcp any host 2001:DB8:10:10::100 eq 23
Permit tcp host 2001:DB8:10:10::100 any eq 23
Refer to the exhibit. Considering how packets are processed on a router that is configured with ACLs, what is the correct order of the statements?
C-B-A-D
A-B-C-D
C-B-D-A
B-A-D-C
D-A-C-B
Which two hypervisors are suitable to support virtual machines in a data center? (Choose two.)
Virtual PC
VMware Fusion
VMware ESX/ESXi
Oracle VM VirtualBox
Microsoft Hyper-V 2012
How can DHCP spoofing attacks be mitigated?
By disabling DTP negotiations on nontrunking ports
By implementing DHCP snooping on trusted ports
By implementing port security
By the application of the ip verify source command to untrusted ports
What action can a network administrator take to help mitigate the threat of VLAN attacks?
Disable VTP.
Configure all switch ports to be members of VLAN 1.
Disable automatic trunking negotiation.
Enable PortFast on all switch ports.
Which SNMP message type informs the network management system (NMS) immediately of certain specified events?
GET request
SET request
GET response
Trap
Refer to the exhibit. A SNMP manager is using the community string of snmpenable and is configured with the IP address 172.16.10.1. The SNMP manager is unable to read configuration variables on the R1 SNMP agent. What could be the problem?
The SNMP agent is not configured for read-only access.
The community of snmpenable2 is incorrectly configured on the SNMP agent.
The ACL is not permitting access by the SNMP manager.
The incorrect community string is configured on the SNMP manager.
Refer to the exhibit. Which SNMP authentication password must be used by the member of the ADMIN group that is configured on router R1?
Cisco54321
Cisco98765
Cisco123456
Cisco654321
A network administrator has noticed an unusual amount of traffic being received on a switch port that is connected to a college classroom computer. Which tool would the administrator use to make the suspicious traffic available for analysis at the college data center?
RSPAN
TACACS+
802.1X
DHCP snooping
SNMP
What network monitoring tool copies traffic moving through one switch port, and sends the copied traffic to another switch port for analysis?
802.1X
SNMP
SPAN
Syslog
Voice packets are being received in a continuous stream by an IP phone, but because of network congestion the delay between each packet varies and is causing broken conversations. What term describes the cause of this condition?
Buffering
Latency
Queuing
Jitter
What mechanism compensates for jitter in an audio stream by buffering packets and then replaying them outbound in a steady stream?
Digital signal processor
Playout delay buffer
Voice codec
WFQ
Which type of network traffic cannot be managed using congestion avoidance tools?
TCP
UDP
IP
ICMP
A network administrator has moved the company intranet web server from a switch port to a dedicated router interface. How can the administrator determine how this change has affected performance and availability on the company intranet?
Conduct a performance test and compare with the baseline that was established previously.
Determine performance on the intranet by monitoring load times of company web pages from remote sites.
Interview departmental administrative assistants to determine if web pages are loading more quickly.
Compare the hit counts on the company web server for the current week to the values that were recorded in previous weeks.
In which stage of the troubleshooting process would ownership be researched and documented?
Gather symptoms.
Implement corrective action.
Isolate the problem.
Update the user and document the problem.
Which troubleshooting approach is more appropriate for a seasoned network administrator rather than a less-experienced network administrator?
A less-structured approach based on an educated guess
An approach comparing working and nonworking components to spot significant differences
A structured approach starting with the physical layer and moving up through the layers of the OSI model until the cause of the problem is identified
An approach that starts with the end-user applications and moves down through the layers of the OSI model until the cause of the problem has been identified
A router has been configured to use simulated network traffic in order to monitor the network performance between the router and a distant network device. Which command would display the results of this analysis?
Show ip route
Show ip protocols
Show ip sla statistics
Show monitor
Which type of tool would an administrator use to capture packets that are going to and from a particular device?
NMS tool
Knowledge base
Baselining tool
Protocol analyzer
Refer to the exhibit. Which two statements describe the results of entering these commands? (Choose two.)
R1 will send system messages of levels 0 (emergencies) to level 4 (warnings) to a server.
R1 will not send critical system messages to the server until the command debug all is entered.
R1 will reset all the warnings to clear the log.
R1 will output the system messages to the local RAM.
The syslog server has the IPv4 address 192.168.10.10.
Refer to the exhibit. A network administrator discovers that host A is having trouble with Internet connectivity, but the server farm has full connectivity. In addition, host A has full connectivity to the server farm. What is a possible cause of this problem?
The router has an incorrect gateway.
Host A has an overlapping network address.
Host A has an incorrect default gateway configured.
Host A has an incorrect subnet mask.
NAT is required for the host A network.
Match the operation to the appropriate QoS model.
Best Effort | IntServ | DiffServ | |
---|---|---|---|
Network devices are setup to handle multiple traffic classes | |||
End-to-end QoS is provided. | |||
Traffic is identied in classes based on businesses requirements | |||
The model is most scalable | |||
Network resources are requested | |||
No packets receive preferential tratment |
Uses Internet to provide services
Private cloud
Hybrid cloud
Public cloud
Community cloud
Consists of two or more types of clouds
Private cloud
Hybrid cloud
Public cloud
Community cloud
Customized for functional needs
Private cloud
Hybrid cloud
Public cloud
Community cloud
Available to a single specific organization
Private cloud
Hybrid cloud
Public cloud
Community cloud
Excess traffic is retained in a queue and scheduled for later transmission over increments of time
Classification
Marking
Traffic shaping
Traffic policing
N/A
Excess traffic is dropped when the traffic rate reached a preconfigured maximum
Classification
Marking
Traffic shaping
Traffic policing
N/A
This determines the class of traffic to which frames belong
Classification
Marking
Traffic shaping
Traffic policing
N/A
A value is added to a packet header
Classification
Marking
Traffic shaping
Traffic policing
N/A
TCP traffic is throttled to prevent tail drop
Classification
Marking
Traffic shaping
Traffic policing
N/A
{"name":"CCNA4 Final 3", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Which two technologies are private WAN technologies? (Choose two.), Which WAN technology can switch any type of payload based on labels?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}