CCNA4 Final 2

What are two types of WAN providers? (Choose two.)
DNS servers
Satellite service
Web hosting service
Telephone company
Which two types of devices are specific to WAN environments and are not found on a LAN? (Choose two.)
Access layer switch
Broadband modem
Core switch
CSU/DSU
What is a feature of dense wavelength-division multiplexing (DWDM) technology?
It replaces SONET and SDH technologies.
It enables bidirectional communications over one strand of fiber.
It provides Layer 3 support for long distance data communications.
It provides a 10 Gb/s multiplexed signal over analog copper telephone lines.
What is a disadvantage of ATM compared to Frame Relay?
Less efficient
Lacks SVC support
Does not scale well to provide high speed WAN connections
Requires multiple interfaces on the edge router to support multiple VCs
Which WAN solution uses labels to identify the path in sending packets through a provider network?
Cable
DSL
Frame Relay
MPLS
VSAT
An intercity bus company wants to offer constant Internet connectivity to the users traveling on the buses. Which two types of WAN infrastructure would meet the requirements? (Choose two.)
Private infrastructure
Public infrastructure
Dedicated
Circuit-switched
Cellular
What device is needed at a central office to aggregate many digital subscriber lines from customers?
CMTS
DSLAM
CSU/DSU
Access server
A corporation is searching for an easy and low cost solution to provide teleworkers with a secure connection to headquarters. Which solution should be selected?
Dial-up connection
Leased line connection
Site-to-site VPN over the Internet
Remote access VPN over the Internet
What is the maximum number of DS0 channels in a 1.544 Mbps T1 line?
2
12
24
28
Refer to the exhibit. What type of Layer 2 encapsulation will be used for RtrA connection D if it is left to the default and the router is a Cisco router?
Ethernet
Frame Relay
HDLC
PPP
Which two functions are provided by the NCP during a PPP connection? (Choose two.)
Identifying fault conditions for the PPP link
Providing multilink capabilities over the PPP link
Bringing the network layer protocol or protocols up and down
Enhancing security by providing callback over PPP
Negotiating options for the IP protocol
Managing authentication of the peer routers of the PPP link
What PPP information will be displayed if a network engineer issues the show ppp multilink command on Cisco router?
The link LCP and NCP status
The queuing type on the link
The IP addresses of the link interfaces
The serial interfaces participating in the multilink
Refer to the exhibit. Which statement describes the status of the PPP connection?
Only the link-establishment phase completed successfully.
Only the network-layer phase completed successfully.
Neither the link-establishment phase nor the network-layer phase completed successfully.
Both the link-establishment and network-layer phase completed successfully.
A network administrator is configuring a PPP link with the commands:
 
R1(config-if)# encapsulation ppp
R1(config-if)# ppp quality 70
 
What is the effect of these commands?
The PPP link will be closed down if the link quality drops below 70 percent.
The NCP will send a message to the sending device if the link usage reaches 70 percent.
The LCP establishment phase will not start until the bandwidth reaches 70 percent or more.
The PPP link will not be established if more than 30 percent of options cannot be accepted.
How does virtualization help with disaster recovery within a data center?
Power is always provided.
Less energy is consumed.
Server provisioning is faster.
Hardware does not have to be identical.
Which broadband solution is appropriate for a home user who needs a wired connection not limited by distance?
Cable
DSL
WiMax
ADSL
What is the protocol that provides ISPs the ability to send PPP frames over DSL networks?
PPPoE
CHAP
ADSL
LTE
In software defined network architecture, what function is removed from network devices and performed by an SDN controller?
Control plane
Data plane
Security
Application policies
What would a network administrator expect the routing table of stub router R1 to look like if connectivity to the ISP was established via a PPPoE configuration?
192.168.1.0/32 is subnetted, 2 subnetted C 192.168.1.1 is directly connected, Dialer1 C 192.168.1.2 is directly connected, Dialer2
S* 0.0.0.0/0 is directly connected, Dialer1
192.168.1.0/32 is subnetted, 2 subnetted C 192.168.1.1 is directly connected, Dialer
S* 0.0.0.0/0 is directly connected, Dialer1 192.168.1.0/32 is subnetted, 2 subnetted C 192.168.1.1 is directly connected, Dialer1 C 192.168.1.2 is directly connected, Dialer1
What is a benefit of implementing a Dynamic Multipoint VPN network design?
A DMVPN will use an encrypted session and does not require IPsec.
A DMVPN uses a Layer 3 protocol, NHRP, to dynamically establish tunnels.
A DMVPN will support remote peers by providing a mapping database of public IP addresses to each one.
A DMVPN uses mGRE to create multiple GRE interfaces that each support a single VPN tunnel.
Which remote access implementation scenario will support the use of generic routing encapsulation tunneling?
A mobile user who connects to a router at a central site
A branch office that connects securely to a central site
A mobile user who connects to a SOHO site
A central site that connects to a SOHO site without encryption
Refer to the exhibit. All routers are successfully running the BGP routing protocol. How many routers must use EBGP in order to share routing information across the autonomous systems?
2
3
4
5
Which three values or sets of values are included when creating an extended access control list entry? (Choose three.)
Access list number between 1 and 99
Access list number between 100 and 199
Default gateway address and wildcard mask
Destination address and wildcard mask
Source address and wildcard mask
Source subnet mask and wildcard mask
Destination subnet mask and wildcard mask
Refer to the exhibit. A router has an existing ACL that permits all traffic from the 172.16.0.0 network. The administrator attempts to add a new ACE to the ACL that denies packets from host 172.16.0.1 and receives the error message that is shown in the exhibit. What action can the administrator take to block packets from host 172.16.0.1 while still permitting all other traffic from the 172.16.0.0 network?
Manually add the new deny ACE with a sequence number of 5.
Manually add the new deny ACE with a sequence number of 15.
Create a second access list denying the host and apply it to the same interface.
Add a deny any any ACE to access-list 1.
Which three implicit access control entries are automatically added to the end of an IPv6 ACL? (Choose three.)
Deny ip any any
Deny ipv6 any any
Permit ipv6 any any
Deny icmp any any
Permit icmp any any nd-ns
Permit icmp any any nd-na
The computers used by the network administrators for a school are on the 10.7.0.0/27 network. Which two commands are needed at a minimum to apply an ACL that will ensure that only devices that are used by the network administrators will be allowed Telnet access to the routers? (Choose two.)
Access-class 5 in
Access-list 5 deny any
Access-list standard VTY permit 10.7.0.0 0.0.0.127
Access-list 5 permit 10.7.0.0 0.0.0.31
Ip access-group 5 out
Ip access-group 5 in
A network administrator is adding ACLs to a new IPv6 multirouter environment. Which IPv6 ACE is automatically added implicitly at the end of an ACL so that two adjacent routers can discover each other?
Permit ip any any
Permit ip any host ip_address
Permit icmp any any nd-na
Deny ip any any
What would be the primary reason an attacker would launch a MAC address overflow attack?
So that the switch stops forwarding traffic
So that legitimate hosts cannot obtain a MAC address
So that the attacker can see frames that are destined for other hosts
So that the attacker can execute arbitrary code on the switch
What are three of the six core components in the Cisco IoT system? (Choose three.)
Fog computing
Wearable technologies
Data analytics
Robot guides
Cyber and physical security
Smart bandages
What security countermeasure is effective for preventing CAM table overflow attacks?
Port security
DHCP snooping
IP source guard
Dynamic ARP Inspection
Which SNMP feature provides a solution to the main disadvantage of SNMP polling?
SNMP set messages
SNMP trap messages
SNMP get messages
SNMP community strings
When SNMPv1 or SNMPv2 is being used, which feature provides secure access to MIB objects?
Packet encryption
Message integrity
Community strings
Source validation
Features
What two are added in SNMPv3 to address the weaknesses of previous versions of SNMP? (Choose two.)
Bulk MIB objects retrieval
Encryption
Authorization with community string priority
Authentication
ACL management filtering
Which queuing mechanism supports user-defined traffic classes?
FIFO
CBWFQ
WFQ
FCFS
Which field is used to mark Layer 2 Ethernet frames for QoS treatment?
Type of Service field
Traffic Class field
Priority field
Version field
Which statement describes a characteristic of standard IPv4 ACLs?
They are configured in the interface configuration mode.
They filter traffic based on source IP addresses only.
They can be created with a number but not with a name.
They can be configured to filter traffic based on both source IP addresses and source ports.
What is an example of cloud computing?
A continuous interaction between people, processes, data, and things
A service that offers on-demand access to shared resources
A network infrastructure that spans a large geographic area
An architectural style of the World Wide Web
Which type of resources are required for a Type 1 hypervisor?
A host operating system
A server running VMware Fusion
A management console
A dedicated VLAN
A network technician made a configuration change on the core router in order to solve a problem. However, the problem is not solved. Which step should the technician take next?
Gather symptoms.
Isolate the problem.
Restore the previous configuration.
Implement the next possible corrective action.
A user reports that when the corporate web page URL is entered on a web browser, an error message indicates that the page cannot be displayed. The help-desk technician asks the user to enter the IP address of the web server to see if the page can be displayed. Which troubleshooting method is being used by the technician?
Top-down
Bottom-up
Substitution
Divide-and-conquer
What is a primary function of the Cisco IOS IP Service Level Agreements feature?
To detect potential network attacks
To provide network connectivity for customers
To adjust network device configurations to avoid congestion
To measure network performance and discover a network failure as early as possible
Which IOS log message level indicates the highest severity level?
Level 0
Level 1
Level 4
Level 7
Which symptom is an example of network issues at the network layer?
A misconfigured firewall blocks traffic to a file server.
There are too many invalid frames transmitted in the network.
Neighbor adjacency is formed with some routers, but not all routers.
A web server cannot be reached by its domain name, but can be reached via its IP address.
Refer to the exhibit. H1 can only ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 can ping H4 and H5. Why might H1 not be able to successfully ping H4 and H5?
Router R1 does not have a route to the destination network.
Switch S1 does not have an IP address configured.
The link between router R1 and switch S2 has failed.
Host H1 does not have a default gateway configured.
Hosts H4 and H5 are members of a different VLAN than host H1.
Refer to the exhibit. On the basis of the output, which two statements about network connectivity are correct? (Choose two.)
There is connectivity between this device and the device at 192.168.100.1.
The connectivity between these two hosts allows for videoconferencing calls.
There are 4 hops between this device and the device at 192.168.100.1.
The average transmission time between the two hosts is 2 milliseconds.
This host does not have a default gateway configured.
Fill in the blanks. Use dotted decimal format. The wildcard mask that is associated with 128.165.216.0/23 is
Match the characteristic to the appropriate authentication protocol.
Uses two-way handshake
Uses three-way handshake
Repeated challenges
Single challenge
Strong authentication
Weak authentication
Clear text passwords
Encrypted passwords
Uses a one-way handshake
Bandwidth
Delay
Congestion
Jitter
Measured in the number of bits that can be sent in a single second
The time it takes for a message to travel from the source to the destination
An interface that is presented with more traffic than it can handle
The variation in the latency between each received packet
Packets that are buffered and played out in a steady stream
What is a primary difference between a company LAN and the WAN services that it uses?
The company must subscribe to an external WAN service provider.
The company has direct control over its WAN links but not over its LAN.
Each LAN has a specified demarcation point to clearly separate access layer and distribution layer equipment.
The LAN may use a number of different network access layer standards whereas the WAN will use only one standard.
To which two layers of the OSI model do WAN technologies provide services? (Choose two.)
Network layer
Session layer
Physical layer
Transport layer
Data link layer
Presentation layer
{"name":"CCNA4 Final 2", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"What are two types of WAN providers? (Choose two.), Which two types of devices are specific to WAN environments and are not found on a LAN? (Choose two.), What is a feature of dense wavelength-division multiplexing (DWDM) technology?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker