CCNA A4

CCNA A4

Splitter DSLAM Microfilter Transceiver Layer 3 switch 2. A technician is editing and reapplying ACL 115 to a router, what is the result of adding the command access-list 115 permit tcp a172.16.0.0 0.0.255.255 established to the ACL when it is reapplied to the router? All traffic that comes from 172.16.0.0/16 will be allowed. All TCP traffic that is destined for 172.16.0.0/16 is permitted. Any SYN packets that are sent

published on May 20, 201310 responses 0
Next »
1/14

1. Which type of device is located at the central office of a carrier and combines individual DSL connections from multiple users into ohigh-capacity link to the Internet?

Splitter
DSLAM
Microfilter
Transceiver
Layer 3 switch
2/14

2. A technician is editing and reapplying ACL 115 to a router, what is the result of adding the command access-list 115 permit tcp a172.16.0.0 0.0.255.255 established to the ACL when it is reapplied to the router?

All traffic that comes from 172.16.0.0/16 will be allowed.
All TCP traffic that is destined for 172.16.0.0/16 is permitted.
Any SYN packets that are sent to 172.16.0.0/16 will be permitted.
Responses to traffic that originates from the 172.16.0.0/16 network are allowed.
3/14

Refer to the exhibit. Which statement is true about Frame Relay traffic on R1?

Traffic that is mapped to DLCI 201 will exit subinterface Serial 0/0/0.201.
Traffic that exits subinterface Serial 0/0/0.102 is marked with DLCI 201.
Traffic on Serial 0/0/0 is experiencing congestion between R1 and the Frame Switch.
Frames that enter router R1 from a Frame Relay neighbor will have DLCI 201 in the frame header.
4/14

Refer to the exhibit. A packet is being sent from Host A to Host B through the VPN tunnel between R1 and R3. When the packet fir arrives at R3, what are the source and destination IP addresses of the packet?

Source 192.168.1.2 - Destination 192.168.4.2
Source 192.168.3.1 - Destination 192.168.3.2
Source 192.168.2.1 - Destination 192.168.3.2
Source 192.168.3.1 - Destination 192.168.4.2
5/14

5. Refer to the exhibit. A technician issues the show interface s0/0/0 command on R1 while troubleshooting a network problem. Whaconclusions can be determined by from the output shown? (Choose two.)

Hint: 2 choices
The bandwidth has been set to the value of a T1 line.
This interface should be configured for PPP encapsulation.
There is no failure indicated in an OSI Layer 1 or Layer 2.
The physical connection between the two routers has failed.
The IP address of S0/0/0 is invalid, given the subnet mask being used.
6/14

6. Which tunneling technique automatically establishes the connection of IPv6 networks through an IPv4 network without needing tospecify manual translations of IPv6 destination addresses to IPv4 destination addresses?

Teredo tunnelling
ISATAP tunnelling
dynamic 6to4 tunneling
manual IPv6-over-IPv4 tunneling
7/14

7. What is tunneling?

A wildcard mask must be created by inverting the subnet mask.
A wildcard mask performs the same function as a subnet mask
A wildcard mask of 0.0.0.0 means the address should match exactly.
A wildcard mask uses a "1" to identify IP address bits that must be checked.
8/14

8. Refer to the exhibit. EastSW is a replacement switch borrowed from another branch. The network technician configures the replacemmaking many VTP and VLAN modifications. Just prior to attaching the replacement to the live network, the technician modifies it to beclient. EastSW is then attached to the network. The technician assumes that the correct VLAN information will be propagated from Wsoon as the two switches are directly connected. What is the reason WestSW did not send a VLAN update to EastSW?

The VTP server and VTP client are using different management VLANs.
The VTP server and VTP client have the same configuration revision number
The VTP client should have been configured as a VTP server.
WestSW should have been reloaded before connecting EastSW into the network.
EastSW has fewer VLANs than WestSW.
9/14

9. What major benefit does Cisco HDLC provide that ISO standard HDLC lacks?

flow control
error control
multiprotocol support
cyclic redundancy checks
10/14

10. A network administrator determines that falsified routing information is propagating through the network. What action can be used taddress this threat?

Update the IOS images
Change console passwords.
Employ end-user authentication.
Configure routing protocol authentication.
11/14

11. Which WAN connection type uses a fixed-length 53 byte cell for transmitting data?

ATM
X.25
ISDN
Frame Relay
12/14

12. What is a common use of a TFTP server?

To allow access to restricted system resources
To detect attacks against a network and send logs to a management console
To provide active defense mechanisms that prevent attacks against the network
To perform IOS image and configuration uploads and downloads over the network
13/14

Refer to the exhibit. Based on the output as shown, which two statements correctly define how the router will treat Telnet traffic thatcomes into interface FastEthernet 0/1? (Choose two).

Hint: 2 choices
Telnet to 172.16.10.0/24 is denied.
Telnet to 172.16.20.0/24 is denied.
Telnet to 172.16.0.0/24 is permitted.
Telnet to 172.16.10.0/24 is permitted
Telnet to 172.16.20.0/24 is permitted.
14/14

14. While troubleshooting a PPP link that uses PAP authentication, a network administrator notices an incorrectly configured passwordthe running configuration. The administrator corrects the error by entering the command ppp pap sent-username ROUTER_NAMpassword NEW_PASSWORD, but the link still does not come up.

Assuming that the rest of the configuration is correct and that the link has no physical layer problems, what should the administrator.
Save the configuration to NVRAM.
Shut down the interface then re-enable it.
Generate traffic by pinging the remote router.
Use CHAP to ensure compatibility with the remote router.