CCNA v2 4

Is this your test? Login to manage it. If not, you can develop an assessment just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which IEEE 802.16 broadband wireless technology allows users to connect to the ISP at speeds comparable to DSL and cable?
2.
1 point
What are two effective measures for securing routers? (Choose two.)
3.
1 point
A company is deciding which WAN connection type it should implement between its main office and branch offices. The company wants to use a cost-effective service that provides virtual circuits between each office. The company also wants to be able to transmit variable-length packets on these circuits. Which solution best meets these requirements?
4.
1 point
Which security solution has the responsibility of monitoring suspicious processes that are running on a host and that might indicate infection of Trojan horse applications?
5.
1 point
Which statement is true about NCP?
6.
1 point
What is tunneling?
7.
1 point
Which two statements are true about IPv6 link local addresses? (Choose two.)
8.
1 point
Refer to the exhibit. Which configuration command would result in the output in the exhibit?
9.
1 point
Refer to the exhibit. This serial interface is not functioning correctly. Based on the output shown, what is the most likely cause?
10.
1 point
What functionality do access control lists provide in the implementation of dynamic NAT on a Cisco router?
11.
1 point
Which wireless solution can provide mobile users with non line-of-sight broadband Internet access at speeds comparable to DSL or cable?
12.
1 point
When would the multipoint keyword be used in Frame Relay PVCs configuration?
13.
1 point
Which type of ACL will permit traffic inbound into a private network only if an outbound session has already been established between the source and destination?
14.
1 point
A network administrator is instructing a technician on best practices for applying ACLs. Which two suggestions should the administrator provide? (Choose two.)
15.
1 point
What is the function of an intrusion detection system on a network?
16.
1 point
A network technician analyzes the network and notices late collisions. The collisions occur accompanied by jabber that originates from the server. What is the likely cause of the problem?
17.
1 point
Refer to the exhibit. This router is being configured to use SDM, but the SDM interface of the router cannot be accessed. What is the cause of the problem?
18.
1 point
Which configuration on the vty lines provides the best security measure for network administrators to remotely access the core routers at headquarters?
19.
1 point
Refer to the exhibit. What can be concluded from the exhibited output of the debug ip nat command?
20.
1 point
Refer to the exhibit. A network administrator is creating a prototype to verify the new WAN design. However, the communication between the two routers cannot be established. Based on the output of the commands, what can be done to solve the problem?
21.
1 point
A technician has been asked to run the Cisco SDM one-step lockdown on a customer router. What will be the result of this process?
22.
1 point
Which Frame Relay flow control mechanism is used to signal routers that they should reduce the flow rate of frames?
23.
1 point
An administrator learns of an e-mail that has been received by a number of users in the company. This e-mail appears to come from the office of the administrator. The e-mail asks the users to confirm their account and password information. Which type of security threat does this e-mail represent?
24.
1 point
Refer to the exhibit. A network administrator configures a standard access control list on Router1 to prohibit traffic from the 192.168.0.0/24 network from reaching the Internet. The access control list also permits traffic from the 192.168.0.0/24 network to reach the 192.168.1.0/24 network. On which interface and in which direction should the access control list be applied?
25.
1 point
An administrator issues the command show interfaces s0/1/0 on a router that is configured for Frame Relay. Which console output may indicate an LMI mismatch?
26.
1 point
What is the result of adding the global command service password-encryption to the configuration of a router?
27.
1 point
Refer to the exhibit. This router is being configured to use SDM, but the SDM interface of the router cannot be accessed. What is the cause of the problem?
28.
1 point
A recently patched application server is experiencing response time problems. The network on which the application server is located has been experiencing occasional outages that the network team believes may be related to recent routing changes. Network and application teams have been notified to work on their respective issues. Which statement applies to this situation?
29.
1 point
What does an access control list determine when used with NAT on a Cisco router?
30.
1 point
Refer to the exhibit. Which statement correctly describes how Router1 processes an FTP request that enters interface s0/0/0 and is destined for an FTP server at IP address 192.168.1.5?
31.
1 point
When Frame Relay encapsulation is used, what feature provides flow control and exchanges information about the status of virtual circuits?
32.
1 point
Refer to the exhibit. From the output of the show interfaces and ping commands, at which layer of the OSI model is a fault indicated?
33.
1 point
Refer to the exhibit. EIGRP has been configured as a routing protocol on the network. Users on the 192.168.1.0/24 network should have full access to the web server that is connected to 192.168.3.0/24 but should not be allowed to telnet to router R3. Verifying the configuration, the network administrator realizes that users on network 192.168.1.0/24 can successfully telnet to the router. What should be done to remedy the problem?
34.
1 point
What are three important reasons to establish a network baseline? (Choose three.)
35.
1 point
What will be the result of adding the command ip dhcp excluded-address 192.168.24.1 192.168.24.5 to the configuration of a local router that has been configured as a DHCP server?
36.
1 point
Refer to the exhibit. An ACL called Managers already exists on this router. What happens if the network administrator issues the commands as shown in the exhibit?
37.
1 point
Which WAN connection type uses a fixed-length 53 byte cell for transmitting data?
38.
1 point
What three questions can be answered using data gathered from a baseline on a new network? (Choose three.)
39.
1 point
Refer to the exhibit. An ACL called Managers already exists on this router. What happens if the network administrator issues the commands as shown in the exhibit?
40.
1 point
Which two statements are true about creating and applying access lists? (Choose two.)
41.
1 point
Which IP address and wildcard mask would be used in an ACL to block traffic from all hosts on the same subnet as host 192.168.16.43/28?
42.
1 point
Refer to the exhibit. A network administrator is tasked with completing the Frame Relay topology that interconnects two remote sites. How should the point-to-point subinterfaces be configured on HQ to complete the topology?
43.
1 point
Which combination of Layer 2 protocol and authentication should be used to establish a link without sending authentication information in plain text between a Cisco and a non-Cisco router?
44.
1 point
Refer to the exhibit. Based on the output as shown, which two statements correctly define how the router will treat Telnet traffic that comes into interface FastEthernet 0/1? (Choose two).
45.
1 point
Which three statements accurately describe a security policy? (Choose three.)