1. Question
Which statement best describes a WAN?- A WAN interconnects LANs over long distances.
2. Question
Connecting offices at different locations using the Internet can be economical for a business. What are two important business policy issues that should be addressed when using the Internet for this purpose? (Choose two.)- privacy
- security
3. Question
What is a disadvantage of a packet-switched network compared to a circuit-switched network?- higher latency
4. Question
A company is considering updating the campus WAN connection. Which two WAN options are examples of the private WAN architecture? (Choose two.)- leased line
- Ethernet WAN
5. Question
Which statement describes a characteristic of dense wavelength division multiplexing (DWDM)?- It can be used in long-range communications, like connections between ISPs.
6. Question
Which WAN technology can serve as the underlying network to carry multiple types of network traffic such as IP, ATM, Ethernet, and DSL?7. Question
Which two WAN technologies are more likely to be used by a business than by teleworkers or home users? (Choose two.)- MetroE
8. Question
The security policy in a company specifies that the staff in the sales department must use a VPN to connect to the corporate network to access the sales data when they travel to meet customers. What component is needed by the sales staff to establish a remote VPN connection?- VPN client software
9. Question
A corporation is searching for an easy and low cost solution to provide teleworkers with a secure connection to headquarters. Which solution should be selected?- remote access VPN over the Internet
10. Question
How many DS0 channels are bundled to produce a 1.544 Mbps T1 line?- 24
11. Question
Refer to the exhibit. Which type of Layer 2 encapsulation used for connection D requires Cisco routers?12. Question
Which three statements are true about PPP? (Choose three.)- PPP can use synchronous and asynchronous circuits.
- PPP uses LCPs to establish, configure, and test the data-link connection.
- PPP uses LCPs to agree on format options such as authentication, compression, and error detection.
13. Question
A network administrator is configuring a PPP link with the commands:R1(config-if)# encapsulation ppp
R1(config-if)# ppp quality 70What is the effect of these commands?- The PPP link will be closed down if the link quality drops below 70 percent.
14. Question
What function is provided by Multilink PPP?- spreading traffic across multiple physical WAN links
15. Question
The graphic shows two boxes. The first box has the following output:R1(config)# show running-config
<output omitted>
username r2 password 0 Cisco
!
interface Serial0/0/0
ip address 209.165.200.225 255.255.255.252
encapsulation ppp
ppp authentication chapThe second box has this output:R2(config)# show running-config
<output omitted>
username r1 password 0 Cisco
!
interface Serial0/0/0
ip address 209.165.200.226 255.255.255.252
encapsulation ppp
ppp authentication chapRefer to the exhibit. A network administrator is configuring the PPP link between the routers R1 and R2. However, the link cannot be established. Based on the partial output of the show running-config command, what is the cause of the problem?- The usernames do not match the host names.
16. Question
Refer to the exhibit. A network administrator has configured routers RTA and RTB, but cannot ping from serial interface to serial interface. Which layer of the OSI model is the most likely cause of the problem?- data link
17. Question
What advantage does DSL have compared to cable technology?- DSL is not a shared medium.
18. Question
Which broadband technology would be best for a user that needs remote access when traveling in mountains and at sea?- satellite
19. Question
Which technology requires the use of PPPoE to provide PPP connections to customers?20. Question
Refer to the exhibit. What is the network administrator verifying when issuing the show ip interface brief command on R1 in respect to the PPPoE connection to R2?- that the Dialer1 interface has been assigned an IP address by the ISP router
21. Question
Which technology creates a mapping of public IP addresses for remote tunnel spokes in a DMVPN configuration?22. Question
What is the purpose of the generic routing encapsulation tunneling protocol?- to manage the transportation of IP multicast and multiprotocol traffic between remote sites
23. Question
Refer to the exhibit. What is used to exchange routing information between routers within each AS?- IGP routing protocols
24. Question
Refer to the exhibit. All routers are successfully running the BGP routing protocol. How many routers must use EBGP in order to share routing information across the autonomous systems?- 4
25. Question
Which IPv4 address range covers all IP addresses that match the ACL filter specified by 172.16.2.0 with wildcard mask 0.0.1.255?- 172.16.2.0 to 172.16.3.255
26. Question
Refer to the exhibit. A named access list called chemistry_block has been written to prevent users on the Chemistry Network and public Internet from access to Records Server. All other users within the school should have access to this server. The list contains the following statements:deny 172.16.102.0 0.0.0.255 172.16.104.252 0.0.0.0
permit 172.16.0.0 0.0.255.255 172.16.104.252 0.0.0.0Which command sequence will place this list to meet these requirements?- Athena(config)# interface fa0/0
Athena(config-if)# ip access-group chemistry_block out
- Athena(config)# interface fa0/0
27. Question
What guideline is generally followed about the placement of extended access control lists?- They should be placed as close as possible to the source of the traffic to be denied.
28. Question
In the creation of an IPv6 ACL, what is the purpose of the implicit final command entries, permit icmp any any nd-na and permit icmp any any nd-ns?- to allow IPv6 to MAC address resolution
29. Question
A network administrator is testing IPv6 connectivity to a web server. The network administrator does not want any other host to connect to the web server except for the one test computer. Which type of IPv6 ACL could be used for this situation?- only a named ACL
30. Question
Refer to the exhibit. The IPv6 access list LIMITED_ACCESS is applied on the S0/0/0 interface of R1 in the inbound direction. Which IPv6 packets from the ISP will be dropped by the ACL on R1?- ICMPv6 packets that are destined to PC1
31. Question
What is a secure configuration option for remote access to a network device?- Configure SSH.
32. Question
What protocol should be disabled to help mitigate VLAN attacks?33. Question
Which term describes the role of a Cisco switch in the 802.1X port-based access control?34. Question
What two protocols are supported on Cisco devices for AAA communications? (Choose two.)- TACACS+
35. Question
In configuring SNMPv3, what is the purpose of creating an ACL?- to specify the source addresses allowed to access the SNMP agent
36. Question
Refer to the exhibit. What feature does an SNMP manager need in order to be able to set a parameter on switch ACSw1?- a manager who is using host 192.168.0.5
37. Question
Which Cisco feature sends copies of frames entering one port to a different port on the same switch in order to perform traffic analysis?- SPAN
38. Question
What are two characteristics of video traffic? (Choose two.)- Video traffic is unpredictable and inconsistent.
- Video traffic latency should not exceed 400 ms.
39. Question
Which QoS mechanism allows delay-sensitive data, such as voice, to be sent first before packets in other queues are sent?- LLQ
40. Question
Refer to the exhibit. As traffic is forwarded out an egress interface with QoS treatment, which congestion avoidance technique is used?- traffic shaping
41. Question
Which type of QoS marking is applied to Ethernet frames?42. Question
What is the function of a QoS trust boundary?- A trust boundary identifies which devices trust the marking on packets that enter a network.
43. Question
A vibration sensor on an automated production line detects an unusual condition. The sensor communicates with a controller that automatically shuts down the line and activates an alarm. What type of communication does this scenario represent?- machine-to-machine
44. Question
Which pillar of the Cisco IoT System allows data to be analyzed and managed at the location where it is generated?- fog computing
45. Question
Which Cloud computing service would be best for a new organization that cannot afford physical servers and networking equipment and must purchase network services on-demand?46. Question
A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?47. Question
What is used to pre-populate the adjacency table on Cisco devices that use CEF to process packets? - the ARP table
48. Question
Which component of the ACI architecture translates application policies into network programming?- the Application Policy Infrastructure Controller
49. Question
Which two pieces of information should be included in a logical topology diagram of a network? (Choose two.)- connection type
- interface identifier
50. Question
Which network performance statistics should be measured in order to verify SLA compliance?- latency, jitter, and packet loss
51. Question
Which feature sends simulated data across the network and measures performance between multiple network locations?- IP SLA
52. Question
Which troubleshooting tool would a network administrator use to check the Layer 2 header of frames that are leaving a particular host?- protocol analyzer
53. Question
Refer to the exhibit. A network administrator is troubleshooting the OSPF network. The 10.10.0.0/16 network is not showing up in the routing table of Router1. What is the probable cause of this problem?- There is an incorrect wildcard mask statement for network 10.10.0.0/16 on Router2.
54. Question
Refer to the exhibit. A user turns on a PC after it is serviced and calls the help desk to report that the PC seems unable to reach the Internet. The technician asks the user to issue the arp –a and ipconfig commands. Based on the output, what are two possible causes of the problem? (Choose two.)- The IP configuration is incorrect.
- The default gateway device cannot be contacted.
55. Question
Match OoS techniques with the description. (Not all options are used.)
CCNA4 v6.0 Final Exam Form B Full 100% 2017
1. Question
Which circumstance would result in an enterprise deciding to implement a corporate WAN?- when its employees become distributed across many branch locations
2. Question
What are two types of WAN providers? (Choose two.)- satellite service
- telephone company
3. Question
Which two types of devices are specific to WAN environments and are not found on a LAN? (Choose two.)- broadband modem
- CSU/DSU
4. Question
What is a feature of dense wavelength-division multiplexing (DWDM) technology?- It enables bidirectional communications over one strand of fiber.
5. Question
What is a disadvantage of ATM compared to Frame Relay?- less efficient
6. Question
Which WAN solution uses labels to identify the path in sending packets through a provider network?7. Question
An intercity bus company wants to offer constant Internet connectivity to the users traveling on the buses. Which two types of WAN infrastructure would meet the requirements? (Choose two.)- public infrastructure
- cellular
8. Question
What device is needed at a central office to aggregate many digital subscriber lines from customers?9. Question
A corporation is searching for an easy and low cost solution to provide teleworkers with a secure connection to headquarters. Which solution should be selected?- remote access VPN over the Internet
10. Question
What is the maximum number of DS0 channels in a 1.544 Mbps T1 line?- 24
11. Question
Refer to the exhibit. What type of Layer 2 encapsulation will be used for RtrA connection D if it is left to the default and the router is a Cisco router?- HDLC
12. Question
Which two functions are provided by the NCP during a PPP connection? (Choose two.)- bringing the network layer protocol or protocols up and down
- negotiating options for the IP protocol
13. Question
What PPP information will be displayed if a network engineer issues the show ppp multilink command on Cisco router?- the serial interfaces participating in the multilink
14. Question
Refer to the exhibit. Which statement describes the status of the PPP connection?- Both the link-establishment and network-layer phase completed successfully.
15. Question
A network administrator is configuring a PPP link with the commands:R1(config-if)# encapsulation ppp
R1(config-if)# ppp quality 70What is the effect of these commands?- The PPP link will be closed down if the link quality drops below 70 percent.
16. Question
How does virtualization help with disaster recovery within a data center?- Power is always provided.
- Hardware does not have to be identical.
17. Question
Which broadband solution is appropriate for a home user who needs a wired connection not limited by distance?18. Question
What is the protocol that provides ISPs the ability to send PPP frames over DSL networks?- PPPoE
19. Question
In software defined network architecture, what function is removed from network devices and performed by an SDN controller?- control plane
20. Question
What would a network administrator expect the routing table of stub router R1 to look like if connectivity to the ISP was established via a PPPoE configuration?- S* 0.0.0.0/0 is directly connected, Dialer1
192.168.1.0/32 is subnetted, 2 subnetted
C 192.168.1.1 is directly connected, Dialer1
C 192.168.1.2 is directly connected, Dialer1
- S* 0.0.0.0/0 is directly connected, Dialer1
21. Question
What is a benefit of implementing a Dynamic Multipoint VPN network design?- A DMVPN will support remote peers by providing a mapping database of public IP addresses to each one.
22. Question
Which remote access implementation scenario will support the use of generic routing encapsulation tunneling?- a central site that connects to a SOHO site without encryption
23. Question
Refer to the exhibit. All routers are successfully running the BGP routing protocol. How many routers must use EBGP in order to share routing information across the autonomous systems?- 4
24. Question
Which statement describes a characteristic of standard IPv4 ACLs?- They filter traffic based on source IP addresses only.
25. Question
Which three values or sets of values are included when creating an extended access control list entry? (Choose three.)- access list number between 100 and 199
- destination address and wildcard mask
- source address and wildcard mask
26. Question
Refer to the exhibit. A router has an existing ACL that permits all traffic from the 172.16.0.0 network. The administrator attempts to add a new ACE to the ACL that denies packets from host 172.16.0.1 and receives the error message that is shown in the exhibit. What action can the administrator take to block packets from host 172.16.0.1 while still permitting all other traffic from the 172.16.0.0 network?- Manually add the new deny ACE with a sequence number of 5.
27. Question
Which three implicit access control entries are automatically added to the end of an IPv6 ACL? (Choose three.)- deny ipv6 any any
- permit icmp any any nd-na
28. Question
The computers used by the network administrators for a school are on the 10.7.0.0/27 network. Which two commands are needed at a minimum to apply an ACL that will ensure that only devices that are used by the network administrators will be allowed Telnet access to the routers? (Choose two.)- access-class 5 in
- access-list 5 permit 10.7.0.0 0.0.0.31
29. Question
A network administrator is adding ACLs to a new IPv6 multirouter environment. Which IPv6 ACE is automatically added implicitly at the end of an ACL so that two adjacent routers can discover each other?- permit icmp any any nd-na
30. Question
What would be the primary reason an attacker would launch a MAC address overflow attack?- so that the attacker can see frames that are destined for other hosts
31. Question
What are three of the six core components in the Cisco IoT system? (Choose three.)- fog computing
- data analytics
- cyber and physical security
32. Question
What security countermeasure is effective for preventing CAM table overflow attacks?- port security
33. Question
What two protocols are supported on Cisco devices for AAA communications? (Choose two.)- TACACS+
34. Question
Which SNMP feature provides a solution to the main disadvantage of SNMP polling?- SNMP trap messages
35. Question
When SNMPv1 or SNMPv2 is being used, which feature provides secure access to MIB objects?- community strings
36. Question
What two features are added in SNMPv3 to address the weaknesses of previous versions of SNMP? (Choose two.)- encryption
- authentication
37. Question
Refer to the exhibit. What feature does an SNMP manager need in order to be able to set a parameter on switch ACSw1?- a manager who is using host 192.168.0.5
38. Question
Which queuing mechanism supports user-defined traffic classes?39. Question
Which QoS mechanism allows delay-sensitive data, such as voice, to be sent first before packets in other queues are sent?- LLQ
40. Question
Refer to the exhibit. As traffic is forwarded out an egress interface with QoS treatment, which congestion avoidance technique is used?- traffic shaping
41. Question
Which field is used to mark Layer 2 Ethernet frames for QoS treatment?- Priority field
42. Question
What is the function of a QoS trust boundary?- A trust boundary identifies which devices trust the marking on packets that enter a network.
43. Question
Which pillar of the Cisco IoT System allows data to be analyzed and managed at the location where it is generated?- fog computing
44. Question
What is an example of cloud computing?- a service that offers on-demand access to shared resources
45. Question
Which type of resources are required for a Type 1 hypervisor?- a management console
46. Question
A network technician made a configuration change on the core router in order to solve a problem. However, the problem is not solved. Which step should the technician take next?- Restore the previous configuration.
47. Question
A user reports that when the corporate web page URL is entered on a web browser, an error message indicates that the page cannot be displayed. The help-desk technician asks the user to enter the IP address of the web server to see if the page can be displayed. Which troubleshooting method is being used by the technician?- divide-and-conquer
48. Question
What is a primary function of the Cisco IOS IP Service Level Agreements feature?- to measure network performance and discover a network failure as early as possible
49. Question
Which IOS log message level indicates the highest severity level?- level 0
50. Question
Which symptom is an example of network issues at the network layer?- Neighbor adjacency is formed with some routers, but not all routers.
51. Question
Refer to the exhibit. H1 can only ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 can ping H4 and H5. Why might H1 not be able to successfully ping H4 and H5?- Host H1 does not have a default gateway configured.
52. Question
Refer to the exhibit. On the basis of the output, which two statements about network connectivity are correct? (Choose two.)- There is connectivity between this device and the device at 192.168.100.1.
- There are 4 hops between this device and the device at 192.168.100.1.
53. Question
Fill in the blanks. Use dotted decimal format.
The wildcard mask that is associated with 128.165.216.0/23 is 0.0.1.255 .54. Question
Match the characteristic to the appropriate authentication protocol. (Not all options are used.)55. Question
Match the term to the description. (Not all options are used.)
0 commentaires:
Enregistrer un commentaire