CCNA4 v6.0 Final Exam Form B
0.0.1.255
Fill in the blanks. Use dotted decimal format. The wildcard mask that is associated with 128.165.216.0/23 is
Hardware
How does virtualization help with disaster recovery within a data center?
1467 2358
Match the characteristic to the appropriate authentication protocol. (Not all options are used.) PAP
31-null-42
Match the term to the description. (Not all options are used.) bandwidth
a central site
Which remote access implementation scenario will support the use of generic routing encapsulation tunneling?
They filter
Which statement describes a characteristic of standard IPv4 ACLs?
Neighbor
Which symptom is an example of network issues at the network layer?
deny ipv6 any any, nd-ns, nd-na
Which three implicit access control entries are automatically added to the end of an IPv6 ACL? (Choose three.)
100 and 199, destination address, source address
Which three values or sets of values are included when creating an extended access control list entry? (Choose three.)
bringing, negotiating
Which two functions are provided by the NCP during a PPP connection? (Choose two.)
broadband modem, CSU/DSU
Which two types of devices are specific to WAN environments and are not found on a LAN? (Choose two.)
a management console
Which type of resources are required for a Type 1 hypervisor?
CBWFQ
Which queuing mechanism supports user-defined traffic classes?
remote
A corporation is searching for an easy and low cost solution to provide teleworkers with a secure connection to headquarters. Which solution should be selected?
permit icmp
A network administrator is adding ACLs to a new IPv6 multirouter environment. Which IPv6 ACE is automatically added implicitly at the end of an ACL so that two adjacent routers can discover each other?
The PPP link 70 percent.
A network administrator is configuring a PPP link with the commands: R1(config-if)# encapsulation ppp R1(config-if)# ppp quality 70 What is the effect of these commands?
Restore
A network technician made a configuration change on the core router in order to solve a problem. However, the problem is not solved. Which step should the technician take next?
divide-and-conquer
A user reports that when the corporate web page URL is entered on a web browser, an error message indicates that the page cannot be displayed. The help-desk technician asks the user to enter the IP address of the web server to see if the page can be displayed. Which troubleshooting method is being used by the technician?
public infrastructure, cellular
An intercity bus company wants to offer constant Internet connectivity to the users traveling on the buses. Which two types of WAN infrastructure would meet the requirements? (Choose two.)
control plane
In software defined network architecture, what function is removed from network devices and performed by an SDN controller?
Manually 5
Refer to the exhibit. A router has an existing ACL that permits all traffic from the 172.16.0.0 network. The administrator attempts to add a new ACE to the ACL that denies packets from host 172.16.0.1 and receives the error message that is shown in the exhibit. What action can the administrator take to block packets from host 172.16.0.1 while still permitting all other traffic from the 172.16.0.0 network?
4
Refer to the exhibit. All routers are successfully running the BGP routing protocol. How many routers must use EBGP in order to share routing information across the autonomous systems?
traffic shaping
Refer to the exhibit. As traffic is forwarded out an egress interface with QoS treatment, which congestion avoidance technique is used?
Host H1
Refer to the exhibit. H1 can only ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 can ping H4 and H5. Why might H1 not be able to successfully ping H4 and H5?
There is connectivity, There are 4
Refer to the exhibit. On the basis of the output, which two statements about network connectivity are correct? (Choose two.)
192.168.0.5
Refer to the exhibit. What feature does an SNMP manager need in order to be able to set a parameter on switch ACSw1?
HDLC
Refer to the exhibit. What type of Layer 2 encapsulation will be used for RtrA connection D if it is left to the default and the router is a Cisco router?
Both the link-establishment
Refer to the exhibit. Which statement describes the status of the PPP connection?
access-class 5 in, access-list 5 permit 10
The computers used by the network administrators for a school are on the 10.7.0.0/27 network. Which two commands are needed at a minimum to apply an ACL that will ensure that only devices that are used by the network administrators will be allowed Telnet access to the routers? (Choose two.)
the serial interfaces
What PPP information will be displayed if a network engineer issues the show ppp multilink command on Cisco router?
fog, data, cyber
What are three of the six core components in the Cisco IoT system? (Choose three.)
satellite, telephone
What are two types of WAN providers? (Choose two.)
DSLAM
What device is needed at a central office to aggregate many digital subscriber lines from customers?
A DMVPN will support
What is a benefit of implementing a Dynamic Multipoint VPN network design?
less efficient
What is a disadvantage of ATM compared to Frame Relay?
It enables bi
What is a feature of dense wavelength-division multiplexing (DWDM) technology?
to measure
What is a primary function of the Cisco IOS IP Service Level Agreements feature?
service
What is an example of cloud computing?
A trust boundary identifies which
What is the function of a QoS trust boundary?
24
What is the maximum number of DS0 channels in a 1.544 Mbps T1 line?
PPPoE
What is the protocol that provides ISPs the ability to send PPP frames over DSL networks?
port
What security countermeasure is effective for preventing CAM table overflow attacks?
encryption authentication
What two features are added in SNMPv3 to address the weaknesses of previous versions of SNMP? (Choose two.)
RADIUS TACACS+
What two protocols are supported on Cisco devices for AAA communications? (Choose two.)
S* 0.0.0.0/0 is directly connected, Dialer1 (4 lines)
What would a network administrator expect the routing table of stub router R1 to look like if connectivity to the ISP was established via a PPPoE configuration?
so that the attacker
What would be the primary reason an attacker would launch a MAC address overflow attack?
community strings
When SNMPv1 or SNMPv2 is being used, which feature provides secure access to MIB objects?
level 0
Which IOS log message level indicates the highest severity level?
LLQ
Which QoS mechanism allows delay-sensitive data, such as voice, to be sent first before packets in other queues are sent?
SNMP trap messages
Which SNMP feature provides a solution to the main disadvantage of SNMP polling?
MPLS
Which WAN solution uses labels to identify the path in sending packets through a provider network?
cable
Which broadband solution is appropriate for a home user who needs a wired connection not limited by distance?
when its employees
Which circumstance would result in an enterprise deciding to implement a corporate WAN
Priority field
Which field is used to mark Layer 2 Ethernet frames for QoS treatment?
fog
Which pillar of the Cisco IoT System allows data to be analyzed and managed at the location where it is generated?