CCNA 4
A user is attempting to access http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)
DNS server default gateway
How does the service password-encryption command enhance password security on Cisco routers and switches?
It encrypts passwords that are stored in router or switch configuration files.
Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)
The Source Address field name from IPv4 is kept in IPv6. The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.
Users are reporting longer delays in authentication and in accessing network resources during certain time periods of the week. What kind of information should network engineers check to find out if this situation is part of a normal network behavior?
the network performance baseline
What technique is used with UTP cable to help protect against signal interference from crosstalk?
twisting the wires together into pairs
Refer to the exhibit. Which two network addresses can be assigned to the network containing 10 hosts? Your answers should waste the fewest addresses, not reuse addresses that are already assigned, and stay within the 10.18.10.0/24 range of addresses. (Choose two.)
10.18.10.208/28 10.18.10.224/28
What would be the interface ID of an IPv6 enabled interface with a MAC address of 1C-6F-65-C2-BD-F8 when the interface ID is generated by using the EUI-64 process?
1E6F:65FF:FEC2:BDF8
Refer to the exhibit. A network engineer has been given the network address of 192.168.99.0 and a subnet mask of 255.255.255.192 to subnet across the four networks shown. How many total host addresses are unused across all four subnets?
200
What is the subnet ID associated with the IPv6 address 2001:DA48:FC5:A4:3D1B::1/64?
2001:DA48:FC5:A4::/64
A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network?
255.255.255.0
A network administrator wants to have the same network mask for all networks at a particular small site. The site has the following networks and number of devices:IP phones - 22 addressesPCs - 20 addresses neededPrinters - 2 addresses neededScanners - 2 addresses needed The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?
255.255.255.224
A network administrator is adding a new LAN to a branch office. The new LAN must support 10 connected devices. What is the smallest network mask that the network administrator can use for the new network?
255.255.255.240
What service is provided by FTP?
Allows for data transfers between a client and a file server.
What method is used to manage contention-based access on a wireless network?
CSMA/CA
An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.)
Configure the IP domain name on the router. Generate the SSH keys. Enable inbound vty SSH sessions.
A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?
Exit privileged EXEC mode and press Enter .
Which range of link-local addresses can be assigned to an IPv6-enabled interface?
FE80::/10
A client packet is received by a server. The packet has a destination port number of 21. What service is the client requesting?
FTP
A client packet is received by a server. The packet has a destination port number of 143. What service is the client requesting?
IMAP
Refer to the exhibit. The network administrator has assigned the LAN of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 prefix. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the properties of the workgroup server to allow connectivity to the Internet?
IP address: 192.168.10.38 subnet mask: 255.255.255.248, default gateway: 192.168.10.33
What mechanism is used by a router to prevent a received IPv4 packet from traveling endlessly on a network?
It decrements the value of the TTL field by 1 and if the result is 0, it discards the packet and sends a Time Exceeded message to the source host.
Refer to the exhibit. What is wrong with the displayed termination?
The untwisted length of each wire is too long.
What service is provided by BOOTP?
Legacy application that enables a diskless workstation to discover its own IP address and find a BOOTP server on the network.
What attribute of a NIC would place it at the data link layer of the OSI model?
MAC address
Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.)
NAT introduces problems for some applications that require end-to-end connectivity. NAT provides a solution to slow down the IPv4 address depletion.
Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next?
PC2 will send an ARP reply with the PC2 MAC address.
Match a statement to the related network model. (Not all options are used.)
Place the options in the following order:peer-to-peer network [+] no dedicated server is required +] client and server roles are set on a per request basis peer-to-peer aplication [#] requires a specific user interface[#] a background service is required
Which connector is used with twisted-pair cabling in an Ethernet LAN?
RJ 45
A client packet is received by a server. The packet has a destination port number of 69. What service is the client requesting?
TFTP
Refer to the exhibit. What three facts can be determined from the viewable output of the show ip interface brief command? (Choose three.)
The switch can be remotely managed. One device is attached to a physical interface. The default SVI has been configured.
Place the options in the following order:peer-to-peer network
[+] no dedicated server is required[+] client and server roles are set on a per request basis [#] requires a specific user interface [#] a background service is required
What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.)
accessing the media data encapsulation
An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?
all IPv6 configured routers on the local link
An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?
all IPv6 configured routers on the local link
What characteristic describes antivirus software?
applications that protect end devices from becoming infected with malicious software
What are three commonly followed standards for constructing and installing cabling? (Choose three.)
cable lengths pinouts connector types
What are the three parts of an IPv6 global unicast address? (Choose three.)
global routing prefix interface ID subnet ID
Which two functions are performed at the MAC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.) Case 2:
implements trailer with frame check sequence for error detection implements a process to delimit fields within an Ethernet 2 frame case 2: responsible for internal structure of Ethernet frame implements trailer with frame check sequence for error detection case 3: integrates Layer 2 flows between 10 Gigabit Ethernet over fiber and 1 Gigabit Ethernet over copper implements CSMA/CD over legacy shared half-duplex media case 4: applies delimiting of Ethernet frame fields to synchronize communication between nodes implements trailer with frame check sequence for error detection
A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)
interference security coverage area
Refer to the exhibit. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A?
only hosts B, C, and router R1
Match the firewall function to the type of threat protection it provides to the network. (Not all options are used.)
packet filtering - prevents access based on IP or MAC address URL filtering - prevents access to websites network address translator - (none) stateful packet inspection - prevents unsolicited incoming sessions application filtering - prevents access by port number
What are two characteristics shared by TCP and UDP? (Choose two.)
port numbering use of checksum
What is a function of the data link layer?
provides for the exchange of frames over a common local media
What characteristic describes adware?
software that is installed on a user device and collects information about the user
What characteristic describes spyware?
software that is installed on a user device and collects information about the user
When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached?
store-and-forward
Which switching method drops frames that fail the FCS check?
store-and-forward switching
What characteristic describes identity theft?
the use of stolen credentials to access private data
What is the purpose of the TCP sliding window?
to request that a source decrease the rate at which it transmits data