menu

Search This Blog

Tuesday, May 28, 2013

ccna 4 chapter 6 question and answer, cisco question and answer, cisco tutorial

CCNA 4 Chapter 6 Question and Answer

(Total 26 Question and Answer)

1. Which two protocols can be used to encapsulate traffic that is traversing a VPN tunnel? (Choose two.)
ATM
CHAP
IPsec
IPX
MPLS
PPTP 
2. What are the three main functions of a secure VPN? (Choose three.)
accounting
authentication
authorization
data availability
data confidentiality
data integrity
3. Data confidentiality through a VPN can be enhanced through the use of which three encryption protocols? (Choose three.)
AES
DES
AH
hash
MPLS
RSA

>> Read More Download This File PDF Format

or

>> Download PDF File (From Server 2)

Note : Download Will Start in new tab.

Thursday, May 23, 2013

ccna 4 chapter 5 question and answer, cisco question and answer, cisco tutorial

CCNA 4 Chapter 5 Question and Answer

(Total 26 Question and Answer)

1. The following commands were entered on a router: 
Router(config)# access-list 2 deny 172.16.5.24 
Router(config)# access-list 2 permit any 
The ACL is correctly applied to an interface. What can be concluded about this set of commands?
The wildcard mask 0.0.0.0 is assumed.
The access list statements are misconfigured.
All nodes on the 172.16.0.0 network will be denied access to other networks.
No traffic will be allowed to access any nodes or services on the 172.16.0.0 network. 
2. Interface s0/0/0 already has an IP ACL applied inbound. What happens when the network administrator attempts to apply a second inbound IP ACL?
The second ACL is applied to the interface, replacing the first.
Both ACLs are applied to the interface.
The network administrator receives an error.
Only the first ACL remains applied to the interface.
3. Which two statements are correct about extended ACLs? (Choose two)
Extended ACLs use a number range from 1-99.
Extended ACLs end with an implicit permit statement.
Extended ACLs evaluate the source and destination addresses.
Port numbers can be used to add greater definition to an ACL.
Multiple ACLs can be placed on the same interface as long as they are in the same direction.

>> Read More Download This File PDF Format

or
>> Download PDF File (From Server 2)

Note : Download Will Start in new tab.

ccna 4 chapter 4 question and answer, cisco question and answer, cisco tutorial

CCNA 4 Chapter 4 Question and Answer

(Total 23 Question and Answer)

1. Which two statements are true regarding network security? (Choose two.)
Securing a network against internal threats is a lower priority because company employees represent a low security risk.
Both experienced hackers who are capable of writing their own exploit code and inexperienced individuals who download exploits from the Internet pose a serious threat to network security.
Assuming a company locates its web server outside the firewall and has adequate backups of the web server, no further security measures are needed to protect the web server because no harm can come from it being hacked.
Established network operating systems like UNIX and network protocols like TCP/IP can be used with their default settings because they have no inherent security weaknesses.
Protecting network devices from physical damage caused by water or electricity is a necessary part of the security policy.

2. Which two statements are true about network attacks? (Choose two.)
Strong network passwords mitigate most DoS attacks.
Worms require human interaction to spread, viruses do not.
Reconnaissance attacks are always electronic in nature, such as ping sweeps or port scans.
A brute-force attack searches to try every possible password from a combination of characters.
Devices in the DMZ should not be fully trusted by internal devices, and communication between the DMZ and internal devices should be authenticated to prevent attacks such as port redirection.

>> Read More Download This File PDF Format

or
>> Download PDF File (From Server 2)

Note : Download Will Start in new tab.

ccna 4 chapter 3 question and answer, cisco question and answer, cisco tutorial

CCNA 4 Chapter 3 Question and Answer

(Total 23 Question and Answer)

1. Which three actions might a Frame Relay switch perform when it detects an excessive build-up of frames in its queue? (Choose three.)
puts a hold on accepting frames in excess of the CIR
drops frames from the queue that have the DE bit set
reduces the number of frames it sends over the link
re-negotiates flow control with the connected device
sets the FECN bit on all frames it receives on the congested link
sets the BECN bit on all frames it places on the congested link

2. Which best describes the benefit of using Frame Relay as opposed to a leased line or ISDN service?
Customers can define their virtual circuit needs in far greater combinations, with increments as small as 64 kbps.
Customers pay for an end-to-end connection that includes the local loop and the network link.
Customers only pay for the local loop and the bandwidth they purchase from the network provider.

Connecting new sites requires new lower cost circuit installations when compared to ISDN dialup costs or adding additional hardware for leased service.

>> Read More Download This File PDF Format

or
>> Download PDF File (From Server 2)

Note : Download Will Start in new tab.

Wednesday, May 22, 2013

ccna 4 chapter 2 question and answer, cisco question and answer, cisco tutorial

CCNA 4 Chapter 2 Question and Answer

(Total 23 Question and Answer)

CCNA4Chapter2V4.0Answers thumb CCNA 4 Chapter 2 V4.0 Answers 
1. Refer to the exhibit. Router R1, the DCE device, has just been configured for PPP encapsulation with authentication. What series of commands will allow another router, the DTE device, to communicate over its serial 0/0/0 interface to router R1?
Router(config)# hostname R3
R3(config)# username R1 password Cisco
R3(config)# interface Serial 0/0/0
R3(config-if)# encapsulation ppp
R3(config-if)# ip address 172.16.3.3 255.255.255.0
R3(config-if)# ppp authentication chap
Router(config)# hostname R3
R3(config)# username R3 password Cisco
R3(config)# interface Serial 0/0/0
R3(config-if)# encapsulation ppp
R3(config-if)# ip address 172.16.3.3 255.255.255.0
R3(config-if)# ppp authentication chap
Router (config)# username Router password Cisco
Router (config)# interface Serial 0/0/0
Router (config-if)# clockrate 64000
Router (config-if)# encapsulation ppp
Router (config-if)# ip address 172.16.3.1 255.255.255.0
Router config-if)# ppp authentication chap
Router (config)# username R1 password Cisco
Router config)# interface Serial 0/0/0
Router (config-if)# clockrate 64000
Router config-if)# encapsulation ppp
Router (config-if)# ip address 172.16.3.1 255.255.255.0
Router (config-if)# ppp authentication chap

2. Which serial communications DTE/DCE interface standard is used to provide high-speed connectivity of up to 52 Mbps between LANs and is found on many high-end Cisco routers?
EIA/TIA 232 (RS-232)
EIA/TIA 422 (RS-422)
EIA/TIA 423 (RS-423)
EIA/TIA-612/613 (HSSI)
ITU V.35

3. Which three statements are true regarding LCP? (Choose three.)
It is responsible for negotiating link establishment.
It negotiates options for Layer 3 protocols running over PPP.
It uses MD5 encryption while negotiating link establishment parameters.
It terminates the link upon user request or the expiration of an inactivity timer.
It can test the link to determine if link quality is sufficient to bring up the link.
It monitors the link for congestion and dynamically adjusts the acceptable window size.

>> Read More Download This File PDF Format

>> Download PDF File (From Server 2)

Note : Download Will Start in new tab.


ccna 4 chapter 1 question and answer, cisco question and answer, cisco tutorial

CCNA 4 Chapter 1 Question and Answer

(Total 23 Question and Answer)

1. Which statement is true about the differences between a WAN and a LAN?
WANs generally support higher bandwidth than LANs support.
A WAN link typically traverses shorter geographic distances than a LAN link traverses.
A WAN often relies on the services of carriers, such as telephone or cable companies, but a LAN does not.
All WAN implementations generally use the same Layer 2 protocol but there are many accepted LAN Layer 2 protocols in use.

2. A U.S. company requires a WAN connection used only to transfer sales data from individual stores to the home office. All transfers will occur after business hours. The required bandwidth for this connection is estimated to be less than 38 kbps. Which type of connection requires the least investment for this company?
ATM
ISDN
analog dialup
T1 Leased Line

>> Read More Download This File PDF Format

>> Download PDF File (From Server 2)

Note : Download Will Start in new tab.

>> Read More


Thursday, May 16, 2013

ccna 1 chapter 3 question and answer, cisco question and answer, cisco tutorial question and answer

CCNA 1 Chapter 3 Question and Answer

(Total 23 Question and Answer)

1. What application layer protocol is commonly used to support for file transfers between a client and a server?
HTML
HTTP
FTP
Telnet 
2. What are two forms of application layer software? (Choose two.)
applications
dialogs
requests
services
syntax

3. A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model? (Choose two.)
centralized administration
does not require specialized software
security is easier to enforce
lower cost implementation
provides a single point of failure

>> Read More Download This File PDF Format

>> Download PDF File (From Server 2)

Note : Download Will Start in new tab.

>> Read More

ccna 3 chapter 7 question and answer, cisco exam question and answer, download ccna 3 chapter 7 question and answer,routing protocols and concepts tutrial

CCNA 3 Chapter 6 Question and Answer

(Total 23 Question and Answer)



1. Which two statements concerning network security are accurate? (Choose two.)

802.11i uses 3DES for encryption.
Open authentication uses no client or AP verification.
The 802.11i protocol is functionally identical to WPA.
802.11i incorporates a RADIUS server for enterprise authentication.
A wireless client first associates with an AP and then authenticates for network access.

2. Which installation method will allow connectivity for a new wireless network?
set up WEP on the access point only
set up open access on both the access point and each device connected to it
set up full encryption on the access point while leaving each device connected to the network open
set up full encryption on each device of the WLAN while leaving the access point settings open

3. Which function is provided by a wireless access point?
dynamically assigns an IP address to the host
provides local DHCP services
converts data from 802.11 to 802.3 frame encapsulation
provides a gateway for connecting to other networks.

>> Read More Download This File PDF Format

>> Download PDF File (From Server 2)

Note : Download Will Start in new tab.

>> Read More


Wednesday, May 15, 2013

ccna 3 chapter 6 question and answer, cisco exam question and answer, download ccna 3 chapter 6 question and answer,routing protocols and concepts tutrial

CCNA 3 Chapter 6 Question and Answer

(Total 23 Question and Answer)


1. What are the steps which must be completed in order to enable inter-VLAN routing usingrouter-on-a-stick?
Configure the physical interfaces on the router and enable a routing protocol.
Create the VLANs on the router and define the port membership assignments on the switch.
Create the VLANs on the switch to include port membership assignment and enable a routing protocol on the router.
Create the VLANs on the switch to include port membership assignment and configure subinterfaces on the router matching the VLANs.

2.
CCNA3Chapter6V4.0Answers1 thumb CCNA 3 Chapter 6 V4.0 Answers
Refer to the exhibit. R1 is routing between networks 192.168.10.0/28 and 192.168.30.0/28. PC1 can ping R1 interface F0/1, but cannot ping PC3. What is causing this failure?
PC1 and PC3 are not in the same VLAN.
The PC3 network address configuration is incorrect.
The S1 interface F0/11 should be assigned to VLAN30.

>> Download PDF File

Note : Download Will Start in new tab.


>> Read More

ccna 3 chapter 5 question and answer, cisco exam question and answer, download ccna 3 chapter 5 question and answer,routing protocols and concepts tutrial

CCNA 3 Chapter 5 Question and Answer

(Total 23 Question and Answer)


1. Which two criteria does a switch use to select the root bridge? (Choose two.)
bridge priority
switching speed
number of ports
base MAC address
switch location
memory size

2. Which two statements are true about the default operation of STP in a Layer 2 switched environment that has redundant connections between switches? (Choose two.)
The root switch is the switch with the highest speed ports.
Decisions on which port to block when two ports have equal cost depend on the port priority and identity.
All trunking ports are designated and not blocked.
Root switches have all ports set as root ports.
Non-root switches each have only one root port.

>> Download PDF File

Note : Download Will Start in new tab.


>> Read More


ccna 2 chapter 6 question and answer, cisco exam question and answer, download ccna 2 chapter 6 question and answer,routing protocols and concepts tutrial

CCNA 2 Chapter 6 Question and Answer

(Total 23 Question and Answer)




1. What two advantages does CIDR provide to a network? (Choose two.)
reduced routing table size
dynamic address assignment
automatic route redistribution
reduced routing update traffic
automatic summarization at classful boundaries

2.
CCNA2Chapter6V4.0Answers1 thumb CCNA 2 Chapter 6 V4.0 Answers
Refer to the exhibit. Which address is a broadcast address for one of the subnets that are shown in the exhibit?
192.168.4.3/29
192.168.4.15/29
192.168.4.65/26
192.168.4.255/24

>> Download PDF File

Note : Download Will Start in new tab.

>> Read More

Dwonload Ajax ebook, download Creating Web Pages with Asynchronous JavaScript and XML ebook, ajax tutorial ebook with php

Download Ajax eBook Free




>> Download This Book (Direct Link)

Note Download will be Open in a new tab.

Tuesday, May 14, 2013

Download Offline Explorer free

Download Offline Explorer


Offline Browser: Download Web sites to your hard disk for offline browsing.

>> Download This Software (Direct Link)


Note Download will be Open in a new tab.

Download HTTrack Offline Browser

Download HTTrack Offline Browser


HTTrack is a free (GPL, libre/free software) and easy-to-use offline browser utility.

>> Download This Software (Direct Link)

Note Download will be Open in a new tab.


Monday, May 13, 2013

ccna 2 chapter 5 question and answer, cisco question and answer, cisco tutorial question ans answer,ccna 2 CCNA 2 routing protocols and concepts

CCNA 2 Chapter 5 Question and Answer



1.
Refer to the exhibit. The network that is shown is running RIPv1. The 192.168.10.0/24 network was recently added and will only contain end users. What command or set of commands should be entered on Router1 to prevent RIPv1 updates from being sent to the end user devices on the new network while still allowing this new network to be advertised to other routers?
Router1(config-router)# no router rip Router1(config-router)# network 192.168.10.0
Router1(config-router)# no network 192.168.10.0
Router1(config-router)# passive-interface fastethernet 0/0
Router1(config-router)# passive-interface serial 0/0/0
2.
Refer to the output from the show ip route command. What can be concluded from the output of this router command?
A preferred route to the destination has not been set.
There are two equal cost paths to network 1.0.0.0.
Both interfaces are being used equally to route traffic.
A variance must be set to load-balance across multiple paths.

>> Download PDF File

Note : Download Will Start in new tab.

ccna 2 chapter 4 question and answer, cisco question and answer, cisco tutorial question ans answer,ccna 2 Routing Protocols and Concepts

CCNA 2 Chapter 3 Question and Answer

Routing Protocols and Concepts

CCNA2Chapter4V4.0Answers1 thumb CCNA 2 Chapter 4 V4.0 Answers

1. What actions will occur after RouterA loses connectivity to network 114.125.16.0? (Choose two.)
RouterB will include network 123.92.76.0 and 136.125.85.0 in its update to RouterA.
During the next update interval, RouterB will send a RIP update out both ports that includes the inaccessible network.
During the next update interval, RouterC will send an update to RouterB stating that network 114.125.16.0 is accessible in 2 hops.
Router C will learn of the loss of connectivity to network 114.125.16.0 from RouterB.
RouterB will include network 123.92.76.0 and 136.125.85.0 in its update to RouterC.

2. What does a router running RIP do first with a new route that is received from an advertisement?
places it immediately in the routing table.
adjusts the metric for the new route to show the added distance for the route
advertises this route out all other interfaces except the one that it came in on
sends a ping packet to verify that the path is a feasible route



>> Download PDF File

Note : Download Will Start in new tab.



ccna 2 chapter 3 question and answer, cisco question and answer, cisco tutorial question ans answer,

CCNA 2 Chapter 3 Question and Answer



1. Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.)
Administrative distance refers to the trustworthiness of a particular route.
router first installs routes with higher administrative distances.
The value of the administrative distance can not be altered by the network administrator.
Routes with the smallest metric to a destination indicate the best path.
The metric is always determined based on hop count.
The metric varies depending which Layer 3 protocol is being routed, such as IP or IPX.

2.
CCNA2Chapter3V4.0Answers1 thumb CCNA 2 Chapter 3 V4.0 Answers
Refer to the exhibit. Which statement correctly describes how R1 will determine the best path to R2?
R1 will install a RIP route using network A in its routing table because the administrative distance of RIP is higher than EIGRP.
R1 will install a RIP route using network A in its routing table because the path cost from RIP is lower than EIGRP.
R1 will install an EIGRP route using network B in its routing table because the administrative distance of EIGRP is lower than RIP.
R1 will install an EIGRP route using network B in its routing table because the path cost from EIGRP is lower than RIP.
R1 will install an EIGRP route and a RIP route in its routing table and load balance between them.


>> Download PDF File

Note : Download Will Start in new tab.

ccna 2 chapter 2 question and answer, cisco question and answer, cisco tutorial question ans answer,

CCNA 2 Chapter 2 Question and Answer


1. A static route that points to the next hop IP will have what administrative distance and metric in the routing table?
administrative distance of 0 and metric of 0
administrative distance of 0 and metric of 1
administrative distance of 1 and metric of 0
administrative distance of 1 and metric of 1

2. What address can be used to summarize networks 172.16.1.0/24, 172.16.2.0/24, 172.16.3.0/24, and 172.16.4.0/24?
172.16.0.0/21
172.16.1.0/22
172.16.0.0 255.255.255.248
172.16.0.0 255.255.252.0 

3.
CCNA2Chapter2V4.0Answers1 thumb CCNA 2 Chapter 2 V4.0 Answers
The routers in the diagram use the subnet assignments shown. What is the most efficient route summary that can be configured on Router3 to advertise the internal networks to the cloud?
192.1.1.0/26 and 192.1.1.64/27
192.1.1.128/25
192.1.1.0/23 and 192.1.1.64/23
192.1.1.0/24
192.1.1.0/25
192.1.1.0/24 and 192.1.1.64/24

>> Download PDF File

Note : Download Will Start in new tab.
Related Posts Plugin for WordPress, Blogger...