CCNA Final Exam 4.0

24 Questions  I  By Xiiaolun

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  What functionality do access control lists provide in the implementation of dynamic NAT on a Cisco router?
A.
B.
C.
D.
2.  Which three guidelines would help contribute to creating a strong password policy? (Choose three.)
A.
B.
C.
D.
E.
F.
3.  Refer to the exhibit. Every time the administrator reboots this router, the boot process ends in setup mode. What is a possible problem?
A.
B.
C.
D.
E.
4.  Which option correctly defines the capacity through the local loop guaranteed to a customer by the service provider?
A.
B.
C.
D.
5.  Refer to the exhibit. A host connected to Fa0/0 is unable to acquire an IP address from the DHCP server. The output of the debug ip dhcp server command shows "DHCPD: there is no address pool for 10.1.1.1". What is the problem?
A.
B.
C.
D.
6.  Which data link layer encapsulation protocol is used by default for serial connections between two Cisco routers?
A.
B.
C.
D.
E.
7.  Refer to the exhibit. Which statement correctly describes how Router1 processes an FTP request that enters interface s0/0/0 and is destined for an FTP server at IP address 192.168.1.5?
A.
B.
C.
D.
8.  Compared with IDS systems, what can IPS systems do to provide further protection of computer systems?
A.
B.
C.
D.
9.  Which IEEE 802.16 broadband wireless technology allows users to connect to the ISP at speeds comparable to DSL and cable?
A.
B.
C.
D.
10.  . A network administrator has changed the VLAN configurations on his network switches over the past weekend. How can the administrator determine if the additions and changes improved performance and availability on the company intranet?
A.
B.
C.
D.
11.  Refer to the exhibit. What is the meaning of the term dynamic in the output of the command?
A.
B.
C.
D.
12.  Which type of ACL will permit traffic inbound into a private network only if an outbound session has already been established between the source and destination?
A.
B.
C.
D.
13.  Which two statements are true about IPv6 link local addresses? (Choose two.)
A.
B.
C.
D.
E.
14.  A company is looking for a WAN solution to connect its headquarters site to four remote sites. What are two advantages that dedicated leased lines provide compared to a shared Frame Relay solution? (choose two)
A.
B.
C.
D.
E.
15.  Refer to the exhibit. A network administrator is trying to connect R1 remotely to make configuration changes. Based on the exhibited command output, what will be the result when attempting to connect to R1?
A.
B.
C.
D.
16.  What are two effective measures for securing routers? (Choose two.)
A.
B.
C.
D.
E.
17.  An issue of response time has recently arisen on an application server. The new release of a software package has also been installed on the server. The configuration of the network has changed recently. To identify the problem, individuals from both teams responsible for the recent changes begin to investigate the source of the problem. Which statement applies to this situation?
A.
B.
C.
D.
18.  Refer to the exhibit. From the output of the show interfaces and ping commands, at which layer of the OSI model is a fault indicated?
A.
B.
C.
D.
E.
19.  Which technology is used to dynamically map next hop, network layer addresses to virtual circuits in a Frame Relay network?
A.
B.
C.
D.
20.  An administrator learns of an e-mail that has been received by a number of users in the company. This e-mail appears to come from the office of the administrator. The e-mail asks the users to confirm their account and password information. Which type of security threat does this e-mail represent?
A.
B.
C.
D.
21.  Refer to the exhibit. Which data transmission technology is being represented?
A.
B.
C.
D.
22.  Refer to the exhibit. Results of the show vlan and show vtp status commands for switches S1 and S2 are displayed in the exhibit. VLAN 11 was created on S1. Why is VLAN 11 missing from S2?
A.
B.
C.
D.
23.  What is the result of adding the global command service password-encryption to the configuration of a router?
A.
B.
C.
D.
24.  While troubleshooting a problem with an e-mail server, an administrator observes that the switch port used by the server shows "up, line protocol up". The administrator cannot ping the server. At which layer of the OSI model is the problem most likely to be found?
A.
B.
C.
D.
Back to top


to post comments.

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz