This CCNA 4 Practice Final assesses knowledge on WAN technologies, focusing on aspects like packet switching, circuit-switched technologies, and WAN components used by ISPs. It is designed for learners aiming to understand complex networking concepts, preparing them for professional certification.
eastbound APIs
westbound APIs
Northbound APIs
Southbound APIs
Rate this question:
Cisco AnyConnect Secure Mobility Client with SSL
Cisco Secure Mobility Clientless SSL VPN
Frame Relay
remote access VPN using IPsec
site-to-site VPN
Rate this question:
True
False
Rate this question:
DSL
ISDN
Cable
Leased line
Rate this question:
ADSL
SDSL
CDMA
TDMA
Rate this question:
PPPoE
CHAP
POTS
ADSL
Rate this question:
Frame Relay
ISDN
ATM
Ethernet WAN
Rate this question:
The username configured on each router matches the hostname of the other router.
The secret password configured on each router is different.
The clock rate has not been configured on the DCE serial interface.
The hostname configured on each router is different.
Rate this question:
PAP uses a two-way handshake method and CHAP uses a three-way handshake method.
PAP and CHAP provide equivalent protection against replay attacks.
PAP sends the password encrypted and CHAP does not send the password at all.
PAP sends the password once and CHAP sends the password repeatedly until acknowledgment of authentication is received.
Rate this question:
65003
65002
65004
65005
Rate this question:
Faster response times
Security
Support of other network monitoring protocols
mobility
Rate this question:
native VLAN
Management VLAN
default VLAN
RSPAN VLAN
Black hole VLAN
Private VLAN
Rate this question:
policing
shaping
classifying
Queuing
Rate this question:
There is no gateway of last resort at R1.
The serial interface between the two routers is down.
A default route is not configured on R1.
The static route for 192.168.2.0 is incorrectly configured.
Rate this question:
WiMax
municipal Wi-Fi
satellite
mobile broadband
Rate this question:
IS-IS
EIGRP
OSPF
BGP
Rate this question:
Trust Boundary 1
Trust Boundary 2
Trust Boundary 3
Trust Boundary 4
Rate this question:
Run the tracert command to identify the faulty device.
Check the patch cable connection from the PC to the wall.
Enter an IP address in the address bar of the web browser to determine if DNS has failed.
Run the ipconfig command to verify the IP address, subnet mask, and gateway on the PC.
Rate this question:
Encapsulation errors
framing errors
electromagnetic interference
incorrect interface clock rates
late collisions and jabber
Rate this question:
Each network protocol has a corresponding NCP.
Link termination is the responsibility of NCP.
NCP establishes the initial link between PPP devices.
NCP tests the link to ensure that the link quality is sufficient
Rate this question:
In contrast to outbound ALCs, inbound ACLs can be used to filter packets with multiple criteria.
Inbound ACLs can be used in both routers and switches but outbound ACLs can be used only on routers.
Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after the routing is completed.
On a network interface, more than one inbound ACL can be configured but only one outbound ACL can be configured.
Rate this question:
ISDN
MPLS
PSTN
ATM
Frame Relay
Rate this question:
Manually add the new deny ACE with a sequence number of 5.
Manually add the new deny ACE with a sequence number of 15.
Create a second access list denying the host and apply it to the same interface.
Add a deny any any ACE to access-list 1.
Rate this question:
Legitimate clients are unable to lease IP addresses.
Clients receive IP address assignments from a rogue DHCP server.
The attacker provides incorrect DNS and default gateway information to clients.
The IP addresses assigned to legitimate clients are hijacked.
Rate this question:
SNMP version 1
SNMP version 2
SNMP version 2c
SNMP version 3
Rate this question:
The Fog computing pillar
the application enablement platform​ pillar
the network connectivity pillar
the management and automation pillar
Rate this question:
In an IPv6 extended ACL that stops packets going to one specific destination VLAN
in an IPv4 named standard ACL that has specific UDP protocols that are allowed to be used on a specific server
in an IPv6 named ACL that permits FTP traffic from one particular LAN getting to another LAN
in an IPv4 extended ACL that allows packets from a range of TCP ports destined for a specific network device
Rate this question:
Turn off DTP.
Use port security.
Assign it to an unused VLAN.
Assign the same VLAN number as the management VLAN.
Rate this question:
Ethernet
Frame Relay
HDLC
PPP
Rate this question:
the IP addresses at each end of the WAN link between the routers
the IP addresses of the two LANs that are being connected together by the VPN
the IP address of host on the LAN that is being extended virtually
the IP addresses of tunnel interfaces on intermediate routers between the connected routers
Rate this question:
The EIGRP configuration is incorrect.
The tunnel IP addresses are incorrect.
The tunnel source interfaces are incorrect.
The tunnel destinations addresses are incorrect.
Rate this question:
By using network protocol analyzers to evaluate errors
By measuring the CPU and memory usage on routers and switches
By simulating network data and IP services to collect network performance data in real time
By taking a snap shot of network performance and comparing with an established baseline
Rate this question:
802.1X
SNMP
SPAN
Syslog
Rate this question:
Application Network Profile
Application Policy Infrastructure Controller
OpenFlow enabled switches
Interface to the Routing System
Transparent Interconnection of Lots of Links
Rate this question:
Data communications must be given the first priority.
Data communications are sensitive to jitter.
Voice and video communications are more sensitive to latency.
Legacy equipment is unable to transmit voice and video without QoS.
Rate this question:
Ping from the laptop to PC1.
Ping from Server1 to PC1.
Ping from Server1 to its gateway IP address.
Ping from the laptop to the Ethernet port on the cable modem.
Rate this question:
The use of wildcard masks
an implicit deny any any statement
the use of named ACL statements
an implicit permit of neighbor discovery packets
Rate this question:
CO
Toll network
demarcation point
CPE
DTE
Rate this question:
ACLs assist the router in determining the best path to a destination.
Standard ACLs can restrict access to specific applications and ports.
ACLs provide a basic level of security for network access.
ACLs can permit or deny traffic based upon the MAC address originating on the router.
ACLs can control which areas a host can access on a network.
Rate this question:
public infrastructure
private infrastructure
dedicated
Internet
packet-switched
Rate this question:
deny ip any any
deny ipv6 any any
permit ipv6 any any
deny icmp any any
permit icmp any any nd-ns
permit icmp any any nd-na
Rate this question:
They reduce the load on network and agent resources.
They can passively listen for exported NetFlow datagrams.
They limit access for management systems only.
They can provide statistics on TCP/IP packets that flow through Cisco devices.
They eliminate the need for some periodic polling requests.
Rate this question:
It is delay sensitive.
It is bursty.
It can tolerate latency up to 400 ms.
It consumes few network resources.
It is insensitive to packet loss.
Rate this question:
Hardware
Firmware
Services
Security
Network
Data
Rate this question:
HDLC
PPP
SLIP
PAP
CHAP
Rate this question:
The communication costs are lower.
There are fewer delays in the data communications processes.
Multiple pairs of nodes can communicate over the same network channel.
A dedicated secure circuit is established between each pair of communicating nodes.
A connection through the service provider network is established quickly before communications start.
Rate this question:
Frame Relay
HDLC
PPP
VPN
Rate this question:
The clock rate is not set on the DTE.
An incorrect default gateway is set on the router.
A network is missing from the routing protocol configuration.
The encapsulation on the Serial0/0/0 interface is incorrect.
Keepalives are not being sent by the remote device.
Rate this question:
Quiz Review Timeline (Updated): Feb 2, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.