This CCNA 4 V6.0 FINAL EXAM covers essential topics for corporate WAN implementation, WAN providers, WAN-specific devices, DWDM technology, and MPLS paths. It assesses skills crucial for network engineers in distributed enterprise environments.
DNS servers
Satellite service
Web hosting service
Telephone company
Internet search engine service
Rate this question:
Access layer switch
Broadband modem
Core switch
CSU/DSU​
Distribution layer router
Rate this question:
It replaces SONET and SDH technologies.
It enables bidirectional communications over one strand of fiber.
It provides Layer 3 support for long distance data communications.
It provides a 10 Gb/s multiplexed signal over analog copper telephone lines.
Rate this question:
Less efficient
Lacks SVC support
Does not scale well to provide high speed WAN connections
Requires multiple interfaces on the edge router to support multiple VCs
Rate this question:
Cable
DSL
Frame Relay
MPLS
VSAT
Rate this question:
Private infrastructure
Public infrastructure
Dedicated
Circuit-switched
Cellular
Rate this question:
CMTS
DSLAM
CSU/DSU
Access server
Rate this question:
Dial-up connection
Leased line connection
Site-to-site VPN over the Internet
Remote access VPN over the Internet
Rate this question:
2
12
24
28
Rate this question:
Ethernet
Frame Relay
HDLC
PPP
Identifying fault conditions for the PPP link
Providing multilink capabilities over the PPP link
Bringing the network layer protocol or protocols up and down
Enhancing security by providing callback over PPP
Negotiating options for the IP protocol
Managing authentication of the peer routers of the PPP link
Rate this question:
The link LCP and NCP status
The queuing type on the link
The IP addresses of the link interfaces
The serial interfaces participating in the multilink
Rate this question:
Only the link-establishment phase completed successfully.
Only the network-layer phase completed successfully.
Neither the link-establishment phase nor the network-layer phase completed successfully.
Both the link-establishment and network-layer phase completed successfully.
The PPP link will be closed down if the link quality drops below 70 percent.
The NCP will send a message to the sending device if the link usage reaches 70 percent.
The LCP establishment phase will not start until the bandwidth reaches 70 percent or more.
The PPP link will not be established if more than 30 percent of options cannot be accepted.
Rate this question:
Power is always provided.
Less energy is consumed.
Server provisioning is faster.
Hardware does not have to be identical.
Rate this question:
Cable
DSL
WiMax
ADSL
Rate this question:
PPPoE
CHAP
ADSL
LTE
Rate this question:
Control plane
Data plane
Security
Application policies
Rate this question:
192.168.1.0/32 is subnetted, 2 subnetted C 192.168.1.1 is directly connected, Dialer1​ C 192.168.1.2 is directly connected, Dialer2​
S* 0.0.0.0/0 is directly connected, Dialer1​​
192.168.1.0/32 is subnetted, 2 subnetted C 192.168.1.1 is directly connected, Dialer
S* 0.0.0.0/0 is directly connected, Dialer1 ​ 192.168.1.0/32 is subnetted, 2 subnetted C 192.168.1.1 is directly connected, Dialer1​ C 192.168.1.2 is directly connected, Dialer1
Rate this question:
A DMVPN will use an encrypted session and does not require IPsec.
A DMVPN uses a Layer 3 protocol, NHRP, to dynamically establish tunnels.
A DMVPN will support remote peers by providing a mapping database of public IP addresses to each one.
A DMVPN uses mGRE to create multiple GRE interfaces that each support a single VPN tunnel.
Rate this question:
A mobile user who connects to a router at a central site
A branch office that connects securely to a central site
A mobile user who connects to a SOHO site
A central site that connects to a SOHO site without encryption
Rate this question:
2
3
4
5
Rate this question:
They are configured in the interface configuration mode.
They filter traffic based on source IP addresses only.
They can be created with a number but not with a name.
They can be configured to filter traffic based on both source IP addresses and source ports.
Rate this question:
Access list number between 1 and 99
Access list number between 100 and 199
Default gateway address and wildcard mask
Destination address and wildcard mask
Source address and wildcard mask
Source subnet mask and wildcard mask
Destination subnet mask and wildcard mask
Rate this question:
Manually add the new deny ACE with a sequence number of 5.
Manually add the new deny ACE with a sequence number of 15.
Create a second access list denying the host and apply it to the same interface.
Add a deny any any ACE to access-list 1.
Rate this question:
Deny ip any any
Deny ipv6 any any
Permit ipv6 any any
Deny icmp any any
Permit icmp any any nd-ns
Permit icmp any any nd-na
Rate this question:
Access-class 5 in
Access-list 5 deny any
Access-list standard VTY permit 10.7.0.0 0.0.0.127
Access-list 5 permit 10.7.0.0 0.0.0.31
Ip access-group 5 out
Ip access-group 5 in
Rate this question:
Permit ip any any
Permit ip any host ip_address
Permit icmp any any nd-na
Deny ip any any
Rate this question:
So that the switch stops forwarding traffic
So that legitimate hosts cannot obtain a MAC address
So that the attacker can see frames that are destined for other hosts
So that the attacker can execute arbitrary code on the switch
Rate this question:
Fog computing
Wearable technologies
Data analytics
Robot guides
Cyber and physical security
Smart bandages
Rate this question:
Port security
DHCP snooping
IP source guard
Dynamic ARP Inspection
Rate this question:
VTP
LLDP
HSRP
RADIUS
TACACS+
Rate this question:
SNMP set messages
SNMP trap messages
SNMP get messages
SNMP community strings
Rate this question:
Packet encryption
Message integrity
Community strings
Source validation
Rate this question:
Bulk MIB objects retrieval
Encryption
Authorization with community string priority
Authentication
ACL management filtering
Rate this question:
A manager who is using an SNMP string of K44p0ut
A manager who is using an Inform Request MIB
A manager who is using host 192.168.0.5
A manager who is using authPriv
Rate this question:
FIFO
CBWFQ
WFQ
FCFS
Rate this question:
CBWFQ
FIFO
LLQ
FCFS
Rate this question:
Traffic shaping
Weighted random early detection
Classification and marking
Traffic policing
Rate this question:
Type of Service field
Traffic Class field
Priority field
Version field
Rate this question:
A trust boundary identifies the location where traffic cannot be remarked.
A trust boundary identifies which devices trust the marking on packets that enter a network.
A trust boundary only allows traffic to enter if it has previously been marked.
A trust boundary only allows traffic from trusted endpoints to enter the network.
Rate this question:
Data analytics
Fog computing
Network connectivity
Application enhancement platform
Rate this question:
A continuous interaction between people, processes, data, and things
A service that offers on-demand access to shared resources
A network infrastructure that spans a large geographic area
An architectural style of the World Wide Web
Rate this question:
A host operating system
A server running VMware Fusion
A management console
A dedicated VLAN
Rate this question:
Gather symptoms.
Isolate the problem.
Restore the previous configuration.
Implement the next possible corrective action.
Rate this question:
Top-down
Bottom-up
Substitution
Divide-and-conquer
Rate this question:
To detect potential network attacks
To provide network connectivity for customers
To adjust network device configurations to avoid congestion
To measure network performance and discover a network failure as early as possible
Rate this question:
Level 0
Level 1
Level 4
Level 7
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.