CCNA 4 set 3 is designed to assess advanced skills in networking, focusing on troubleshooting PPP negotiation failures, configuring Frame Relay topologies, understanding default encapsulation protocols, and deploying IPv6 tunnels. It prepares candidates for real-world networking scenarios and enhances their problem-solving abilities.
Traffic is only accepted from and forwarded to SDM-trusted Cisco routers.
Security testing is performed and the results are saved as a text file stored in NVRAM.
All traffic that enters the router is quarantined and checked for viruses before being forwarded.
The router is tested for any potential security problems and all recommended security-related configuration changes will be automatically applied.
Rate this question:
TDM
PPP
HDLC
SLIP
Rate this question:
Named ACLs are less efficient than numbered ACLs.
Standard ACLs should be applied inside the core layer.
Place standard ACLs as close to the destination as possible.
ACLs applied to outbound interfaces require fewer router resources.
Extended ACLs should be applied closest to the source that is specified by the ACL.
Ip nat inside source static 10.1.200.254 172.16.76.3
Ip nat inside source static 10.1.200.254 192.168.0.10
Ip nat inside source static 172.16.76.3 10.1.200.254
Ip nat inside source static 172.16.76.3 192.168.0.10
Ip nat inside source static 192.168.0.10 172.16.76.3
Ip nat inside source static 192.168.0.10 10.1.200.254
Rate this question:
To determine the time it takes for the network to self recover from a failure
To determine which areas in the network are underutilized or overutilized
To determine the performance of the network during the normal hours of operation
To determine what thresholds should be set for the devices that need to be monitored
To determine the areas in the network which should not be included in the monitoring process
To determine the number of users whose access to network resources should be restricted
Rate this question:
There is an implicit deny at the end of all access lists.
One access list per port, per protocol, per direction is permitted
Access list entries should filter in the order from general to specific.
The term “inbound” refers to traffic that enters the network from the router interface where the ACL is applied.
Standard ACLs should be applied closest to the source while extended ACLs should be applied closest to the destination
Rate this question:
LCP sets up the PPP connection and its parameters. NCP terminates the PPP connection
LCP sets up the PPP connection and its parameters. NCP handles higher layer protocol configurations
LCP includes the link-establishment phase. NCP includes link-maintenance and link-termination phases.
LCP negotiates options for multiple network layer protocols. NCP agrees automatically on encapsulation formats.
Rate this question:
The Frame Relay switch has failed.
The frame-relay map statement is incorrect
The S0/0/0 interface of router R1 is administratively down.
The S0/0/0 interface of router R2 has an incorrect IP address.
Rate this question:
There is a Layer 2 loop.
The VTP domain names do not match.
Only one switch can be in server mode
S2 has a higher spanning-tree priority for VLAN 11 than S1 does.
Rate this question:
1
12.4
15
1841
Rate this question:
DLCI 103
DLCI 301
172.16.1.18
172.16.1.19
Rate this question:
10.10.10.1 is most likely assigned to the local LAN interface.
10.10.10.1 through 10.10.10.255 is available to be assigned to users.
All DHCP clients looking for an IP address will use 10.10.10.1 and 10.10.10.2.
All DHCP clients in the 10.10.10.0/24 network will use 10.10.10.2 as the default gateway.
Rate this question:
IPv6 traffic-forwarding is enabled on the interface.
A link-local IPv6 address is automatically configured on the interface.
A global unicast IPv6 address is dynamically configured the interface.
Any IPv4 addresses that are assigned to the interface are replaced with an IPv6 address.
Rate this question:
PAP uses a two-way handshake.
The password is unique and random.
PAP conducts periodic password challenges.
PAP uses MD5 hashing to keep the password secure.
Rate this question:
Interface reset
Unplugged cable
Improper LMI type
PPP negotiation failure
Rate this question:
Frame-relay interface-dlci 103 on Serial 0/0/0.1 frame-relay interface-dlci 203 on Serial 0/0/0.2
Frame-relay interface-dlci 301 on Serial 0/0/0.1 frame-relay interface-dlci 302 on Serial 0/0/0.2
Frame-relay map ip 192.168.1.1 103 broadcast on Serial 0/0/0.1 frame-relay map ip 192.168.2.2 203 broadcast on Serial 0/0/0.2
Frame-relay map ip 192.168.1.1 301 broadcast on Serial 0/0/0.1 frame-relay map ip 192.168.2.2 302 broadcast on Serial 0/0/0.2
Rate this question:
ATM
Frame Relay
HDLC
PPP
SDLC
Rate this question:
A new WAN service supporting only IPv6
NAT overload to map inside IPv6 addresses to outside IPv4 address
A manually configured IPv6 tunnel between the edge routers R1 and R2
Static NAT to map inside IPv6 addresses of the servers to an outside IPv4 address and dynamic NAT for the rest of the inside IPv6 addresses
Rate this question:
Protocol type
Source IP address
Source MAC address
Destination IP address
Destination MAC address
Rate this question:
The clock rate must be 56000.
The usernames are misconfigured.
The IP addresses are on different subnets.
The clock rate is configured on the wrong end of the link.
The CHAP passwords must be different on the two routers.
The CHAP passwords must be different on the two routers.
Rate this question:
It creates a basis for legal action if necessary.
It defines a process for managing security violations.
It defines acceptable and unacceptable use of network resources.
The remote access policy is a component of the security policy that governs acceptable use of e-mail systems.
It is kept private from users to prevent the possibility of circumventing security measures.
It provides step-by-step procedures to harden routers and other network devices
Rate this question:
Conduct a performance test and compare with the baseline that was established previously.
Interview departmental secretaries and determine if they think load time for web pages has improved.
Determine performance on the intranet by monitoring load times of company web pages from remote sites.
Compare the hit counts on the company web server for the current week to the values that were recorded in previous weeks.
Rate this question:
ATM
VPN
ISDN
Frame Relay
Broadband DSL
Rate this question:
VPN link establishment and maintenance is provided by LCP.
DLCI addresses are used to identify each end of the VPN tunnel.
VPNs use virtual Layer 3 connections that are routed through the Internet.
Only IP packets can be encapsulated by a VPN for tunneling through the Internet.
ATM
ATM
ISDN
Frame Relay
Rate this question:
Company 1 only uses microfilters at branch locations.
Company 1 has a lower volume of POTS traffic than company 2 has.
Company 2 is located farther from the service provider than company 1 is.
Company 2 shares the connection to the DSLAM with more clients than company 1 shares with.
Rate this question:
Ip nat inside source static 10.1.200.254 172.16.76.3
Ip nat inside source static 10.1.200.254 192.168.0.10
Ip nat inside source static 172.16.76.3 10.1.200.254
Ip nat inside source static 172.16.76.3 192.168.0.10
Ip nat inside source static 192.168.0.10 172.16.76.3
Ip nat inside source static 192.168.0.10 10.1.200.254
Rate this question:
Boot the router to ROM monitor mode and configure the router to ignore the startup configuration when it initializes
Telnet from another router and issue the show running-config command to view the password
Boot the router to bootROM mode and enter the b command to load the IOS manually
Use the copy tftp: flash: command
Rate this question:
Option 1
Option 2
Option 3
Option 4
Configure static NAT.
Configure dynamic NAT.
Configure static NAT with overload.
Configure dynamic NAT with overload.
Rate this question:
CHAP uses a 2-way handshake to exchange the credentials.
CHAP uses a 2-way handshake to exchange the credentials.
CHAP sends an encrypted username and password during the authentication process.
The authentication phase takes place before the NCP configuration phase begins.
Rate this question:
HQ(config)# interface S0/0/0
HQ(config)# interface S0/0/0.1 multipoint
HQ(config)# interface S0/0/0.1 point-to-point
HQ(config-subif)# frame-relay interface dlci 103
HQ(config-subif)# frame-relay interface dlci 301
HQ(config-if)# frame-relay map ip 172.16.1.1 255.255.255.0 301 broadcast
Rate this question:
0.0.0.7
0.0.7.255
0.0.8.255
0.0.15.255
0.0.255.255
Rate this question:
Change EastSW to be a VTP server.
Reload both WestSW and EastSW at the same time.
Erase the VLAN database on EastSW and reload the switch.
Reset the configuration revision number on EastSW to zero.
Reload EastSW.
Rate this question:
Cable connectivity
High collision counts
STP failures and loops
Address mapping errors
High CPU utilization rates
Excess packets that are filtered by the firewall
Rate this question:
All traffic that originates from 192.168.4.0/24 is permitted.
All TCP traffic is permitted, and all other traffic is denied.
All Telnet traffic from the 192.168.0.0/16 network is permitted.
All traffic from the 192.168.4.0/22 network is permitted on TCP port 23.
Rate this question:
Static NAT
Dynamic NAT
Static NAT with overload
Dynamic NAT with overload
Rate this question:
The router matches the incoming packet to the statement that is created by access-list 201 permit ip any any command and allows the packet into the router.
The router reaches the end of ACL 101 without matching a condition and drops the packet because there is no statement that was created by access-list 101 permit ip any any command.
The router matches the incoming packet to the statement that was created by the access-list 101 permit ip any 172.16.1.0 0.0.0.255 command, ignores the remaining statements in ACL 101, and allows the packet into the router.
The router matches the incoming packet to the statement that was created by the access-list 201 deny icmp 172.16.1.0 0.0.0.255 any command, continues comparing the packet to the remaining statements in ACL 201 to ensure that no subsequent statements allow FTP, and then the router drops the packet.
Rate this question:
The source addresses are not correctly designated.
The translated address pool is not correctly sized.
The access-list command is referencing the wrong addresses.
The wrong interface is designated as the source for translations.
Rate this question:
Disable IP source routing.
Configure passive interfaces.
Configure routing protocol authentication.
Secure administrative lines with Secure Shell.
Rate this question:
The commands overwrite the existing Managers ACL.
The commands are added at the end of the existing Managers ACL.
The network administrator receives an error stating that the ACL already exists.
The commands will create a duplicate Managers ACL containing only the new commands being entered.
Rate this question:
Router(config)# line console 0 Router(config-line)# login Router(config-line)# password cisco
Router(config)# line vty 0 4 Router(config-line)# login Router(config-line)# password cisco
Router(config)# line vty 0 4 Router(config-line)# enable secret Router(config-line)# password cisco
Router(config)# line vty 0 4 Router(config-line)# enable secret Router(config-line)# password cisco
Router(config)# line virtual terminal Router(config-line)# enable login Router(config-line)# password cisco
Rate this question:
The configuration register is set for 0×2100.
The configuration register is set for 0×2101
The configuration register is set for 0×2102
The configuration register is set for 0×2142.
Boot system commands are not configured.
Flash memory is empty causing the router to bypass the configuration in NVRAM
Rate this question:
Quiz Review Timeline (Updated): Mar 17, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.