CCNA 4 v6.0 R&S Connecting Networks CN Final C Exam Online
CCNA 4 v6.0 CN Final C Exam Training |
|
---|---|
Time | 60 minutes |
Questions | 53 |
Time limit: 0
Quiz-summary
0 of 53 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
Information
CCNA 4 v6.0 Final Exam C
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 53 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
Your result has been entered into leaderboard
Loading
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- Answered
- Review
-
Question 1 of 53
1. Question
1 pointsWhat is a primary difference between a company LAN and the WAN services that it uses?
Correct
Incorrect
-
Question 2 of 53
2. Question
1 pointsWhich circumstance would result in an enterprise deciding to implement a corporate WAN?
Correct
Incorrect
-
Question 3 of 53
3. Question
2 pointsTo which two layers of the OSI model do WAN technologies provide services? (Choose two.)
Correct
Incorrect
-
Question 4 of 53
4. Question
2 pointsWhich two technologies are private WAN technologies? (Choose two.)
Correct
Incorrect
-
Question 5 of 53
5. Question
1 pointsWhich WAN technology can switch any type of payload based on labels?
Correct
Incorrect
-
Question 6 of 53
6. Question
1 pointsWhat technology can be used to create a private WAN via satellite communications?
Correct
Incorrect
-
Question 7 of 53
7. Question
1 pointsWhich public WAN access technology utilizes copper telephone lines to provide access to subscribers that are multiplexed into a single T3 link connection?
Correct
Incorrect
-
Question 8 of 53
8. Question
1 pointsA corporation is searching for an easy and low cost solution to provide teleworkers with a secure connection to headquarters. Which solution should be selected?
Correct
Incorrect
-
Question 9 of 53
9. Question
1 pointsHow many DS0 channels are bounded to produce a 1.544 Mb/s DS1 line?
Correct
Incorrect
-
Question 10 of 53
10. Question
1 pointsRefer to the exhibit.
Communication between two peers has failed. Based on the output that is shown, what is the most likely cause?
Correct
Incorrect
-
Question 11 of 53
11. Question
1 pointsRefer to the exhibit.
Which type of Layer 2 encapsulation used for connection D requires Cisco routers?
Correct
Incorrect
-
Question 12 of 53
12. Question
3 pointsWhich three statements are true about PPP? (Choose three.)
Correct
Incorrect
-
Question 13 of 53
13. Question
1 pointsA network administrator is configuring a PPP link with the commands:
R1(config-if)# encapsulation ppp
R1(config-if)# ppp quality 70What is the effect of these commands?
Correct
Incorrect
-
Question 14 of 53
14. Question
3 pointsA network administrator is evaluating authentication protocols for a PPP link. Which three factors might lead to the selection of CHAP over PAP as the authentication protocol? (Choose three.)
Correct
Incorrect
-
Question 15 of 53
15. Question
1 pointsWhich cellular or mobile wireless standard is considered a fourth generation technology?
Correct
Incorrect
-
Question 16 of 53
16. Question
1 pointsA company is looking for the least expensive broadband solution that provides at least 10 Mb/s download speed. The company is located 5 miles from the nearest provider. Which broadband solution would be appropriate?
Correct
Incorrect
-
Question 17 of 53
17. Question
1 pointsWhich technology can ISPs use to periodically challenge broadband customers over DSL networks with PPPoE?
Correct
Incorrect
-
Question 18 of 53
18. Question
3 pointsWhat are the three core components of the Cisco ACI architecture? (Choose three.)
Correct
Incorrect
-
Question 19 of 53
19. Question
1 pointsWhich statement describes a feature of site-to-site VPNs?
Correct
Incorrect
-
Question 20 of 53
20. Question
3 pointsWhat are three features of a GRE tunnel? (Choose three.)
Correct
Incorrect
-
Question 21 of 53
21. Question
2 pointsRefer to the exhibit.
What two commands are needed to complete the GRE tunnel configuration on router R1? (Choose two.)
Correct
Incorrect
-
Question 22 of 53
22. Question
1 pointsWhat does BGP use to exchange routing updates with neighbors?
Correct
Incorrect
-
Question 23 of 53
23. Question
2 pointsRefer to the exhibit.
The network administrator that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server. Which extended ACL would be used to filter this traffic, and how would this ACL be applied? (Choose two.)
Correct
Incorrect
-
Question 24 of 53
24. Question
1 pointsRefer to the exhibit.
A router has an existing ACL that permits all traffic from the 172.16.0.0 network. The administrator attempts to add a new statement to the ACL that denies packets from host 172.16.0.1 and receives the error message that is shown in the exhibit. What action can the administrator take to block packets from host 172.16.0.1 while still permitting all other traffic from the 172.16.0.0 network?
Correct
Incorrect
-
Question 25 of 53
25. Question
1 pointsRefer to the exhibit.
What can be determined from this output?
Correct
Incorrect
-
Question 26 of 53
26. Question
1 pointsWhat is the only type of ACL available for IPv6?
Correct
Incorrect
-
Question 27 of 53
27. Question
1 pointsWhich IPv6 ACL command entry will permit traffic from any host to an SMTP server on network 2001:DB8:10:10::/64?
Correct
Incorrect
-
Question 28 of 53
28. Question
1 pointsRefer to the exhibit.
Considering how packets are processed on a router that is configured with ACLs, what is the correct order of the statements?
Correct
Incorrect
-
Question 29 of 53
29. Question
2 pointsWhich two hypervisors are suitable to support virtual machines in a data center? (Choose two.)
Correct
Incorrect
-
Question 30 of 53
30. Question
1 pointsHow can DHCP spoofing attacks be mitigated?
Correct
Incorrect
-
Question 31 of 53
31. Question
1 pointsWhat is a secure configuration option for remote access to a network device?
Correct
Incorrect
-
Question 32 of 53
32. Question
1 pointsWhat action can a network administrator take to help mitigate the threat of VLAN attacks?
Correct
Incorrect
-
Question 33 of 53
33. Question
2 pointsWhat two protocols are supported on Cisco devices for AAA communications? (Choose two.)
Correct
Incorrect
-
Question 34 of 53
34. Question
1 pointsWhich SNMP message type informs the network management system (NMS) immediately of certain specified events?
Correct
Incorrect
-
Question 35 of 53
35. Question
1 pointsRefer to the exhibit.
A SNMP manager is using the community string of snmpenable and is configured with the IP address 172.16.10.1. The SNMP manager is unable to read configuration variables on the R1 SNMP agent. What could be the problem?
Correct
Incorrect
-
Question 36 of 53
36. Question
1 pointsRefer to the exhibit.
Which SNMP authentication password must be used by the member of the ADMIN group that is configured on router R1?
Correct
Incorrect
-
Question 37 of 53
37. Question
1 pointsA network administrator has noticed an unusual amount of traffic being received on a switch port that is connected to a college classroom computer. Which tool would the administrator use to make the suspicious traffic available for analysis at the college data center?
Correct
Incorrect
-
Question 38 of 53
38. Question
1 pointsWhat network monitoring tool copies traffic moving through one switch port, and sends the copied traffic to another switch port for analysis?
Correct
Incorrect
-
Question 39 of 53
39. Question
1 pointsVoice packets are being received in a continuous stream by an IP phone, but because of network congestion the delay between each packet varies and is causing broken conversations. What term describes the cause of this condition?
Correct
Incorrect
-
Question 40 of 53
40. Question
1 pointsWhat mechanism compensates for jitter in an audio stream by buffering packets and then replaying them outbound in a steady stream?
Correct
Incorrect
-
Question 41 of 53
41. Question
1 pointsWhich QoS mechanism allows delay-sensitive data, such as voice, to be sent first before packets in other queues are sent?
Correct
Incorrect
-
Question 42 of 53
42. Question
1 pointsWhich type of network traffic cannot be managed using congestion avoidance tools?
Correct
Incorrect
-
Question 43 of 53
43. Question
1 pointsRefer to the exhibit.
As traffic is forwarded out an egress interface with QoS treatment, which congestion avoidance technique is used?
Correct
Incorrect
-
Question 44 of 53
44. Question
1 pointsWhat is the function of a QoS trust boundary?
Correct
Incorrect
-
Question 45 of 53
45. Question
1 pointsWhich type of QoS marking is applied to Ethernet frames?
Correct
Incorrect
-
Question 46 of 53
46. Question
1 pointsWhich pillar of the Cisco IoT System allows data to be analyzed and managed at the location where it is generated?
Correct
Incorrect
-
Question 47 of 53
47. Question
1 pointsA network administrator has moved the company intranet web server from a switch port to a dedicated router interface. How can the administrator determine how this change has affected performance and availability on the company intranet?
Correct
Incorrect
-
Question 48 of 53
48. Question
1 pointsIn which stage of the troubleshooting process would ownership be researched and documented?
Correct
Incorrect
-
Question 49 of 53
49. Question
1 pointsWhich troubleshooting approach is more appropriate for a seasoned network administrator rather than a less-experienced network administrator?
Correct
Incorrect
-
Question 50 of 53
50. Question
1 pointsA router has been configured to use simulated network traffic in order to monitor the network performance between the router and a distant network device. Which command would display the results of this analysis?
Correct
Incorrect
-
Question 51 of 53
51. Question
1 pointsWhich type of tool would an administrator use to capture packets that are going to and from a particular device?
Correct
Incorrect
-
Question 52 of 53
52. Question
2 pointsRefer to the exhibit.
Which two statements describe the results of entering these commands? (Choose two.)
Correct
Incorrect
-
Question 53 of 53
53. Question
1 pointsRefer to the exhibit.
A network administrator discovers that host A is having trouble with Internet connectivity, but the server farm has full connectivity. In addition, host A has full connectivity to the server farm. What is a possible cause of this problem?
Correct
Incorrect
Leaderboard: CCNA 4 v6.0 Final Exam C
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||