Friday, April 17, 2009

CCNA v4 - E4 - Module 7 (100%) -> latest

http://www.ccna4u.net

1. Refer to the exhibit. IPv6 address 2006:1::1/64 eui-64 has been configured on the router FastEthernet0/0 interface. Which statement accurately describes the EUI-64 identifier configuration?

The configuration will derive the interface portion of the IPv6 address from the MAC address of the interface.

2. Refer to the exhibit. Which address or addresses represent the inside global address?

209.165.20.25

3. Your organization is issued the IPv6 prefix of 2001:0000:130F::/48 by your service provider. With this prefix, how many bits are available for your organization to create subnetworks?

16

4. What are two benefits of NAT? (Choose two.)

It saves public IP addresses.
It adds a degree of privacy and security to a network.

5. What is true regarding the differences between NAT and PAT?

PAT uses unique source port numbers to distinguish between translations.

http://www.ccna4u.net


6. A network administrator wants to connect two IPv6 islands. The easiest way is through a public network that uses only IPv4 equipment. What simple solution solves the problem?

Use tunneling to encapsulate the IPv6 traffic in the IPv4 protocol.

7. Refer to the exhibit. Which two addresses could be assigned to traffic leaving S0 as a result of the statement ip nat pool Tampa 179.9.8.96 179.9.8.111 netmask 255.255.255.240? (Choose two.)

179.9.8.98
179.9.8.101

8. Refer to the exhibit. The FTP server has an RFC 1918 private address. Users on the Internet need to connect to the FTP server on the Fa0/0 LAN of R1. Which three configurations must be completed on R1? (Choose three.)

open port 20
open port 21
NAT with port forwarding

9. After activating IPv6 routing on a Cisco router and programming IPv6 addresses on multiple interfaces, what is the remaining step to activate RIPng?

Enter the interface programming mode for each IPv6 interface and enable IPng RIP.

10. Refer to the exhibit. How many IPv6 broadcast domains exist in this topology?

0

11. Refer to the exhibit. Traffic exiting R1 is failing translation. What part of the configuration is most likely incorrect?

access-list statement

12. Refer to the exhibit. According to the output, how many addresses have been successfully assigned by this DHCP server?

8

13. Refer to the exhibit. What is the purpose of the command marked with an arrow shown in the partial configuration output of a Cisco broadband router?

defines which addresses can be translated

14. A technician has been told by a supervisor to always clear any dynamic translations before attempting to troubleshoot a failed NAT connection. Why has the supervisor issued these instructions?

Because entries can be cached for long periods of time, the supervisor wants to prevent decisions being made based on old data.

15. Refer to the exhibit. Which two statements about the configuration are true? (Choose two.)

Traffic from the 10.1.1.0 network will be translated.
Permitted traffic gets translated to a single inside global IP address.

16. Refer to the exhibit. R1 is performing NAT for the 10.1.1.0/24 network, and R2 is performing NAT for the 192.168.1.2/24 network. What would be valid destination IP address for HostA to put in its IP header when communicating with the web server?

172.30.20.2

17. What type of NAT should a network administrator use to ensure that a web server on the inside network is always available to the outside network?

static NAT

18. How many bits of an IPv6 address are used to identify the interface ID?

64

19. Refer to the exhibit. A technician used SDM to enter the NAT configuration for a Cisco router. Which statement correctly describes the result of the configuration?

A user on the outside network sees a request addressed from 192.168.1.3 using port 80.

20. Refer to the exhibit. A network technician determines DHCP clients are not working properly. The clients are receiving IP configuration information from a DHCP server configured on the router but cannot access the Internet. From the output in the graphic, what is the most likely problem?

The pool does not have a default router defined for the clients.

21. Refer to the exhibit. On the basis of the configuration shown, how should the pool of the excluded addresses be assigned to key hosts on the network, such as router interfaces, printers, and servers?

The addresses are statically assigned by the network administrator.

CCNA v4 - E4 - Module 6 (100%)

http://www.ccna4u.net/

1. Which two Layer 1 requirements are outlined in the Data-over-Cable Service Interface Specification (DOCSIS)? (Choose two.)

channel widths
modulation techniques

2. Which is an example of symmetric-key encryption?

pre-shared key

3. Which two statements are valid solutions for a cable ISP to reduce congestion for users? (Choose two.)

allocate an additional channel
subdivide the network to reduce users on each segment

4. While monitoring traffic on a cable network, a technician notes that data is being transmitted at 38 MHz. Which statement describes the situation observed by the technician?

Data is being transmitted from the subscriber to the headend.

5. After conducting research to learn about common remote connection options for teleworkers, a network administrator has decided to implement remote access over broadband to establish VPN connections over the public Internet. What is the result of this solution?

The connection has increased security and reliable connectivity. Users need a remote VPN router or VPN client software.

http://www.ccna4u.net/



6. Data confidentiality through a VPN is achieved through which two methods? (Choose two.)

encryption
encapsulation

7. Data confidentiality through a VPN can be enhanced through the use of which three encryption protocols? (Choose three.)
AES
DES
RSA


8. What two protocols provide data authentication and integrity for IPsec? (Choose two.)
AH
ESP

9. A technician has been asked to configure a broadband connection for a teleworker. The technician has been instructed that all uploads and downloads for the connection must use existing phone lines. Which broadband technology should be used?

DSL

10. What are the three main functions of a secure VPN? (Choose three.)

authentication
data confidentiality
data integrity

11. A company is using WiMAX to provide access for teleworkers. What home equipment must the company provide at the teleworker's site?

a WiMAX receiver

12. Which two methods could an administrator use to authenticate users on a remote access VPN? (Choose two.)
digital certificates
smart cards

13. Which two statements about DSL are true? (Choose two.)

local loop can be up to 3.5 miles (5.5km)
user connections are aggregated at a DSLAM located at the CO

14. Which two features can be associated with the Worldwide Interoperability for Microwave Access (WiMAX) telecommunication technology? (Choose two.)

covers areas as large as 7,500 square kilometers
connects directly to the Internet through high-bandwidth connections

15. Refer to the exhibit. All users have a legitimate purpose and the necessary persissions to access the Corporate network. Based on the topology shown, which locations are able to establish VPN connectivity with the Corporate network?

All locations can support VPN connectivity.

16. Which statement describes cable?

Delivering services over a cable network requires downstream frequencies in the 50 to 860 MHz range, and upstream frequencies in the 5 to 42 MHz range.

17. Which two protocols can be used to encapsulate traffic that is traversing a VPN tunnel? (Choose two.)

IPsec
PPTP

18. Refer to the exhibit. A teleworker is connected over the Internet to the HQ Office. What type of secure connection can be established between the teleworker and the HQ Office?

a remote-access VPN

19. Refer to the exhibit. A VPN tunnel has been established between the HQ Office and the Branch Office over the public Internet. Which three mechanisms are required by the devices on each end of the VPN tunnel to protect the data from being intercepted and modified? (Choose three.)

The two parties must establish a secret key used by encryption and hash algorithms.
The two parties must agree on the encryption algorithm to be used over the VPN tunnel.
The devices must be authenticated before the communication path is considered secure.