Merry christmas & Happy new year!

READ MORE » Merry christmas & Happy new year!

CCNA4 Final December 18th 2009 (Thanks 3Z3KI3L)




1. Refer to the exhibit. Company ABC expanded its business and recently opened a new branch office in another country. IPv6 addresses have been used for the company network. The data servers Server1 and Server2 run applications which require end-to-end functionality, with unmodified packets that are forwarded from the source to the destination. The edge routers R1 and R2 support dual stack configuration. What solution should be deployed at the edge of the company network in order to successfully interconnect both offices?

a manually configured IPv6 tunnel between the edge routers R1 and R2

READ MORE » CCNA4 Final December 18th 2009 (Thanks 3Z3KI3L)

Welcome to CCNA Forum (forums.ccna4u.org)

Welcome to forums.ccna4u.org

Downloadable documents and study guide, Pass4sure, testking...  lastest version
Ebook: ccna, ccnp,ccsp, ccna security, ccie
Soft: network related simulator, Dynamips, Other network tools...and more
Click here forums.ccna4u.org
READ MORE » Welcome to CCNA Forum (forums.ccna4u.org)

CCNA 4 Exploration Final questions and answers Updated (93.1%) - December 2009


Thanks Ronado Neri
READ MORE » CCNA 4 Exploration Final questions and answers Updated (93.1%) - December 2009

CCNA Discovery 4.0 Blog!

Welcome to
CCNA Discovery 4.0 Blog!
http://discovery.ccna4u.org/
READ MORE » CCNA Discovery 4.0 Blog!

CCNA4 Final 8th December 2009

Updated 11 December 2009!
Thanks Rolando Neri





Download Updated
Answers 93% 
Please say thank to  Rolando Neri
Take Assessment - EWAN Final Exam - CCNA Exploration: Acceso a la WAN (Version 4.0)
Time Remaining:

1
A network administrator is tasked with maintaining two remote locations in the same city. Both locations use the same service provider and have the same service plan for DSL service. When comparing download rates, it is noticed that the location on the East side of town has a faster download rate than the location on the West side of town. How can this be explained?

The West side has a high volume of POTS traffic.

The West side of town is downloading larger packets.


The service provider is closer to the location on the East side.

More clients share a connection to the DSLAM on the West side.
2

Refer to the exhibit. The network administrator creates a standard access control list to prohibit traffic from the 192.168.1.0/24 network from reaching the 192.168.2.0/24 network while still permitting Internet access for all networks. On which router interface and in which direction should it be applied?

interface Fa0/0, inbound

interface Fa0/0, outbound

interface Fa0/1, inbound

interface Fa0/1, outbound

3
Which Frame Relay flow control mechanism is used to signal routers that they should reduce the flow rate of frames?

DE
BE
CIR

FECN

CBIR


4

Refer to the exhibit. A network administrator is attempting to configure a Frame Relay network. The administrator enters the commands as shown in the exhibit on R2, but the Frame Relay PVCs are inactive. What is the problem?
The incorrect DLCI numbers are being configured on R2.
The S0/0/0 interface on R2 needs to be point-to-point.
The frame-relay map commands are missing the cisco keyword at the end.
A single router interface cannot connect to more than one Frame Relay peer at a time.

5
What are two main VPN components that protect data from eavesdropping? (Choose two.)

checksum

digital certificates

encapsulation

encryption

hashing

6

Refer to the exhibit. Communication between two peers has failed. Based on the output that is shown, what is the most likely cause?
interface reset
unplugged cable
improper LMI type
PPP negotiation failure

READ MORE » CCNA4 Final 8th December 2009

Using Google Public DNS

Configuring your network settings to use Google Public DNS

When you use Google Public DNS, you are changing your DNS "switchboard" operator from your ISP to Google Public DNS.
In most cases, the IP addresses used by your ISP's domain name servers are automatically set by your ISP via the Dynamic Host Configuration Protocol (DHCP). To use Google Public DNS, you need to explicitly change the DNS settings in your operating system or device to use the Google Public DNS IP addresses. The procedure for changing your DNS settings varies according to operating system and version (Windows, Mac or Linux) or the device (computer, phone, or router). We give general procedures here that might not apply for your OS or device; please consult your vendor documentation for authoritative information.
Note: We recommend that only users who are proficient with configuring operating system settings make these changes.

Important: Before you start

Before you change your DNS settings to use Google Public DNS, be sure to write down the current server addresses or settings on a piece of paper. It is very important that you keep these numbers for backup purposes, in case you need to revert to them at any time.
After changing your settings, if you encounter a problem and cannot connect to the Internet, please call our support numbers for troubleshooting instructions.
We also recommend that you download this page and print it, in the event that you encounter a problem and need to refer to these instructions.

Google Public DNS telephone support

  • 877-590-4367 in the U.S.
  • 770-200-1201 outside the U.S.

Google Public DNS IP addresses

The Google Public DNS IP addresses are as follows:
  • 8.8.8.8
  • 8.8.4.4
You can use either number as your primary or secondary DNS server. You can specify both numbers, but do not specify one number as both primary and secondary.
READ MORE » Using Google Public DNS

Panasonic ToughBook CF-30

We drop it, we pour water on it, we drive a car over it! Oh, and Andy jumps on it too. 

READ MORE » Panasonic ToughBook CF-30

Pass4sure CCNA 640-802 v7.73 Full Version

READ MORE » Pass4sure CCNA 640-802 v7.73 Full Version

Submit Documents

Submit Documents

Do you have CCNA Modules, CCNA Finals, CCNA Skills...?
Then send them our way and we will most likely post them if you are actually taking the time to send.
All Documents can be sent to: quocvuong.it[at]gmail[dot]com
( quocvuong.it@gmail.com ) 
or Click to this link to upload
Thanks for the help this site become a CCNA famous site
December 02 2009
Pageviews: 17 000 Pageviews/day
Google Pr:
Page Rank

Alexa rank:
 We will always update the latest versions


READ MORE » Submit Documents

CCNA4 Final (Update Wednesday December 2 2009 ) - 14 new questions

READ MORE » CCNA4 Final (Update Wednesday December 2 2009 ) - 14 new questions

CCNA3 Final (EXAM DATE: 22 November 2009) - Take Assessment - ESwitching Final Exam - CCNA Exploration: LAN Switching and Wireless (Version 4.0)

EXAM DATE: 22 November 2009 (Thank Dank Heaven)

Take Assessment - ESwitching Final Exam - CCNA Exploration: LAN Switching and Wireless (Version 4.0)




1
Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices should the IP phones connect?
AS1 and AS2
DS1 and DS2
DS1, DS2, and CS1
AS1, AS2, DS1, and DS2
2
A wireless client is attempting to establish a connection with a wireless access point. What process does the client use to discover the access points which are available to it?
probing
beaconing
association
authentication
www.ccna4u.org www.ccna4u.net
3
Which statement is correct about STP architecture?
Spanning Tree Protocol will guarantee a loop free Layer 2 topology.
Spanning Tree Protocol guarantees the shortest path to destination networks.
The switch with the highest priority will be assigned the lowest BID in the root election.
The first step in the spanning-tree election process is to determine the root port.
To select designated ports, the spanning-tree algorithm must determine the longest contiguous path from the root bridge.
4
Refer to the exhibit. Users A and B are reporting intermittent connectivity problems. Pre-installation surveys showed strong signal strength from the AP locations to the client locations. Outside electrical interference has been eliminated. What will fix the problem?
Relocate the APs closer to each other.
Increase the distance between the clients.
Change the channel on AP-B to 6 or 11.
Place AP-A and AP-B on the same wireless channel.

READ MORE » CCNA3 Final (EXAM DATE: 22 November 2009) - Take Assessment - ESwitching Final Exam - CCNA Exploration: LAN Switching and Wireless (Version 4.0)

CCNA 1 Chapter 3

hat application layer protocol is commonly used to support for file transfers between a client and a server?

HTML
HTTP
** FTP
Telnet

2. What are two forms of application layer software? (Choose two.)

** applications
dialogs
requests
** services
syntax

3. A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model? (Choose two.)

** centralized administration
does not require specialized software
** security is easier to enforce
lower cost implementation
provides a single point of failure

4. What is the purpose of resource records in DNS?

temporarily holds resolved entries
** used by the server to resolve names
sent by the client to during a query
passes authentication information between the server and client

5. What is the automated service that matches resource names with the required IP address?

HTTP
SSH
FQDN
** DNS
Telnet
SMTP

6. What three protocols operate at the Application layer of the OSI model? (Choose three.)

ARP
** DNS
PPP
** SMTP
** POP
ICMP

READ MORE » CCNA 1 Chapter 3

CCNA 1 Module 4

1


Refer to the exhibit. What two pieces of information can be determined from the output that is shown? (Choose two.)
The local host is using well-known port numbers to identify the source ports.
**A termination request has been sent to 192.135.250.10.
**Communication with 64.100.173.42 is using HTTP Secure.
The local computer is accepting HTTP requests.
192.168.1.101:1042 is performing the three-way handshake with 128.107.229.50:80.

2 After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the response from the server?
13
53
**80
1024
1728

3 Which information is found in both the TCP and UDP header information?
sequencing
flow control
acknowledgments
**source and destination

4 Which is an important characteristic of UDP?
acknowledgement of data delivery
**minimal delays in data delivery
high reliability of data delivery
same order data delivery

5


Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. What action will Server 1 take as a result?
create a Layer 1 jam signal
**reach a timeout and resend the data that needs to be acknowledged
send a RESET bit to the host
change the window size in the Layer 4 header

6



Refer to the exhibit. In line 7 of this Wireshark capture, what TCP operation is being performed?
**session establishment
segment retransmit
data transfer
session disconnect

7




Refer to the exhibit. The initial TCP exchange of data between two hosts is shown in the exhibit. Assuming an initial sequence number of 0, what sequence number will be included in Acknowledgment 2 if Segment 6 is lost?
2
3
6
1850
**3431
3475

8 Why is flow control used for TCP data transfer?
to synchronize equipment speed for sent data
to synchronize and order sequence numbers so data is sent in complete numerical order
**to prevent the receiver from being overwhelmed by incoming data
to synchronize window size on the server
to simplify data transfer to multiple hosts

9 During a TCP communication session, if the packets arrive to the destination out of order, what will happen to the original message?
The packets will not be delivered.
The packets will be retransmitted from the source.
**The packets will be delivered and reassembled at the destination.
The packets will be delivered and not reassembled at the destination.

10 With TCP/IP data encapsulation, which range of port numbers identifies all well-known applications?
0 to 255
256 to 1022
**0 to 1023
1024 to 2047
49153 to 65535

11 Which transport layer protocol provides low overhead and would be used for applications which do not require reliable data delivery?
TCP
IP
**UDP
HTTP
DNS

12 What are two features of the User Datagram Protocol (UDP)? (Choose two.)
flow control
**low overhead
**connectionless
connection-oriented
sequence and acknowledgements

13 What mechanism is used by TCP to provide flow control as segments travel from source to destination?
sequence numbers
session establishment
**window size
acknowledgments

14 What is dynamically selected by the source host when forwarding data?
destination logical address
source physical address
default gateway address
**source port

15 Why are port numbers included in the TCP header of a segment?
to indicate the correct router interface that should be used to forward a segment
to identify which switch ports should receive or forward the segment
to determine which Layer 3 protocol should be used to encapsulate the data
**to enable a receiving host to forward the data to the appropriate application
to allow the receiving host to assemble the packet in the proper order

16 Which two options represent Layer 4 addressing? (Choose two.)
identifies the destination network
identifies source and destination hosts
**identifies the communicating applications
**identifies multiple conversations between the hosts
identifies the devices communicating over the local media

17 Which three features allow TCP to reliably and accurately track the transmission of data from source to destination?
encapsulation
**flow control
connectionless services
**session establishment
**numbering and sequencing
best effort delivery

18 Which OSI model layer is responsible for regulating the flow of information from source to destination, reliably and accurately?
application
presentation
session
**transport
network

19




Based on the transport layer header shown in the diagram, which of the following statements describe the established session? (Choose two.)
This is a UDP header.
**This contains a Telnet request.
This contains a TFTP data transfer.
The return packet from this remote host will have an Acknowledgement Number of 43693.
**This is a TCP header.

20 Which event occurs during the transport layer three-way handshake?
The two applications exchange data.
**TCP initializes the sequence numbers for the sessions.
UDP establishes the maximum number of bytes to be sent.
The server acknowledges the bytes of data received from the client.

21


Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?

Host1 sends a segment with the ACK flag = 0, SYN flag = 0 to Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 0 to Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 1 to Host2.
Host2 sends a segment with the ACK flag = 0, SYN flag = 1 to Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 0 to Host1.
**Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1.
READ MORE » CCNA 1 Module 4

CCNA v4 - E2 - Module 1(100%)

1. Which two things can be determined by using the ping command? (Choose two.)

the number of routers between the source and destination device
the IP address of the router nearest the destination device
**the average time it takes a packet to reach the destination and for the response to return to the source
**whether or not the destination device is reachable through the network
the average time it takes each router in the path between source and destination to respond


2. What are three main types of high-bandwidth connection options used by medium- to large-sized businesses? (Choose three.)

DSL
cable modem
Ethernet
**metro Ethernet
**T1
**T3


3. What is the maximum T1 transmission speed?

56 kbps
128 kbps
**1.544 Mbps
2.4 Mbps


4. Which of the following start the test of destination reachability?

**echo request issued by source
echo reply issued by source
echo request issued by destination
echo reply issued by destination

READ MORE » CCNA v4 - E2 - Module 1(100%)

CCNA FAQs & Tips

CCNA is a long topic to talk about and there are many tips that can help you save much time when sitting in the exam hall. From the comments here and information from other places, this article tries to summarize all the CCNA frequently asked questions to save you some time. Please feel free to ask anything that you are unclear about CCNA so that all of us can help you. I will update this article frequently to bring you the newest information about this exam.
READ MORE » CCNA FAQs & Tips

CCNA4 - FINAL - F (Lastest)

CCNA4 - FINAL - F (Lastest)

>>DOWNLOAD << www.ccna4u.org
www.ccna4u.org
READ MORE » CCNA4 - FINAL - F (Lastest)

CCNA1 Practice Final H(98%)

Practice Final (98%)

1.
Refer to the exhibit. A network technician wants to connect host A to the console
of a Cisco switch to initialize the configuration.
What type of cable is required for this connection?

straight-through cable

crossover cable

rollover cable

serial cable



2
Which device should be used for routing a packet to a remote network?

access switch

DHCP server

hub

router



3


READ MORE » CCNA1 Practice Final H(98%)

Advanced IP Address Calculator v1.1

This is version 1.0 of subnet calculato (Beta)

www.ip-subnet.info

Wait me in version 2.0 (I'm Coding...)

Advanced IP Address Calculator Desciption:

The Advanced IP Address Calculator is a freeware Windows 95/98/NT/2000/XP utility that lets you to calculate every aspect of your subnet configuration in a few mouse clicks! It was designed for any network engineer who needs a fast way to determine subnets.
License: Freeware | Price: $0.00 | Size: 272 KB | Downloads
Platform: Windows NT, Windows 2000, Windows Me, Windows XP, Windows 2003
www.ccna4u.org

www.ccna4u.org
READ MORE » Advanced IP Address Calculator v1.1

CCNA2 Final G - Publish in August 2009


Click to picture to view full size
Shared by
Javier Madrigal
>> Download here <<
Link to www.ccna4u.org if you copy from this page
If you want share your exam test, please send to email: quocvuong.it@gmail.com, i will back link to your site or blog or both (If you want!). Very thank
Sorry to VU QUOC (Because i'm too busy, i can't help you....)
Welcome to lagest CCNA Blog:
CCNA4U.ORG
CCNA4U.INFO
CCNA4U.NET
CCNA4U.TK
IP-SUBNET.INFO
9TUT.INFO




www.ccna4u.org

www.ccna4u.org
READ MORE » CCNA2 Final G - Publish in August 2009

CCNA4 Final G(Sep 2009)

I will post img letter
1.
What are two main components of data confidentiality? (Choose two.)
check sum
digital certificates
encapsulation
encryption

hashing

2.
While troubleshooting a problem with an e-mail server, an administrator observes that the switch port used by the server shows "up, line protocol up". The administrator cannot ping the server. At which layer of the OSI model is the problem most likely to be found?
application layer
network layer
data link layer
physical layer

READ MORE » CCNA4 Final G(Sep 2009)

CCNA2 Final Exam version 4.0 (100/100)

DOWNLOAD
ERouting Final Exam - CCNA Exploration: Routing Protocols and Concepts (Version 4.0)

1
Which three statements are true regarding the encapsulation and de-encapsulation of packets when traveling through a router? (Choose three.)
***The router modifies the TTL field, decrementing it by one.
The router changes the source IP to the IP of the exit interface.
***The router maintains the same source and destination IP.
***The router changes the source physical address to the physical address of the exit interface.
The router changes the destination IP to the IP of the exit interface.
The router sends the packet out all other interfaces, besides the one it entered the router on.



2
Refer to the exhibit. Packets destined to which two networks will require the router to perform a recursive lookup? (Choose two.)
***10.0.0.0/8
64.100.0.0/16
128.107.0.0/16
172.16.40.0/24
192.168.1.0/24
***192.168.2.0/24

READ MORE » CCNA2 Final Exam version 4.0 (100/100)

CCNA1 Final Exam version 4.0 (100/100) - (B)

Take Assessment - ENetwork Final Exam - Network Fundamentals (Version 4.0)

Updated March 11th 2009

100/100

>>download<<

******************************************************************************


1 A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC?

Use the ipconfig /all command at the host�s command prompt.
X Use the ping 127.0.0.1 command at the command prompt.
Use the traceroute command at the command prompt to identify any failures on the path to the gateway.
Use FTP to check for connectivity to remote sites.
Download a troubleshooting tool from the PC manufacturer's website.


2 Refer to the exhibit. Which set of devices contains only intermediary devices?

X A, B, D, G
A, B, E, F
C, D, G, I
G, H, I, J

READ MORE » CCNA1 Final Exam version 4.0 (100/100) - (B)

CCNA 2 v4.0 Final Exam Answers

DOWNLOAD
ERouting Final Exam - CCNA Exploration: Routing Protocols and Concepts (Version 4.0)

1
Which three statements are true regarding the encapsulation and de-encapsulation of packets when traveling through a router? (Choose three.)
***The router modifies the TTL field, decrementing it by one.
The router changes the source IP to the IP of the exit interface.
***The router maintains the same source and destination IP.
***The router changes the source physical address to the physical address of the exit interface.
The router changes the destination IP to the IP of the exit interface.
The router sends the packet out all other interfaces, besides the one it entered the router on.



2
Refer to the exhibit. Packets destined to which two networks will require the router to perform a recursive lookup? (Choose two.)
***10.0.0.0/8
64.100.0.0/16
128.107.0.0/16
172.16.40.0/24
192.168.1.0/24
***192.168.2.0/24




www.ccna4u.org
READ MORE » CCNA 2 v4.0 Final Exam Answers

CCNA Practice Certification Exam # 2- CCNA Exploration: Accessing the WAN (Version 4.0)


CCNA Practice Certification Exam # 2- CCNA Exploration: Accessing the WAN (Version 4.0)
1. Refer to the exhibit. The exhibit shows simplified protocol data units from different OSI model layers. Which three statements are true about the PDUs and the encapsulation process? (Choose three.)




PDU #1 is a frame.

PDU #2 is an application layer PDU

PDU #3 is a segment.

PDU #4 is a transport layer PDU.

The order in which these PDUs are created during the encapsulation process is 3, 4, 1, 2.

The order in which these PDUs are created during the encapsulation process is 2, 1, 4, 3.






2. Which three application layer protocols use TCP? (Choose three.)

SMTP

FTP

SNMP

HTTP

TFTP

DHCP

3. Which two application layer protocols use the UDP protocol? (Choose two.)

Telnet

SNMP

SMTP

SQL

TFTP

4. What are two functions that occur at the Internet layer of the TCP/IP model? (Choose two.)

establishment of logical connections between source and destination hosts

end-to-end flow control

determination of best paths through the network

definition of the procedures used to interface with the network hardware

packet switching

Layer 5 and Layer 6 OSI model functions

5. Refer to the exhibit. All ports on switch A are in the sales VLAN and all ports on switch B are in the accounting VLAN. How many broadcast domains and how many collision domains exist in the exhibited network? (Choose two.)

READ MORE » CCNA Practice Certification Exam # 2- CCNA Exploration: Accessing the WAN (Version 4.0)

CCNA Practice Certification Exam # 1- CCNA Exploration: Accessing the WAN (Version 4.0)

CCNA Practice Certification Exam # 1 - CCNA Exploration: Accessing the WAN (Version 4.0)
1. What are three examples of TCP/IP application layer protocols? (Choose three.)

a terminal emulation protocol that supports remote console connections with various network devices

a protocol created by IBM that makes it easier for mainframes to connect to remote offices

a protocol responsible for transporting electronic mail on TCP/IP networks and the Internet

a protocol that controls the rate at which data is sent to another computer

a protocol that exchanges network management information between a network device and a management console

a protocol that conducts a test of the path through which a packet travels from source to destination

2. Refer to the exhibit. The exhibit shows simplified protocol data units from different OSI model layers. Which three statements are true about the PDUs and the encapsulation process? (Choose three.)

PDU #1 is a frame.

PDU #2 is an application layer PDU

PDU #3 is a segment.

PDU #4 is a transport layer PDU.

The order in which these PDUs are created during the encapsulation process is 3, 4, 1, 2.

The order in which these PDUs are created during the encapsulation process is 2, 1, 4, 3.


READ MORE » CCNA Practice Certification Exam # 1- CCNA Exploration: Accessing the WAN (Version 4.0)

Free Link exchange

Hello, if you want exchange link with this blog, please comment in this post with form:

Link:
Text:
Title :



You need add link to my blog, i will add your link(No sex please....)
Link: http://www.ccna4u.org
Text: Cisco Exploration CCNA 4.0
Title : Cisco Exploration CCNA 4.0


www.ccna4u.org

www.ccna4u.org
READ MORE » Free Link exchange

Download now

I will update this page when i have new version
Thanks
http://ccna4u.4shared.com

Pass4sure

http://www.ccna4u.org/2009/07/latest-pass4sure-ccna.html

CCNA Curriculum (ENGLISH)

Exploration 1 – Network Fundamentals
Exploration 2 – Routing Protocols and Concepts
Exploration 3 – LAN Switching and Wireless

Exploration 4 – Accesing the WAN

Cisco Packet tracer 5.1

http://hotfile.com/dl/20225668/74624a8/Cisco_PacketTracer51.exe.html

Cisco Packet tracer 5.2 (Lastest version)

http://hotfile.com/links/20224975/348c651/PacketTracer52_setup_no_tutorials.exe.html




CCNA1:

Final:

http://www.ccna4u.org/2009/09/ccna1-practice-final-h98.html
http://www.4shared.com/file/112884406/2580f6f6/CCNA1_FINAL_V2_Jun_2009_Shared_by_CCNA4UORG.html
http://www.4shared.com/file/112832707/27a16f4/CCNA1_Final_shared_by_Tobias.html
http://www.4shared.com/file/112574792/cfa7b3f0/ccna1_final__Jun_18th_2009_shared_by_ccna4uorg__.html

CCNA2:

Chapter1 -2 =100%
Chapter 4->10=100%
Chapter3 and 11 >95%
Download now
CCNA2 FINAL E - Lastest in JULY 2009
http://www.4shared.com/file/135729477/d3c81bfd/CCNA2_v40_Final_Exam_H_27-09-2009_.html

CCNA2 Final G - Publish in August 2009



CCNA3:

CCNA4:

http://www.4shared.com/get/111298222/f393832c/CCNA4_FULL_100.html
http://www.4shared.com/file/111298770/6621d4ae/ccna4s4final_-_lastest_10_jun_2009.html

http://www.4shared.com/file/136035727/f7a2edcc/CCNA4_Final_H.html

CCNA Skill+ Final Full(CCNA1-CCNA3-CCNA4): Download

Skill Full: Q&A: Download

CCNA4 - FINAL - F (Lastest)

Packet Tracer Video Downloads
Title Document Type
Low resolution version (ZIP - 8.8 MB)
High resolution version (ZIP - 13.1 MB)
High resolution self-running .exe version (ZIP - 14.4 MB)
READ MORE » Download now

CCNA 3 final test

1
Refer to the graphic. Which of the following commands would be used on the router to provide communication between the two hosts connected to the switch?
interface vlan 2
ip address 192.168.2.1 255.255.255.0
no shutdown
interface vlan 3
ip address 192.168.3.1 255.255.255.0
no shutdown
*** interface fastethernet 0/0
no shutdown
interface fastethernet 0/0.2
encapsulation dot1q 2
ip address 192.168.2.1 255.255.255.0
interface fastethernet 0/0.3
encapsulation dot1q 3
ip address 192.168.3.1 255.255.255.0
interface vlan 2
switchport mode trunk dot1q
interface vlan 3
switchport mode trunk dot11
interface fastethernet 0/0
mode trunk dot1q 2 3
ip address 192.168.2.1 255.255.255.0
READ MORE » CCNA 3 final test

CCNA2 - Final (E)

DOWNLOAD
1
Which routing protocol maintains a topology table separate from the routing table?
IGRP
RIPv1
RIPv2
*EIGRP

2

Photobucket

Refer to the exhibit. All routers are running RIPv1. The two networks 10.1.1.0/29 and 10.1.1.16/29 are unable to access each
other. What can be the cause of this problem?
Because RIPv1 is a classless protocol, it does not support this access.
*RIPv1 does not support discontiguous networks.
RIPv1 does not support load balancing.
RIPv1 does not support automatic summarization.
www.ccna4u.org

3
Which two statements are correct about the split horizon with poison reverse method of routing loop prevention? (Choose
two.)
It is enabled by default on all Cisco IOS implementations.
*It assigns a value that represents an infinite metric to the poisoned route.
It sends back the poisoned route update to the same interface from where it was received.
It instructs routers to hold all changes that might affect routes, for a specified period of time.
*It limits the number of hops a packet can traverse through the network before it is discarded.

Holddown timers are used to prevent regular update messages from inappropriately reinstating a route that may have gone bad. The split horizon rule says that a router should not advertise a network through the interface from which the update came. Route poisoning is used to mark the route as unreachable in a routing update that is sent to other routers. The rule for split horizon with poison reverse states when sending updates out a specific interface, designate any networks that were learned on that interface as unreachable.

4
What are two reasons for the occurrence of a routing loop? (Choose two.)
slow convergence
*incorrectly configured static routes
routes that are learned via two routing protocols
*static and dynamic routing being used on the same router
lack of a default route on the router that connects to the Internet

The loop may be a result of: Incorrectly configured static routes Incorrectly configured route redistribution (redistribution is a process of handing the routing information from one routing protocol to another routing protocol and is discussed in CCNP-level courses) Inconsistent routing tables not being updated due to slow convergence in a changing network Incorrectly configured or installed discard routes

5
All routers in a network are configured in a single OSPF area with the same priority value. No loopback interface has been
set on any of the routers. Which secondary value will the routers use to determine the router ID?
The highest MAC address among the active interfaces of the network will be used.
There will be no router ID until a loopback interface is configured.
The highest IP address among the active FastEthernet interfaces that are running OSPF will be used.
*The highest IP address among the active interfaces will be used.

Determining the Router ID The OSPF router ID is used to uniquely identify each router in the OSPF routing domain. A router ID is simply an IP address. Cisco routers derive the router ID based on three criteria and with the following precedence: 1. Use the IP address configured with the OSPF router-id command. 2. If the router-id is not configured, the router chooses highest IP address of any of its loopback interfaces. 3. If no loopback interfaces are configured, the router chooses highest active IP address of any of its physical interfaces.

6


Photobucket
Refer to the exhibit. Although R2 is configured correctly, host A is unable to access the Internet. What are two static
routes that can be configured on R1, either of which would enable Internet connectivity for host A? (Choose two.)

ip route 0.0.0.0 0.0.0.0 Fa0/0
*ip route 0.0.0.0 0.0.0.0 Fa0/1
ip route 0.0.0.0 0.0.0.0 10.1.1.1
*ip route 0.0.0.0 0.0.0.0 10.1.1.2
ip route 209.165.202.0 255.255.255.0 10.1.1.1

7
What is the function of the OSPF LSR packet?
It is used to confirm the receipt of LSUs.
It is used to establish and maintain adjacency with other OSPF routers.
*It is used by the receiving routers to request more information about any entry in the DBD.
It is used to check the database synchronization between routers


1. Hello - Hello packets are used to establish and maintain adjacency with other OSPF routers. 2. DBD - The Database Description (DBD) packet contains an abbreviated list of the sending router's link-state database and is used by receiving routers to check against the local link-state database. 3. LSR - Receiving routers can then request more information about any entry in the DBD by sending a Link-State Request (LSR). 4. LSU - Link-State Update (LSU) packets are used to reply to LSRs as well as to announce new information. LSUs contain seven different types of Link-State Advertisements (LSAs). LSUs and LSAs are briefly discussed in a later topic. 5. LSAck - When an LSU is received, the router sends a Link-State Acknowledgement (LSAck) to confirm receipt of the LSU.

8


Photobucket
Refer to the exhibit. A network administrator is accessing router R1 from the console port. Once the administrator is
connected to the router, which password should the administrator enter at the R1> prompt to access the privileged EXEC
mode?
Cisco001
Cisco123
*Cisco789
Cisco901

9
Which two technologies can be used in distance vector routing protocols to prevent routing loops? (Choose two.)
authentication
link-state advertisements
*hold-down timers
Spanning Tree Protocol
*split horizon


Holddown timers are used to prevent regular update messages from inappropriately reinstating a route that may have gone bad. The split horizon rule says that a router should not advertise a network through the interface from which the update came. Route poisoning is used to mark the route as unreachable in a routing update that is sent to other routers. The rule for split horizon with poison reverse states when sending updates out a specific interface, designate any networks that were learned on that interface as unreachable.
10

Photobucket

Refer to the exhibit. An administrator is adding a new subnet of 50 hosts to R3. Which subnet address should be used for
the new subnet that provides enough addresses while wasting a minimum of addresses?

192.168.1.0/24
192.168.1.48 /28
192.168.1.32/27
*192.168.1.64/26
Photobucket
11
*192.168.1.64/26
Photobucket
Refer to the exhibit. Host A is unable to access the Internet. What is the reason for this?
Photobucket
The IP address of host A is incorrect.
The default gateway of host A is incorrect.
*The Fa0/1 interfaces of the two routers are configured for different subnets.
The subnet mask for the Fa0/0 interface of R1 is incorrect.


12
A network administrator uses the RIP routing protocol to implement routing within an autonomous system. What are two
characteristics of this protocol? (Choose two.)
*It uses the Bellman-Ford algorithm to determine the best path.
It displays an actual map of the network topology.
It offers rapid convergence in large networks.
*It periodically sends complete routing tables to all connected devices.
It is beneficial in complex and hierarchically designed networks.
13
Photobucket
Refer to the exhibit. What is the meaning of the highlighted value 2?
It is the administrative distance of the routing protocol.
*It is the number of hops between R2 and the 192.168.8.0/24 network.
It is the value used by the DUAL algorithm to determine the bandwidth for the link.
It is the convergence time measured in seconds.

14


Photobucket
Refer to the exhibit. Packets destined to which two networks will require the router to perform a recursive lookup? (Choose
two.)
*10.0.0.0/8
64.100.0.0/16
128.107.0.0/16
172.16.40.0/24
192.168.1.0/24
*192.168.2.0/24


Ingat recursive lookup , ingat (via)^_^
www.ccna4u.net
www.ccna4u.org

15
Photobucket
Refer to the exhibit. The 10.4.0.0 network fails. What mechanism prevents R2 from receiving false update information
regarding the 10.4.0.0 network?
*split horizon
hold-down timers
route poisoning
triggered updates

Holddown timers are used to prevent regular update messages from inappropriately reinstating a route that may have gone bad. The split horizon rule says that a router should not advertise a network through the interface from which the update came. Route poisoning is used to mark the route as unreachable in a routing update that is sent to other routers. The rule for split horizon with poison reverse states when sending updates out a specific interface, designate any networks that were learned on that interface as unreachable.


16

Refer to the exhibit. The routers are properly configured using a dynamic routing protocol with default settings, and the
network is fully converged. Router A is forwarding data to router E. Which statement is true about the routing path?
*If the network uses the RIP protocol, router A will determine that all paths have equal cost.
If the network uses the RIP protocol, router A will update only the A-C-E path in its routing table.
If the network uses the EIGRP routing protocol, router A will determine that path A-D-E has the lowest cost.
If both RIP and EIGRP protocols are configured on router A, the router will use the route information that is
learned by the RIP routing protocol.


17

Refer to the exhibit. All routers are running the same routing protocol. Based on the exhibit and its displayed commands,
which statement is true?
The wildcard mask is incorrectly configured.
A default route must be configured on every router.
Routers B, C, and D have no access to the Internet.
*The link to the ISP is not advertised by the routing protocol process.

18


Photobucket
Refer to the exhibit. A ping between host A and host B is successful, but pings from host A to operational hosts on the
Internet fail. What is the reason for this problem?
The FastEthernet interface of R1 is disabled.
*One of the default routes is configured incorrectly.
A routing protocol is not configured on both routers.
The default gateway has not been configured on host A.
19
Photobucket
Refer to the exhibit. While trying to diagnose a routing problem in the network, the network administrator runs the debug ip
rip command. What can be determined from the output of this command?
The router is broadcasting RIP updates.
The router will be unable to ping 192.168.1.2.
The router is directly connected to network 172.16.1.0 /24.
*The router has two interfaces that participate in the RIP process.

20
A router boots and enters setup mode. What is the reason for this?
The IOS image is corrupt.
Cisco IOS is missing from flash memory.
*The configuration file is missing from NVRAM.
The POST process has detected hardware failure.

21
Photobucket
Refer to the exhibit. Which three statements are true of the routing table for Router1? (Choose three.)

The route to network 172.16.0.0 has an AD of 156160.
Network 192.168.0.16 can best be reached using FastEthernet0/0.
*The AD of EIGRP routes has been manually changed to a value other than the default value.
*Router1 is running both the EIGRP and OSPF routing process. Network 172.17.0.0 can only be reached using a default route. *No default route has been configured.
22
Photobucket
A network administrator has enabled RIP on routers B and C in the network diagram. Which of the following commands will
prevent RIP updates from being sent to Router A?
A(config)# router rip
A(config-router)# passive-interface S0/0
B(config)# router rip
B(config-router)# network 192.168.25.48
B(config-router)# network 192.168.25.64
A(config)# router rip
A(config-router)# no network 192.168.25.32
*B(config)# router rip B(config-router)# passive-interface S0/0 A(config)# no router rip

23
Photobucket
Refer to the exhibit. The show cdp neighbors command was run at R1. Which two facts about the newly detected device can
be determined from the output? (Choose two.)
*ABCD is a router that is connected to R1.
ABCD is a non-CISCO device that is connected to R1.
*The device is connected at the Serial0/0/1 interface of R1.
R1 is connected at the S0/0/1 interface of device ABCD.
ABCD does not support switching capability.




24
Which statement is true about the metrics used by routing protocols?
*A metric is a value used by a particular routing protocol to compare paths to remote networks. A common metric is used by all routing protocols.
The metric with the highest value is installed in the routing table.
The router may use only one parameter at a time to calculate the metric.
25
Refer to the exhibit. What action will R2 take for a packet that is destined for 192.168.2.0?
It will drop the packet.
It will forward the packet via the S0/0/0 interface.
It will forward the packet via the Fa0/0 interface.
*It will forward the packet to R1.

26
Which two router component and operation pair are correctly described? (Choose two.)
DRAM - loads the bootstrap
RAM - stores the operating system
Flash - executes diagnostics at bootup
*NVRAM - stores the configuration file
ROM - stores the backup configuration file
*POST - runs diagnostics on hardware modules

27
Which two statements are true about the EIGRP successor route? (Choose two.)
It is saved in the topology table for use if the primary route fails.
*It may be backed up by a feasible successor route. *It is used by EIGRP to forward traffic to the destination.
It is flagged as active in the routing table.
After the discovery process has occurred, the successor route is stored in the neighbor table.
28
Photobucket
Refer to the exhibit. Which two facts can be derived from this output? (Choose two.)
*Three network devices are directly connected to Router2. *The serial interface between Router2 and Router3 is up.
Router1 and Router3 are directly connected.
Six devices are up and running on the network.
Layer 3 functionality between routers is configured properly.


Ilustrasi gambarnya :

Photobucket
29
In a lab test environment, a router has learned about network 172.16.1.0 through four different dynamic routing processes.
Which route will be used to reach this network?
*D 172.16.1.0/24 [90/2195456] via 192.168.200.1, 00:00:09, Serial0/0/0
O 172.16.1.0/24 [110/1012] via 192.168.200.1, 00:00:22, Serial0/0/0
R 172.16.1.0/24 [120/1] via 192.168.200.1, 00:00:17, Serial0/0/0
I 172.16.1.0/24 [100/1192] via 192.168.200.1, 00:00:09, Serial0/0/0

30
Which three statements are true regarding the encapsulation and de-encapsulation of packets when traveling through a
router? (Choose three.)
*The router modifies the TTL field, decrementing it by one.
The router changes the source IP to the IP of the exit interface.
*The router maintains the same source and destination IP. *The router changes the source physical address to the physical address of the exit interface. The router changes the destination IP to the IP of the exit interface.
The router sends the packet out all other interfaces, besides the one it entered the router on.
31
Photobucket
Refer to the exhibit. Both routers are using the RIPv2 routing protocol and static routes are undefined. R1 can ping
192.168.2.1 and 10.1.1.2, but is unable to ping 192.168.4.1.

What is the reason for the ping failure?
The serial interface between two routers is down.
R2 is not forwarding the routing updates.
*The 192.168.4.0 network is not included in the RIP configuration of R2. RIPv1 needs to be configured.
32
Photobucket
Refer to the exhibit. Two routers are unable to establish an adjacency. What is the possible cause for this?
The two routers are connected on a multiaccess network.
*The hello and dead intervals are different on the two routers. They have different OSPF router IDs.
They have different process IDs.
33
Photobucket
Refer to the exhibit. Routers R1 and R2 are directly connected via their serial interfaces and are both running the EIGRP
routing protocol. R1 and R2 can ping the directly connected serial interface of their neighbor, but they cannot form an
EIGRP neighbor adjacency.


What action should be taken to solve this problem?
Enable the serial interfaces of both routers.
Configure EIGRP to send periodic updates.
Configure the same hello interval between the routers.
*Configure both routers with the same EIGRP process ID.
34
Photobucket
Refer to the exhibit. R1 and R2 are unable to establish an adjacency. What two configuration changes will correct the
problem? (Choose two.)
Set a lower priority on R2.
*Configure the routers in the same area.
Set a lower cost on R2 compared to R1.
Add a backup designated router to the network.
*Match the hello and dead timers on both routers.
35
Photobucket
Refer to the exhibit. All routers are properly configured to use the EIGRP routing protocol with default settings, and the
network is fully converged. Which statement correctly describes the path that the traffic will use from the 10.1.1.0/24
network to the 10.1.2.0/24 network?
It will use the A-D path only.
It will use the path A-D, and the paths A-C-D and A-B-D will be retained as the backup paths.
It will use all the paths equally in a round-robin fashion.
*The traffic will be load-balanced between A-B-D and A-C-D.
36
Photobucket
Refer to the exhibit. Which router is advertising subnet 172.16.1.32/28?
Router1
Router2
Router3
*Router4

37
Photobucket
Refer to the exhibit. The hosts that are connected to R2 are unable to ping the hosts that are connected to R1. How can this
problem be resolved?
Configure the router ID on both routers.
*Configure the R2 router interfaces for area 0.
Configure a loopback interface on both routers.
Configure the proper subnet masks on the router interfaces.

38
Photobucket
Refer to the exhibit. The network has three connected routers: R1, R2, and R3. The routes of all three routers are
displayed. All routers are operational and pings are not blocked on this network.

Which ping will fail?
from R1 to 172.16.1.1
from R1 to 192.168.3.1
from R2 to 192.168.1.1
from R2 to 192.168.3.1

39

Refer to the exhibit. Router R2 is configured properly and all interfaces are functional. Router R1 has been installed
recently. Host A is unable to ping host B.

Which procedure can resolve this problem?
Configure a static route on R1 using the IP address of the serial interface on R1.
Configure a default route on R1 with the exit interface Fa0/0 on R1.
*Configure a static route on R1 using the IP address of S0/0/0 on R2.
Configure a default route on R1 using the IP address of Fa0/0 on R2.

40

Refer to the exhibit. To implement the RIPv2 protocol, the network administrator runs the commands as displayed. However,
the show ip protocol command fails to display any output. How can the administrator solve the problem that is indicated by
the lack of output from this command?
Include the default-information originate command.
Include the no auto-summary command.
*Specify the network for which RIP routing has to be enabled.
Implement RIPv2 authentication in the network.

41
Photobucket
Refer to the exhibit. A router learns a route to the 192.168.6.0 network, as shown in the output of the show ip rip database
command. However, upon running the show ip route command, the network administrator sees that the router has installed a
different route to the 192.168.6.0 network learned via EIGRP. What could be the reason for the missing RIP route?
*Compared to RIP, EIGRP has a lower administrative distance.
Compared to EIGRP, RIP has a higher metric value for the route.
Compared to RIP, the EIGRP route has fewer hops.
Compared to RIP, EIGRP has a faster update timer.
42
Photobucket
Refer to the exhibit. A network administrator has configured R1 as shown, and all interfaces are functioning correctly. A
ping from R1 to 172.16.1.1 fails. What could be the cause of this problem?
The serial interface on R1 is configured incorrectly.
*The default route is configured incorrectly.
The default-information originate command must be issued on R1.
Autosummarization must be disabled on R1.

43
Photobucket
Refer to the exhibit. A network administrator wants to reduce the size of the routing table of R1. Which partial routing
table entry in R1 represents the route summary for R2, without including any additional subnets?
10.0.0.0/16 is subnetted, 1 subnets

D 10.5.0.0[90/205891] via 192.168.1.2, S0/0/0
10.0.0.0/24 is subnetted, 4 subnets
D 10.5.0.0[90/205198] via 192.168.1.2, S0/0/0
*10.0.0.0/22 is subnetted, 1 subnets D 10.5.0.0[90/205901] via 192.168.1.2, S0/0/0
10.0.0.0/8 is subnetted, 4 subnets
D 10.5.0.0[90/205001] via 192.168.1.2, S0/0/0

44
Photobucket
Which two statements are true for link-state routing protocols? (Choose two.)
*Routers that run a link-state protocol can establish a complete topology of the network. Routers in a multipoint network that run a link-state protocol can exchange routing tables.
Routers use only hop count for routing decisions.
*The shortest path first algorithm is used. Split horizon is used to avoid routing loops.

45



Refer to the exhibit. Which two components are required to complete the configuration? (Choose two.)
a crossover cable
a DCE device
*a DTE device
a modem
*a V.35 cable


46

Refer to the exhibit. The output of the show ip route command for router R1 is displayed. What action will the router take
for a packet that is destined for 192.168.1.5?
*It will drop the packet.
It will forward the packet to interface Serial0/0/0.
It will determine the route for the packet through a routing protocol.
It will forward the packet to the default gateway.

47
Photobucket
Refer to the exhibit. A network administrator has run the show interface command. The output of this command is
displayed. What is the first step that is required to make this interface operational?
Switch the cable with a known working cable.
*Issue the no shutdown command on the interface. Configure the interface as a loopback interface.
Set the encapsulation for the interface.

48
What are two tasks that must be completed before two routers can use OSPF to form a neighbor adjacency? (Choose two.)
The routers must elect a designated router.
*The routers must agree on the network type. *The routers must use the same dead interval.
The routers must exchange link state requests.
The routers must exchange database description packets.

49
Photobucket
Refer to the exhibit. All interfaces are addressed and functioning correctly. The network administrator runs the tracert
command on host A. Which two facts could be responsible for the output of this command? (Choose two.)
The gateway for Host A is missing or improperly configured.
The gateway for Host B is missing or improperly configured.
The entry for 192.168.1.0/24 is missing from the routing table of R1.
*The entry for 192.168.1.0/24 is missing from the routing table of R2. *The entry for 192.168.2.0/24 is missing from the routing table of R1. The entry for 192.168.2.0/24 is missing from the routing table of R2.

50

Refer to the exhibit. How many routes are ultimate routes?
*3
4
5
7

51


Photobucket
Refer to the exhibit. Which summarization should R1 use to advertise its networks to R2?
192.168.1.0/24
192.168.0.0/24
*192.168.0.0/22
192.168.1.0/22

52
How does route poisoning prevent routing loops?
New routing updates are ignored until the network has converged.
*Failed routes are advertised with a metric of infinity. A route is marked as unavailable when its Time to Live is exceeded.
The unreachable route is cleared from the routing table after the invalid timer expires.

53
What are two functions of a router? (Choose two.)
*It forwards data packets toward their destination. It forwards the packet to the destination if the TTL value is 0.

It changes the destination IP address of data packets before forwarding them to an exit interface.
It determines the best path based on the destination MAC address.
*It acts as an intersection between multiple IP networks.
54
Which two components are used to determine the router ID in the configuration of the OSPF routing process? (Choose two.)
the IP address of the first FastEthernet interface
the highest IP address of any logical interface
*the highest IP address of any physical interface the default gateway IP address
*the priority value of 1 on any physical interface

55

Photobucket

Refer to the exhibit. R2 is configured correctly. The network administrator has configured R1 as shown. Which two facts
are true about the forwarding of route information by R1? (Choose two.)
*R1 will forward the route information for subnet 192.168.100.0/30. *R1 will not forward route information for subnet 192.168.100.4/30. R1 will forward the route information with an administrative distance set to 50.
R1 will forward the summarized route information for network 192.168.100.0/24.
R1 will forward route information for subnet 10.10.10.0/30 out the serial interface.
56
Photobucket
Refer to the exhibit. Which two statements are true based on the exhibited output? (Choose two.)
*All routes are stable. Each route has one feasible successor.
The serial interface between the two routers is down.
The administrative distance of EIGRP has been set to 50.
*The show ip eigrp topology command has been run on R1.
57
A router has learned two equal cost paths to a remote network via the EIGRP and RIP protocols. Both protocols are using
their default configurations. Which path to the remote network will be installed in the routing table?
*the path learned via EIGRP the path learned via RIP
the path with the highest metric value
both paths with load balancing

58
Photobucket
Refer to the exhibit. Routers R1 and R3 use different routing protocols with default administrative distance values. All
devices are properly configured and the destination network is advertised by both protocols.

Which path will be used to transmit the data packets from PC1 to PC2?
*The packets will travel via R2-R1.
The packets will travel via R2-R3.
The traffic will be load-balanced between two paths via R2-R1 and via R2-R3.
The packets will travel via R2-R3, and the other path via R2-R1 will be retained as the backup path.

59
Which statement is true about the RIPv1 protocol?
It is a link-state routing protocol.
*It excludes subnet information from the routing updates. It uses the DUAL algorithm to insert backup routes into the topology table.
It uses classless routing as the default method on the router.


www.ccna4u.org
READ MORE » CCNA2 - Final (E)
 
Design by ccna v5