CCNA 4 Final Exam Answers Option C Quiz Questions and Answers. In this simulation, take your test, get your score and share with others!
- Points: 100
- Questions: 55
- Time limit: None
- Allowed attempts: Unlimited
CCNA 4 V6.0 Final Exam Answers Option C Questions and Answers
Refer to the exhibit. As traffic is forwarded out an egress interface with QoS treatment, which congestion avoidance technique is used?
Which statement describes a feature of site-to-site VPNs?
In which stage of the troubleshooting process would ownership be researched and documented?
Which QoS mechanism allows delay-sensitive data, such as voice, to be sent first before packets in other queues are sent?
Which two technologies are private WAN technologies? (Choose two.)
A company is looking for the least expensive broadband solution that provides at least 10 Mb/s download speed. The company is located 5 miles from the nearest provider. Which broadband solution would be appropriate?
How many DS0 channels are bounded to produce a 1.544 Mb/s DS1 line?
A router has been configured to use simulated network traffic in order to monitor the network performance between the router and a distant network device. Which command would display the results of this analysis?
Refer to the exhibit. Communication between two peers has failed. Based on the output that is shown, what is the most likely cause?
Which WAN technology can switch any type of payload based on labels?
Which three statements are true about PPP? (Choose three.)
What two protocols are supported on Cisco devices for AAA communications? (Choose two.)
What technology can be used to create a private WAN via satellite communications?
To which two layers of the OSI model do WAN technologies provide services? (Choose two.)
Which cellular or mobile wireless standard is considered a fourth generation technology?
Refer to the exhibit. Which two statements describe the results of entering these commands? (Choose two.)
Refer to the exhibit. A network administrator discovers that host A is having trouble with Internet connectivity, but the server farm has full connectivity. In addition, host A has full connectivity to the server farm. What is a possible cause of this problem?
A network administrator has moved the company intranet web server from a switch port to a dedicated router interface. How can the administrator determine how this change has affected performance and availability on the company intranet?
Which public WAN access technology utilizes copper telephone lines to provide access to subscribers that are multiplexed into a single T3 link connection?
A network administrator is evaluating authentication protocols for a PPP link. Which three factors might lead to the selection of CHAP over PAP as the authentication protocol? (Choose three.)
Which technology can ISPs use to periodically challenge broadband customers over DSL networks with PPPoE?
Refer to the exhibit. Considering how packets are processed on a router that is configured with ACLs, what is the correct order of the statements?
Which type of network traffic cannot be managed using congestion avoidance tools?
What does BGP use to exchange routing updates with neighbors?
Which troubleshooting approach is more appropriate for a seasoned network administrator rather than a less-experienced network administrator?
What network monitoring tool copies traffic moving through one switch port, and sends the copied traffic to another switch port for analysis?
A network administrator is configuring a PPP link with the commands:
R1(config-if)# encapsulation ppp
R1(config-if)# ppp quality 70
What is the effect of these commands?
Refer to the exhibit. Which type of Layer 2 encapsulation used for connection D requires Cisco routers?
Which type of tool would an administrator use to capture packets that are going to and from a particular device?
Which two hypervisors are suitable to support virtual machines in a data center? (Choose two.)
Which pillar of the Cisco IoT System allows data to be analyzed and managed at the location where it is generated?
Refer to the exhibit. What two commands are needed to complete the GRE tunnel configuration on router R1? (Choose two.)
What is a secure configuration option for remote access to a network device?
What are three features of a GRE tunnel? (Choose three.)
Refer to the exhibit. The network administrator that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server. Which extended ACL would be used to filter this traffic, and how would this ACL be applied? (Choose two.)
Which SNMP message type informs the network management system (NMS) immediately of certain specified events?
What is a primary difference between a company LAN and the WAN services that it uses?
A corporation is searching for an easy and low cost solution to provide teleworkers with a secure connection to headquarters. Which solution should be selected?
What action can a network administrator take to help mitigate the threat of VLAN attacks?
Refer to the exhibit. What can be determined from this output?
Which circumstance would result in an enterprise deciding to implement a corporate WAN?
How can DHCP spoofing attacks be mitigated?
Match the operation to the appropriate QoS model.
Which IPv6 ACL command entry will permit traffic from any host to an SMTP server on network 2001:DB8:10:10::/64?
Refer to the exhibit. Which SNMP authentication password must be used by the member of the ADMIN group that is configured on router R1?
What are the three core components of the Cisco ACI architecture? (Choose three.)
Refer to the exhibit. A router has an existing ACL that permits all traffic from the 172.16.0.0 network. The administrator attempts to add a new statement to the ACL that denies packets from host 172.16.0.1 and receives the error message that is shown in the exhibit. What action can the administrator take to block packets from host 172.16.0.1 while still permitting all other traffic from the 172.16.0.0 network?
A network administrator has noticed an unusual amount of traffic being received on a switch port that is connected to a college classroom computer. Which tool would the administrator use to make the suspicious traffic available for analysis at the college data center?
What mechanism compensates for jitter in an audio stream by buffering packets and then replaying them outbound in a steady stream?
What is the function of a QoS trust boundary?