CCNA 4 Final Exam V6.0 Answers

1. Refer to the exhibit. A network administrator is troubleshooting the OSPF network. The 10.10.0.0/16 network is not showing up in the routing table of Router1. What is the probable cause of this problem?

A network administrator is troubleshooting the OSPF network

The serial interface on Router2 is down.

There is an incorrect wildcard mask statement for network 10.10.0.0/16 on Router2.

The OSPF process is configured incorrectly on Router1.

The OSPF process is not running on Router2.

 

2. What two protocols are supported on Cisco devices for AAA communications? (Choose two.)

RADIUS

HSRP

LLDP

VTP

TACACS+

CCNA 4 Chapter 9 V6.0 Answers

1. A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. The technician asks the caller to talk to nearby users to see if other machines are affected. The caller reports that several immediate neighbors in the same department have a similar problem and that they cannot ping each other. Those who are seated in other departments have connectivity. What should the technician check as the first step in troubleshooting the issue?

The trunks between switches in the wiring closet

the cable that connects the PC of the caller to the network jack

the cable connection between a PC and a network outlet that is used by a neighbor

the power outlet to the PC that is used by the caller

the status of the departmental workgroup switch in the wiring closet

 

2. Users report that the new web site http://www.company1.biz cannot be accessed. The helpdesk technician checks and verifies that the web site can be accessed with http://www.company1.biz:90. Which layer in the TCP/IP model is involved in troubleshooting this issue?

internet

network access

application

transport

CCNA 4 Chapter 8 V6.0 Answers

1. When should a network performance baseline be measured?

when a denial of service attack to the network is detected and blocked

during normal work hours of an organization

immediately after the main network devices restarted

after normal work hours to reduce possible interruptions

 

2. After which step in the network troubleshooting process would one of the layered troubleshooting methods be used?

narrowing the scope

After which step in the network troubleshooting process would one of the layered troubleshooting methods be used?

gathering symptoms from suspect devices

determining ownership

CCNA 4 Chapter 7 V6.0 Answers

1. Fill in the blank.

In an IoT implementation, devices will be connected to a _converged _ network to share the same infrastructure and to facilitate communications, analytics, and management.

 

2. The exhibit is not required to answer the question. The exhibit shows a fog covering trees on the side of a mountain.What statement describes Fog computing?

What statement describes Fog computing

It utilizes a centralized computing infrastructure that stores and manipulates big data in one very secure data center.

It creates a distributed computing infrastructure that provides services close to the network edge.

It requires Cloud computing services to support non-IP enabled sensors and controllers.

It supports larger networks than Cloud computing does.

CCNA 4 Chapter 6 V6.0 Answers

1. When QoS is implemented in a converged network, which two factors can be controlled to improve network performance for real-time traffic? (Choose two.)

jitter

packet addressing

packet routing

delay

link speed

 

2. An administrator has mastered the use of access control lists (ACLs) and wants to deploy QoS by defining different traffic classes through the use of ACLs. Which queuing method provides this functionality?

FIFO

CBWFQ

WFQ

FCFS

CCNA 4 Chapter 5 V6.0 Answers

1. Which protocol defines port-based authentication to restrict unauthorized hosts from connecting to the LAN through publicly accessible switch ports?

TACACS+

SSH

RADIUS

802.1x

 

2. What device is considered a supplicant during the 802.1X authentication process?

the authentication server that is performing client authentication

the client that is requesting authentication

the switch that is controlling network access

the router that is serving as the default gateway

CCNA 4 Chapter 4 V6.0 Answers

1. Which range represents all the IP addresses that are affected when network 10.120.160.0 with a wildcard mask of 0.0.7.255 is used in an ACE?

10.120.160.0 to 10.120.191.255

10.120.160.0 to 10.127.255.255

10.120.160.0 to 10.120.168.0

10.120.160.0 to 10.120.167.255

 

2. Refer to the exhibit. The Ipv6 access list LIMITED_ACCESS is applied on the S0/0/0 interface of R1 in the inbound direction. Which Ipv6 packets from the ISP will be dropped by the ACL on R1?

Which Ipv6 packets from the ISP will be dropped by the ACL on R1?

neighbor advertisements that are received from the ISP router

HTTPS packets to PC1

packets that are destined to PC1 on port 80

ICMPv6 packets that are destined to PC1

CCNA 4 Chapter 3 V6.0 Answers

1. Which two scenarios are examples of remote access VPNs? (Choose two.)

All users at a large branch office can access company resources through a single VPN connection.

A mobile sales agent is connecting to the company network via the Internet connection at a hotel.

A small branch office with three employees has a Cisco ASA that is used to create a VPN connection to the HQ.

An employee who is working from home uses VPN client software on a laptop in order to connect to the company network.

A toy manufacturer has a permanent VPN connection to one of its parts suppliers.

 

2. Where is PPPoE configured on a Cisco router?

on an Ethernet interface

on the dialer interface

on any physical interface

on a serial interface

CCNA 4 Chapter 2 V6.0 Answers

1. A network engineer is troubleshooting the loss of MPEG video viewing quality as MPEG video files cross a PPP WAN link. What could be causing this loss of quality?

Link Quality Monitoring was not configured correctly on each interface.

PAP authentication was misconfigured on the link interfaces.

The compress command was used when PPP was configured on the interfaces.

The clock rates configured on each serial interface do not match.

 

2. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.

Why is the serial link between router R1 and router R2 not operational?

The authentication type is not the same in both routers.

The passwords are different in both routers.

In each case the expected username is not the same as the remote router hostname.

The encapsulation in both routers does not match.

CCNA 4 Chapter 1 V6.0 Answers

1. Match the connectivity type to the description. (Not all options are used.)

Match the connectivity type to the description

cable => uses traditional video network

DSL => uses traditional phone network

municipal Wi-Fi => set up by a city to provide free Internet access

satellite Internet => slow access (upload speed is about one-tenth download speed)

 

2. Match the type of WAN device or service to the descriptions. (Not all options are used.)

Match the type of WAN device or service to the descriptions

devices and inside wiring that are located on the enterprise edge and connect to a carrier link => CPE

a physical connection from the customer to the service provider POP => Local Loop

customer devices that pass the data from a customer network for transmission over the WAN => DTE

devices that provide an interface for customers to connect to within the WAN cloud => DCE