CCNA Module 4 Answers

CCNA 4 Chapter 4 V4.0 Answers

CCNA 4 Chapter 4 V4.0 Answers

1. Which two statements are true regarding network security? (Choose two.)

Securing a network against internal threats is a lower priority because company employees represent a low security risk.

Both experienced hackers who are capable of writing their own exploit code and inexperienced individuals who download exploits from the Internet pose a serious threat to network security.

Assuming a company locates its web server outside the firewall and has adequate backups of the web server, no further security measures are needed to protect the web server because no harm can come from it being hacked.

Established network operating systems like UNIX and network protocols like TCP/IP can be used with their default settings because they have no inherent security weaknesses.

Protecting network devices from physical damage caused by water or electricity is a necessary part of the security policy.

 

2. Which two statements are true about network attacks? (Choose two.)

Strong network passwords mitigate most DoS attacks.

Worms require human interaction to spread, viruses do not.

Reconnaissance attacks are always electronic in nature, such as ping sweeps or port scans.

A brute-force attack searches to try every possible password from a combination of characters.

Devices in the DMZ should not be fully trusted by internal devices, and communication between the DMZ and internal devices should be authenticated to prevent attacks such as port redirection.

CCNA 3 Chapter 4 V4.0 Answers

1. Which statement is true when VTP is configured on a switched network that incorporates VLANs?

VTP is only compatible with the 802.1Q standard.

VTP adds to the complexity of managing a switched network.

VTP allows a switch to be configured to belong to more than one VTP domain.

VTP dynamically communicates VLAN changes to all switches in the same VTP domain.

 

2.

CCNA 3 Chapter 4 V4.0 Answers (1)
Refer to the exhibit. What information can be learned from the output provided?

It verifies the configured VTP password.

It verifies the VTP domain is configured to use VTP version 2.

It verifies VTP advertisements are being exchanged.

It verifies the VTP domain name is V1.

CCNA 2 Chapter 4 V4.0 Answers

1.

CCNA 2 Chapter 4 V4.0 Answers (1)

What actions will occur after RouterA loses connectivity to network 114.125.16.0? (Choose two.)

RouterB will include network 123.92.76.0 and 136.125.85.0 in its update to RouterA.

During the next update interval, RouterB will send a RIP update out both ports that includes the inaccessible network.

During the next update interval, RouterC will send an update to RouterB stating that network 114.125.16.0 is accessible in 2 hops.

Router C will learn of the loss of connectivity to network 114.125.16.0 from RouterB.

RouterB will include network 123.92.76.0 and 136.125.85.0 in its update to RouterC.

 

2. What does a router running RIP do first with a new route that is received from an advertisement?

places it immediately in the routing table

adjusts the metric for the new route to show the added distance for the route

advertises this route out all other interfaces except the one that it came in on

sends a ping packet to verify that the path is a feasible route

CCNA 1 Chapter 4 V4.0 Answers

1.

CCNA 1 Chapter 4 (1)

Refer to the exhibit. What two pieces of information can be determined from the output that is shown? (Choose two.)

The local host is using three client sessions.

The local host is using web sessions to a remote server.

The local host is listening for TCP connections using public addresses.

The local host is using well-known port numbers to identify the source ports.

The local host is performing the three-way handshake with 192.168.1.101:1037.

 

2. After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the response from the server?

13

53

80

1024

1728