CCNA Module 6 Answers

CCNA 4 Chapter 6 V4.0 Answers

CCNA 4 Chapter 6 V4.0 Answers

1. Which two protocols can be used to encapsulate traffic that is traversing a VPN tunnel? (Choose two.)

ATM

CHAP

IPsec

IPX

MPLS

PPTP

 

2. What are the three main functions of a secure VPN? (Choose three.)

accounting

authentication

authorization

data availability

data confidentiality

data integrity

CCNA 3 Chapter 6 V4.0 Answers

1. What are the steps which must be completed in order to enable inter-VLAN routing using router-on-a-stick?

Configure the physical interfaces on the router and enable a routing protocol.

Create the VLANs on the router and define the port membership assignments on the switch.

Create the VLANs on the switch to include port membership assignment and enable a routing protocol on the router.

Create the VLANs on the switch to include port membership assignment and configure subinterfaces on the router matching the VLANs.

 

2.

CCNA 3 Chapter 6 V4.0 Answers (1)
Refer to the exhibit. R1 is routing between networks 192.168.10.0/28 and 192.168.30.0/28. PC1 can ping R1 interface F0/1, but cannot ping PC3. What is causing this failure?

PC1 and PC3 are not in the same VLAN.

The PC3 network address configuration is incorrect.

The S1 interface F0/11 should be assigned to VLAN30.

The F0/0 and F0/1 interfaces on R1 must be configured as trunks.

CCNA 2 Chapter 6 V4.0 Answers

1. What two advantages does CIDR provide to a network? (Choose two.)

reduced routing table size

dynamic address assignment

automatic route redistribution

reduced routing update traffic

automatic summarization at classful boundaries

 

2.

CCNA 2 Chapter 6 V4.0 Answers (1)

Refer to the exhibit. Which address is a broadcast address for one of the subnets that are shown in the exhibit?

192.168.4.3/29

192.168.4.15/29

192.168.4.65/26

192.168.4.255/24

CCNA 1 Chapter 6 V4.0 Answers

1. How many bits make up an IPv4 address?

128

64

48

32 **

 

2.
CCNA 1 Chapter 6 (1)
Refer to the exhibit. A network administrator has to develop an IP addressing scheme that uses the 192.168.1.0 /24 address space. The network that contains the serial link has already been addressed out of a separate range. Each network will be allocated the same number of host addresses. Which network mask will be appropriate to address the remaining networks?

255.255.255.248

255.255.255.224

255.255.255.192

255.255.255.240

255.255.255.128

255.255.255.252