CCNA 4 Final Exam

1. Which functions are provided by LCP and NCP as part of the PPP layered architecture?

LCP sets up the PPP connection and its parameters. NCP terminates the PPP connection.

LCP sets up the PPP connection and its parameters. NCP handles higher layer protocol configurations.

LCP includes the link-establishment phase. NCP includes link-maintenance and link-termination phases.

LCP negotiates options for multiple network layer protocols. NCP agrees automatically on encapsulation formats.



CCNA Final 2011

Refer to the exhibit. EIGRP has been configured on routers R1 and R2. Connectivity across the Frame Relay switch between routers R1 and R2 is successfully verified using the ping command. However, no EIGRP routes are appearing in the routing table. What could be a cause for this failure?

The Frame Relay switch has failed.

The frame-relay map statement is incorrect.

The S0/0/0 interface of router R1 is administratively down.

The S0/0/0 interface of router R2 has an incorrect IP address.

CCNA 4 Final Exam Answers 2011

CCNA 4 Final Exam Answers 2011

1. Which Frame Relay flow control mechanism is used to signal routers that they should reduce the flow rate of frames?







2. An administrator is configuring a dual stack router with IPv6 and IPv4 using RIPng. The administrator receives an error message when trying to enter the IPv4 routes into RIPng. What is the cause of the problem?

When IPv4 and IPv6 are configured on the same interface, all IPv4 addresses are over-written in favor of the newer technology.

Incorrect IPv4 addresses are entered on the router interfaces.

RIPng is incompatible with dual-stack technology.

IPv4 is incompatible with RIPng.

CCNA 1 Final Exam Answers 2011

CCNA 1 Final Exam Answers 2011

1. Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login

The entries specify three Telnet lines for remote access.

The entries specify four Telnet lines for remote access.

The entries set the console and Telnet password to "c13c0".

Telnet access will be denied because the Telnet configuration is incomplete.

Access will be permitted for Telnet using "c13c0" as the password.


2. Which two actions could be taken by a router if a specific match is not made to a route in the routing table? (Choose two.)

The packet will be discarded.

The packet will be sent back to the source.

The packet will be flooded out all interfaces.

Neighboring routers are polled to find the best path.

The packet will be forwarded to a default route if one is present.

CCNA 4 Final Exam V4.0 Answers

CCNA 4 Final Exam V4.0 Answers

1. What functionality do access control lists provide in the implementation of dynamic NAT on a Cisco router?

define which addresses can be translated

define which addresses are assigned to a NAT pool

define which addresses are allowed out the router

define which addresses can be accessed from the inside network


2. Which three guidelines would help contribute to creating a strong password policy? (Choose three.)

Once a good password is created, do not change it.

Deliberately misspell words when creating passwords.

Create passwords that are at least 8 characters in length.

Use combinations of upper case, lower case, and special characters.

Write passwords in locations that can be easily retrieved to avoid being locked out.

Use long words found in the dictionary to make passwords that are easy to remember.

CCNA 4 Chapter 8 V4.0 Answers

CCNA 4 Chapter 8 V4.0 Answers

1. What combination of IP address and wildcard mask should be used to specify only the last 8 addresses in the subnet


2. Excessive broadcasts are generally a symptom of a problem at which layer?


data link



CCNA 4 Chapter 7 V4.0 Answers


CCNA 4 Chapter 7 V4.0 Answers
Refer to the exhibit. Traffic exiting R1 is failing translation. What part of the configuration is most likely incorrect?

ip nat pool statement

access-list statement

ip nat inside is on the wrong interface

interface s0/0/2 should be a private IP address



Refer to the exhibit. What is the purpose of the command marked with an arrow shown in the partial configuration output of a Cisco broadband router?

defines which addresses can be translated

defines which addresses are allowed into the router

defines which addresses are assigned to a NAT pool

defines which addresses are allowed out of the router

CCNA 4 Chapter 6 V4.0 Answers

CCNA 4 Chapter 6 V4.0 Answers

1. Which two protocols can be used to encapsulate traffic that is traversing a VPN tunnel? (Choose two.)








2. What are the three main functions of a secure VPN? (Choose three.)




data availability

data confidentiality

data integrity

CCNA 4 Chapter 5 V4.0 Answers

CCNA 4 Chapter 5 V4.0 Answers

1. The following commands were entered on a router:
Router(config)# access-list 2 deny
Router(config)# access-list 2 permit any
The ACL is correctly applied to an interface. What can be concluded about this set of commands?

The wildcard mask is assumed.

The access list statements are misconfigured.

All nodes on the network will be denied access to other networks.

No traffic will be allowed to access any nodes or services on the network.


2. Interface s0/0/0 already has an IP ACL applied inbound. What happens when the network administrator attempts to apply a second inbound IP ACL?

The second ACL is applied to the interface, replacing the first.

Both ACLs are applied to the interface.

The network administrator receives an error.

Only the first ACL remains applied to the interface.

CCNA 4 Chapter 4 V4.0 Answers

CCNA 4 Chapter 4 V4.0 Answers

1. Which two statements are true regarding network security? (Choose two.)

Securing a network against internal threats is a lower priority because company employees represent a low security risk.

Both experienced hackers who are capable of writing their own exploit code and inexperienced individuals who download exploits from the Internet pose a serious threat to network security.

Assuming a company locates its web server outside the firewall and has adequate backups of the web server, no further security measures are needed to protect the web server because no harm can come from it being hacked.

Established network operating systems like UNIX and network protocols like TCP/IP can be used with their default settings because they have no inherent security weaknesses.

Protecting network devices from physical damage caused by water or electricity is a necessary part of the security policy.


2. Which two statements are true about network attacks? (Choose two.)

Strong network passwords mitigate most DoS attacks.

Worms require human interaction to spread, viruses do not.

Reconnaissance attacks are always electronic in nature, such as ping sweeps or port scans.

A brute-force attack searches to try every possible password from a combination of characters.

Devices in the DMZ should not be fully trusted by internal devices, and communication between the DMZ and internal devices should be authenticated to prevent attacks such as port redirection.

CCNA 4 Chapter 3 V4.0 Answers

CCNA 4 Chapter 3 V4.0 Answers

1. Which three actions might a Frame Relay switch perform when it detects an excessive build-up of frames in its queue? (Choose three.)

puts a hold on accepting frames in excess of the CIR

drops frames from the queue that have the DE bit set

reduces the number of frames it sends over the link

re-negotiates flow control with the connected device

sets the FECN bit on all frames it receives on the congested link

sets the BECN bit on all frames it places on the congested link


2. Which best describes the benefit of using Frame Relay as opposed to a leased line or ISDN service?

Customers can define their virtual circuit needs in far greater combinations, with increments as small as 64 kbps.

Customers pay for an end-to-end connection that includes the local loop and the network link.

Customers only pay for the local loop and the bandwidth they purchase from the network provider.

Connecting new sites requires new lower cost circuit installations when compared to ISDN dialup costs or adding additional hardware for leased service.