CCNA 4

CCNA 4 v6.0 Connecting Networks – CN Practice Skills Assessment – PT Option C | CCNA5.NET

Connecting Networks – Skill-Based Assessment – Packet Tracer Option C A few things to keep in mind while completing this activity: Do not use the browser Backbutton or close or reload any Exam windows during the exam. Do not close Packet Tracer when you are done. It will close automatically. Click the Submit Assessmentbutton to submit your work. Objectives In this Packet Tracer Skills Based Assessment, you will do as follows: Configure PPP encapsulation and CHAP authentication for serial links. Configure a GRE tunnel. Configure OSPF. Configure BGP. Configure standard and extended IPv4 ACLs. Configure IPv6 ACLs. For the sake of time, many repetitive, but important, configuration tasks have been omitted from this assessment. Many of these tasks, especially those related to security, are essential elements of a network configuration. The intent of this activity is not to diminish the importance of full device configurations. The IP addresses for all the devices have

CCNA 4 v6.0 Chapter 5 SIC Access Control List and SNMP Configuration PT Skills Assessment Option 1 | CCNA5.NET

Step 1: Configure SNMP Community Strings on the HQ router. a. Configure a Read Only SNMP community string hq-monitor. b. Configure a Read/Write SNMP community string hq-inside. Step 2: Configure an ACL for NAT on the HQ router. a. Configure standard access list numbered 1 to allow NAT for hosts in network 192.168.10.0 /24. Step 3: Configure a standard ACL to restrict remote access to the HQ router. a. Configure a standard ACL numbered 12 to restrict remote access to HQ. • Allow only the HQ-Admin-PC to access the HQ router remotely via VTY. • All other remote connections should fail. Step 4: Configure two extended ACLs to restrict access to SNMP operation on the HQ router. a. Configure an extended ACL named SNMPACCESS. • The SNMP operation runs UDP on port 161. • Allow only the HQ-Admin-PC to access the HQ router for the SNMP connection. • SNMP connections from other hosts on the HQ LAN should fail. • Allow all other IP traffic. • Apply this ACL on the HQ router, G0/0

CCNA 4 v6.0 Chapter 5 SIC Access Control List and SNMP Configuration PT Skills Assessment Option 2 | CCNA5.NET

A few things to keep in mind while completing this activity: Do not use the browser Backbutton or close or reload any Exam windows during the exam. Do not close Packet Tracer when you are done. It will close automatically. Click the Submit Assessmentbutton to submit your work. Introduction In this practice Packet Tracer Skills Based Assessment, you will: Configure SNMP community strings. Configure standard and extended IPv4 ACLs to filter network traffic. Configure an IPv6 ACLs to filter network traffic. Addressing Table Step 1: Configure SNMP Community Strings on the Central router. a. Configure a Read Only SNMP community string hq-monitor. b. Configure a Read/Write SNMP community string hq-inside. Step 2: Configure an ACL for NAT on the Central router. a. Configure standard access list numbered 1 to allow NAT for hosts in network 192.168.10.0 /24. Access-list 1 permit 192.168.10.0 0.0.0.255 Step 3: Configure a standard ACL to restrict remote access to the

CCNA 4 v6.0 Chapter 5 SIC Access Control List and SNMP Configuration PT Skills Assessment Option 3 | CCNA5.NET

A few things to keep in mind while completing this activity: Do not use the browser Back button or close or reload any Exam windows during the exam. Do not close Packet Tracer when you are done. It will close automatically. Click the Submit Assessment button to submit your work. Introduction In this practice Packet Tracer Skills Based Assessment, you will: Configure SNMP community strings. Configure standard and extended IPv4 ACLs to filter network traffic. Configure an IPv6 ACLs to filter network traffic. Addressing Table Step 1: Configure SNMP Community Strings on the Main router. a. Configure a Read Only SNMP community string hq-monitor. b. Configure a Read/Write SNMP community string hq-inside. Step 2: Configure an ACL for NAT on the Main router. a. Configure standard access list numbered 1 to allow NAT for hosts in network 192.168.10.0 /24. Step 3: Configure a standard ACL to restrict remote access to the Main router. a. Configure a standard ACL numbered

CCNA 4 v6.0 Chapter 3 SIC PPP, Routing, and Remote Access VPN – PT Skills Assessment Option 1

Chapter 3 SIC: PPP, Routing, and Remote Access VPN Option 1 A few things to keep in mind while completing this activity: Do not use the browser Backbutton or close or reload any Exam windows during the exam. Do not close Packet Tracer when you are done. It will close automatically. Click the Submit Assessmentbutton to submit your work. Addressing Table Note: All device console passwords are cisco. All device enable passwords are class. Step 1 Configure HDLC on router Secure. Configure the WAN link from router Secure to ISP_1 using HDLC encapsulation. Step 2 Configure PPP to connect HQ to ISP_1. Configure the WAN link from router HQ to ISP_1 using PPP encapsulation and CHAP authentication. Create a user ISP_1 with the password of cisco123. Step 3 Configure eBGP routing. a. Configure router HQ with eBGP routing. Configure HQ to peer with ISP_1. Add only HQ 10.1.1.0/24 internal network to BGP. b. Configure router Branch with eBGP routing. Configure Branch to peer with ISP

CCNA 4 v6.0 Chapter 3 SIC PPP, Routing, and Remote Access VPN – PT Skills Assessment Option 3

Chapter 3 SIC: PPP, Routing, and Remote Access VPN Option 3 A few things to keep in mind while completing this activity: Do not use the browser Backbutton or close or reload any Exam windows during the exam. Do not close Packet Tracer when you are done. It will close automatically. Click the Submit Assessmentbutton to submit your work. Addressing Table Note: All device console passwords are cisco. All device enable passwords are class. Step 1 Configure HDLC on router OffSite. Configure the WAN link from router OffSite to ISP_1 using HDLC encapsulation. Step 2 Configure PPP to connect Main to ISP_1. Configure the WAN link from router Main to ISP_1 using PPP encapsulation and CHAP authentication. Create a user ISP_1 with the password of cisco123. Step 3 Configure eBGP routing. a. Configure router Main with eBGP routing. Configure Main to peer with ISP_1. Add only Main 10.1.1.0/24 internal network to BGP. b. Configure router Backup with eBGP routing. Configure Backup to

CCNA 4 v6.0 Chapter 3 SIC PPP, Routing, and Remote Access VPN – PT Skills Assessment Option 2 | CCNA5.NET

Note: All device console passwords are cisco. All device enable passwords are class. Step 1 Configure HDLC on router Storage. Configure the WAN link from router Storage to ISP_1 using HDLC encapsulation. Step 2 Configure PPP to connect Corp to ISP_1. Configure the WAN link from router Corp to ISP_1 using PPP encapsulation and CHAP authentication. Create a user ISP_1 with the password of cisco123. Step 3 Configure eBGP routing. a. Configure router Corp with eBGP routing. Configure Corp to peer with ISP_1. Add only Corp 10.1.1.0/24 internal network to BGP. b. Configure router Remote with eBGP routing. Configure Remote to peer with ISP_1. Add the Remote internal network to BGP Step 4 Configure GRE Tunneling. a. Configure router Corp with a tunnel interface to send IP traffic over GRE to Remote. Configure Tunnel 1 with appropriate addressing information. Configure the tunnel source with the local exit interface. Configure the tunnel destination with the appropriate endpoint IP address

CCNA 4 v6.0 Chapter 3 Exam Answers 100%

CCNA 4 Connecting Networks v6.0 Chapter 3 Exam Answers 100% 1. Which broadband wireless technology is based on the 802.11 standard? municipal Wi-Fi* WiMAX CDMA UMTS 2. What is the approximate distance limitation for providing a satisfactory ADSL service from the central office to a customer? 3.39 miles or 5.46 kilometers* 2.11 miles or 3.39 kilometers 6.21 miles or 10 kilometers 11.18 miles or 18 kilometers 3. What is a component of an ADSL connection that is located at the customer site? CO CPE* SOHO DSLAM 4. What is the function of the DSLAM in a broadband DSL network? multiplexes individual customer DSL connections into a single upstream link* communicates directly with customer cable modems to provide Internet services to customers communicates directly with customer cable modems to provide Internet services to customers separates POTS traffic from ADSL traffic 5. Which broadband technology would be best for a small office that requires fast upstream connections? DSL fiber-to-the

CCNA 4 v6.0 Chapter 4 Exam Answers 100%

CCNA 4 Connecting Networks v6.0 Chapter 4 Exam Answers 100% 1. Which range represents all the IP addresses that are affected when network 10.120.160.0 with a wildcard mask of 0.0.7.255 is used in an ACE? 10.120.160.0 to 10.127.255.255 10.120.160.0 to 10.120.167.255* 10.120.160.0 to 10.120.168.0 10.120.160.0 to 10.120.191.255 2. What two functions describe uses of an access control list? (Choose two.) ACLs assist the router in determining the best path to a destination. Standard ACLs can restrict access to specific applications and ports. ACLs provide a basic level of security for network access.* ACLs can permit or deny traffic based upon the MAC address originating on the router. ACLs can control which areas a host can access on a network.* 3. Which two statements describe the effect of the access control list wildcard mask 0.0.0.15? (Choose two.) The first 28 bits of a supplied IP address will be ignored. The last four bits of a supplied IP address will be ignored.* The first 32 bits

CCNA 4 v6.0 Chapter 5 Exam Answers 100%

CCNA 4 Connecting Networks v6.0 Chapter 5 Exam Answers 100% 1. What is the behavior of a switch as a result of a successful CAM table attack? The switch will forward all received frames to all other ports.* The switch will shut down. The switch will drop all received frames. The switch interfaces will transition to the error-disabled state. 2. What network attack seeks to create a DoS for clients by preventing them from being able to obtain a DHCP lease? DHCP starvation* DHCP spoofing IP address spoofing CAM table attack 3. Refer to the exhibit. Which interface on switch S1 should be configured as a DHCP snooping trusted port to help mitigate DHCP spoofing attacks? G0/23* G0/1 G0/24 G0/22 4. When using 802.1X authentication, what device controls physical access to the network, based on the authentication status of the client? the switch that the client is connected to* the authentication server the supplicant the router that is serving as the default gateway 5. What device is

CCNA 4 v6.0 Chapter 6 Exam Answers 100%

CCNA 4 Connecting Networks v6.0 Chapter 6 Exam Answers 100% 1. When QoS is implemented in a converged network, which two factors can be controlled to improve network performance for real-time traffic? (Choose two.) link speed delay* packet routing jitter* packet addressing 2. A network engineer performs a ping test and receives a value that shows the time it takes for a packet to travel from a source to a destination device and return. Which term describes the value? jitter latency* priority bandwidth 3. What are two characteristics of voice traffic? (Choose two.) Dropped voice packets are not retransmitted. * Voice traffic requires at least 384 kbs of bandwidth. Voice traffic consumes lots of network resources. Voice traffic is unpredictable and inconsistent. Voice traffic latency should not exceed 150 ms.* 4. How does a Cisco router using tail drop handle congestion when a traffic queue becomes full? The router will only drop non delay-sensitive data that is close to the end of the

CCNA 4 v6.0 Chapter 7 Exam Answers 100%

CCNA 4 Connecting Networks v6.0 Chapter 7 Exam Answers 100% 1. What is an example of an M2M connection in the IoT? A user sends an email over the Internet to a friend. An automated alarm system in a campus sends fire alarm messages to all students and staff. Sensors in a warehouse communicate with each other and send data to a server block in the cloud.* Redundant servers communicate with each other to determine which server should be active or standby. 2. What is the term for the extension of the existing Internet structure to billions of connected devices? SCADA digitization IoT* M2M 3. Which statement describes the Cisco IoT System? It is an advanced routing protocol for cloud computing. It is a switch operating system to integrate many Layer 2 security features. It is a router operating system combining IOS and Linux for fog computing. It is an infrastructure to manage large scale systems of very different endpoints and platforms.* 4. Which three network models are described in the

CCNA 4 v6.0 Chapter 8 Exam Answers 100%

CCNA 4 Connecting Networks v6.0 Chapter 8 Exam Answers 100% 1. When should a network performance baseline be measured? during normal work hours of an organization* immediately after the main network devices restarted after normal work hours to reduce possible interruptions when a denial of service attack to the network is detected and blocked 2. What is a purpose of establishing a network baseline? It provides a statistical average for network performance. It manages the performance of network devices. It creates a point of reference for future network evaluations.* It checks the security configuration of network devices. 3. Which three pieces of information are typically recorded in a logical topology diagram? (Choose three.) IP address and prefix lengths* routing protocols* static routes* device models and manufacturers cable specifications device locations 4. In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or

CCNA 4 v6.0 Practice Final Exam Answers 100%

1. Which two components of a WAN would more likely be used by an ISP? (Choose two.) CO* CPE demarcation point DTE toll network* 2. What are two advantages of packet switching over circuit switching? (Choose two.) The communication costs are lower.* There are fewer delays in the data communications processes. Multiple pairs of nodes can communicate over the same network channel.* A dedicated secure circuit is established between each pair of communicating nodes. A connection through the service provider network is established quickly before communications start. 3. What are two common types of circuit-switched WAN technologies? (Choose two.) ISDN* MPLS PSTN* ATM Frame Relay 4. Under which two categories of WAN connections does Frame Relay fit? (Choose two.) public infrastructure private infrastructure* dedicated Internet packet-switched* 5. Which WAN technology is capable of transferring voice and video traffic by utilizing a fixed payload of 48 bytes for every frame

CCNA 4 v6.0 Final Exam Answers Option A 100%

1. Which statement best describes a WAN? A WAN interconnects LANs over long distances.* A WAN is a public utility that enables access to the Internet. WAN is another name for the Internet. A WAN is a LAN that is extended to provide secure remote network access. 2. Connecting offices at different locations using the Internet can be economical for a business. What are two important business policy issues that should be addressed when using the Internet for this purpose? (Choose two.) addressing bandwidth privacy* security* WAN technology 3. What is a disadvantage of a packet-switched network compared to a circuit-switched network? higher cost fixed capacity less flexibility higher latency* 4. A company is considering updating the campus WAN connection. Which two WAN options are examples of the private WAN architecture? (Choose two.) cable leased line* Ethernet WAN* municipal Wi-Fi digital subscriber line 5. Which statement describes a characteristic of dense

CCNA 4 v6.0 Final Exam Answers Option B 100%

CCNA 4 v6.0 Connecting Networks Final Exam Answers Option B 1. Which circumstance would result in an enterprise deciding to implement a corporate WAN? when its employees become distributed across many branch locations* when the network will span multiple buildings when the number of employees exceeds the capacity of the LAN when the enterprise decides to secure its corporate LAN 2. What are two types of WAN providers? (Choose two.) DNS servers satellite service* web hosting service telephone company* Internet search engine service 3. Which two types of devices are specific to WAN environments and are not found on a LAN? (Choose two.) access layer switch broadband modem* core switch CSU/DSU​* distribution layer router 4. What is a feature of dense wavelength-division multiplexing (DWDM) technology? It replaces SONET and SDH technologies. It enables bidirectional communications over one strand of fiber.* It provides Layer 3 support for long distance data communications. It provides a 10

CCNA 4 v6.0 Final Exam Answers Option C 100%

1. What is a primary difference between a company LAN and the WAN services that it uses? The company must subscribe to an external WAN service provider.* The company has direct control over its WAN links but not over its LAN. Each LAN has a specified demarcation point to clearly separate access layer and distribution layer equipment. The LAN may use a number of different network access layer standards whereas the WAN will use only one standard. 2. Which circumstance would result in an enterprise deciding to implement a corporate WAN? when its employees become distributed across many branch locations* when the network will span multiple buildings when the number of employees exceeds the capacity of the LAN when the enterprise decides to secure its corporate LAN 3.To which two layers of the OSI model do WAN technologies provide services? (Choose two.) network layer session layer physical layer* transport layer data link layer* presentation layer 4. Which two

CCNA 4 v6.0 Final Exam Answers Option C 100%

1. What is a primary difference between a company LAN and the WAN services that it uses? The company must subscribe to an external WAN service provider.* The company has direct control over its WAN links but not over its LAN. Each LAN has a specified demarcation point to clearly separate access layer and distribution layer equipment. The LAN may use a number of different network access layer standards whereas the WAN will use only one standard. 2. Which circumstance would result in an enterprise deciding to implement a corporate WAN? when its employees become distributed across many branch locations* when the network will span multiple buildings when the number of employees exceeds the capacity of the LAN when the enterprise decides to secure its corporate LAN 3.To which two layers of the OSI model do WAN technologies provide services? (Choose two.) network layer session layer physical layer* transport layer data link layer* presentation layer 4. Which two technologies are private WAN

CCNA 4 v6.0 Final Exam Answers Option B 100%

1. Which circumstance would result in an enterprise deciding to implement a corporate WAN? when its employees become distributed across many branch locations* when the network will span multiple buildings when the number of employees exceeds the capacity of the LAN when the enterprise decides to secure its corporate LAN 2. What are two types of WAN providers? (Choose two.) DNS servers satellite service* web hosting service telephone company* Internet search engine service 3. Which two types of devices are specific to WAN environments and are not found on a LAN? (Choose two.) access layer switch broadband modem* core switch CSU/DSU​* distribution layer router 4. What is a feature of dense wavelength-division multiplexing (DWDM) technology? It replaces SONET and SDH technologies. It enables bidirectional communications over one strand of fiber.* It provides Layer 3 support for long distance data communications. It provides a 10 Gb/s multiplexed signal over analog copper telephone lines.

CCNA 4 v6.0 Final Exam Answers Option A 100%

1. Which statement best describes a WAN? A WAN interconnects LANs over long distances.* A WAN is a public utility that enables access to the Internet. WAN is another name for the Internet. A WAN is a LAN that is extended to provide secure remote network access. 2. Connecting offices at different locations using the Internet can be economical for a business. What are two important business policy issues that should be addressed when using the Internet for this purpose? (Choose two.) addressing bandwidth privacy* security* WAN technology 3. What is a disadvantage of a packet-switched network compared to a circuit-switched network? higher cost fixed capacity less flexibility higher latency* 4. A company is considering updating the campus WAN connection. Which two WAN options are examples of the private WAN architecture? (Choose two.) cable leased line* Ethernet WAN* municipal Wi-Fi digital subscriber line 5. Which statement describes a characteristic of dense wavelength division


About Us

CCNA v5 Answers, CCNA v5 Blog, CCNA 5 Blog, CCNA Blog

Articles

Our Contacts