1. Which two protocols can be used to encapsulate traffic that is traversing a VPN tunnel? (Choose two.) ATM CHAP IPsec IPX MPLS PPTP 2. What are the three main functions of a secure VPN? (Choose three.) accounting authentication authorization data availability data confidentiality data integrity 3. Data …
1. The following commands were entered on a router: Router(config)# access-list 2 deny 172.16.5.24 Router(config)# access-list 2 permit any The ACL is correctly applied to an interface. What can be concluded about this set of commands? The wildcard mask 0.0.0.0 is assumed. The access list statements are misconfigured. …
Assessment EWAN Chapter 4 – CCNA 4 Exploration: Accessing the WAN (Version 4.0) 1. Which two statements are true regarding network security? (Choose two.) Securing a network against internal threats is a lower priority because company employees represent a low security risk. Both experienced hackers who are capable …
Assessment EWAN Chapter 3 – CCNA 4 Exploration: Accessing the WAN (Version 4.0) 1. Which three actions might a Frame Relay switch perform when it detects an excessive build-up of frames in its queue? (Choose three.) puts a hold on accepting frames in excess of the CIR drops …
Assessment EWAN Chapter 2 – CCNA 4 Exploration: Accessing the WAN (Version 4.0) 1. Refer to the exhibit. Router R1, the DCE device, has just been configured for PPP encapsulation with authentication. What series of commands will allow another router, the DTE device, to communicate over its serial …
Assessment EWAN Chapter 1 – CCNA 4 Exploration: Accessing the WAN (Version 4.0) 1. Which statement is true about the differences between a WAN and a LAN? WANs generally support higher bandwidth than LANs support. A WAN link typically traverses shorter geographic distances than a LAN link traverses. …
Assessment ESwitching Final – CCNA 3 Exploration: LAN Switching and Wireless (Version 4.0) 1. Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.161. What will the router do with this packet? The router will drop the …
Assessment ESwitching Chapter 7 – CCNA 3 Exploration: LAN Switching and Wireless (Version 4.0) 1. Which two statements concerning network security are accurate? (Choose two.) 802.11i uses 3DES for encryption. Open authentication uses no client or AP verification. The 802.11i protocol is functionally identical to WPA. 802.11i incorporates …
Assessment ESwitching Chapter 6 – CCNA 3 Exploration: LAN Switching and Wireless (Version 4.0) 1. What are the steps which must be completed in order to enable inter-VLAN routing using router-on-a-stick? Configure the physical interfaces on the router and enable a routing protocol. Create the VLANs on the …
Assessment ESwitching Chapter 5 – CCNA 3 Exploration: LAN Switching and Wireless (Version 4.0) 1. Which two criteria does a switch use to select the root bridge? (Choose two.) bridge priority switching speed number of ports base MAC address switch location memory size 2. Which two statements are …