0
Q:

What router command allows you to determine whether an IP access list is enabled on a particular interface?

A) show ip port B) show access - lists
C) show ip interface D) show access - lists interface

Answer:   C) show ip interface



Explanation:

Of the available choices only the show ip interface command will tell you which interfaces have access lists applied. show access - lists will not show you which interfaces have an access list applied. 

Subject: CCNA
Q:

Which OSI layer defines the standards for cabling and connectors?

A) Layer 1 B) Layer 4
C) Layer 7 D) Layer 3
 
Answer & Explanation Answer: A) Layer 1

Explanation:

OSI layer 1 defines the standards for cabling and connectors.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA
Job Role: Network Engineer

11 7523
Q:

Mention different memories used in a CISCO router ?

Answer

Different Memories used in a CISCO router are as follows :


NVRAM stores the startup configuration file.

DRAM stores the configuration file that is being executed.

Flash Memory – stores the Cisco IOS.

 

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA
Job Role: Network Engineer

7 4080
Q:

By default , what type of trust are all Windows 2000 trust relationships within a domain tree or forest?

A) Explicit trust B) One-way trust
C) Transitive trust D) Non-transitive trust
 
Answer & Explanation Answer: C) Transitive trust

Explanation:

By default, all Windows 2000 trusts within a domain tree or forest are transitive trusts.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

6 6285
Q:

What are the typical three different categories of VPNs?

Answer

The following are the different types of VPNs :


PPTP ( Point to Point Tunnel protocol ) VPN : Most commonly used VPN. PPTP is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets.


Site-to-Site VPN : Site-to-site VPN is a type of VPN connection that is created between two separate locations. Site-to-site VPN can be intranet based or extranet based. 


Intranet-based site-to-site VPN is created between an organization's propriety networks, while extranet-based site-to-site VPN is used for connecting with external partner networks or an intranet.


L2TP ( Layer Two Tunneling Protoco) VPN : L2TP is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an Internet service provider (ISP) to enable the operation of a virtual private network over the Internet.


IPsec (Internet Protocol Security) : IPsec is a framework for a set of protocols for security at the network or packet processing layer of network communication.


SSL (Secure Sockets Layer) VPN : SSL  is a form of VPN that can be used with a standard Web browser. In contrast to the traditional Internet Protocol Security (IPsec) VPN, an SSL VPN does not require the installation of specialized client software on the end user's computer. 


MPLS (Multiprotocol Label Switching) VPN : MPLS is a protocol for speeding up and shaping network traffic flows. 


Hybrid VPN : A hybrid VPN combines Multiprotocol Label Switching (MPLS) and Internet protocol security (IPsec)-based VPNs. 

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

7 4894
Q:

What protocol would you use if you were running xDSL and needed authentication?

Answer

PPPoE  or  PPPoA

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

5 7395
Q:

Which of the following describes the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols?

A) HDLC B) Cable
C) VPN D) IPSec
 
Answer & Explanation Answer: C) VPN

Explanation:

A VPN allows or describes the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols. A VPN can be set up across any type of link.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

3 7848
Q:

Which of the following is an industry-wide standards suite of protocols and algorithms that allows for secure data transmission over an IP-based network that functions at the layer3 Network layer of the OSI model?

A) HDLC B) xDSL
C) VPN D) IPSec
 
Answer & Explanation Answer: D) IPSec

Explanation:

IPSec is an industry-wide standard suite of protocols and algorithms that allows for secure data transmission over an IP-based network that functions at the layer3 Network layer of the OSI model.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

5 6590
Q:

How should a router that is being used in a Frame Relay  network be configured to keep split horizon issues from preventing routing updates

A) Configure a seperate subinterface for each PVC with a unique DLCI and subnet assigned to the subinterface B) Combine multiple Frame Relay circuits as a point-to-point line to support multicast and broadcast traffic
C) Configure many subinterfaces in the same subnet D) Configure a single subinterface to establish multiple PVC connections to multiple remote router interfaces.
 
Answer & Explanation Answer: A) Configure a seperate subinterface for each PVC with a unique DLCI and subnet assigned to the subinterface

Explanation:

If you have a serial port configured with multiple DLCIs connected to multiple remote sites, split horizon rules stop route updates received on an interface from being sent out the same interface. By creating subinterfaces for each PVC, you can avoid the split horizon issues when using Frame Relay.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

4 7865