CISCO Certification Questions

Q:

When a station sends a transmission to the MAC address ff : ff : ff : ff : ff : ff, what type of transmission is it?

A) Unicast B) Multicast
C) Anycast D) Broadcast
 
Answer & Explanation Answer: D) Broadcast

Explanation:

A transmission to the MAC address ff : ff : ff : ff : ff : ff is a broadcast transmission to all stations.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 5012
Q:

Which of the following uses ATM as the Data Link layer protocol that's terminated at what's known as the DSLAM?

A) DSL B) PPPoE
C) Frame Relay D) Dedicated T1
 
Answer & Explanation Answer: A) DSL

Explanation:

ATM is the Data-Link layer protocol that's typically used over the DSL layer1 connection from the CPE and terminated at what's known as the DSLAM - an ATM switch that contains DSL interface cards, or ATU-Cs.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4981
Q:

You want to implement a network medium that is not susceptible to EMI. Which type of cabling should you use?

A) Thicknet coax B) Thinnet coax
C) Category 5 UTP cable D) Fiber-optic cable
 
Answer & Explanation Answer: D) Fiber-optic cable

Explanation:

Fiber-optic cable provides a more secure, long - distance cable that is not susceptible to EMI interference at high speeds.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4965
Q:

The Acme Corporation is implementing dail-up services to enable remote-office employees to connect to the local network. The company uses multiple routed protocols,needs authentication of users connecting to the network, and since some calls will be long distance, needs callback support. Which of the following protocols is the best choice for these remote services? 

A) 802.1 B) Frame Relay
C) HDLC D) PPP
 
Answer & Explanation Answer: D) PPP

Explanation:

PPP is your only option because HDLC and Frame RElay do not support these types of business requirements. PPP provides dynamic addressing , authentication using PAP or CHAP, and callback services.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4900
Q:

What are the typical three different categories of VPNs?

Answer

The following are the different types of VPNs :


PPTP ( Point to Point Tunnel protocol ) VPN : Most commonly used VPN. PPTP is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets.


Site-to-Site VPN : Site-to-site VPN is a type of VPN connection that is created between two separate locations. Site-to-site VPN can be intranet based or extranet based. 


Intranet-based site-to-site VPN is created between an organization's propriety networks, while extranet-based site-to-site VPN is used for connecting with external partner networks or an intranet.


L2TP ( Layer Two Tunneling Protoco) VPN : L2TP is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an Internet service provider (ISP) to enable the operation of a virtual private network over the Internet.


IPsec (Internet Protocol Security) : IPsec is a framework for a set of protocols for security at the network or packet processing layer of network communication.


SSL (Secure Sockets Layer) VPN : SSL  is a form of VPN that can be used with a standard Web browser. In contrast to the traditional Internet Protocol Security (IPsec) VPN, an SSL VPN does not require the installation of specialized client software on the end user's computer. 


MPLS (Multiprotocol Label Switching) VPN : MPLS is a protocol for speeding up and shaping network traffic flows. 


Hybrid VPN : A hybrid VPN combines Multiprotocol Label Switching (MPLS) and Internet protocol security (IPsec)-based VPNs. 

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

7 4894
Q:

If you want to have more than one Telnet session open at the same time, what keystroke combination would you use?

A) Tab+spacebar B) Ctrl+X, then 6
C) Ctrl+Shift+X, then 6 D) Ctrl+Shift+6, then X
 
Answer & Explanation Answer: D) Ctrl+Shift+6, then X

Explanation:

To keep open one or more Telnet sessions, use the Ctrl+Shift+6 and then X keystroke combination.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4842
Q:

If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use?

A) access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet B) access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet
C) access - list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 D) access - list 100 deny 192.168.10.0 0.0.0.255 any eq 23
 
Answer & Explanation Answer: C) access - list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23

Explanation:

The extended access list ranges are 100 - 199 and 2000 - 2699, so the access-list number of 100 is valid. Telnet uses TCP, so the protocol TCP is valid. Now you just need to look for the source and destination address. only the third option has the correct sequence of parameters. Option B may work, but the question specifically states "only" to network 192.168.10.0, and the wildcard in option B is too broad.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4840
Q:

Which of the following is considered to be the inside hosts address after translation?

A) Inside local B) outside local
C) Inside global D) Outside global
 
Answer & Explanation Answer: C) Inside global

Explanation:

An inside global address is considered to be the IP address of the host on the private network after translation.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4818