Академический Документы
Профессиональный Документы
Культура Документы
Find a Question
Rackmount your Cisco Rack mount kits for your ASA5505 and your Air WLC -2100 series www.rack m ount.it/cisrack Cisco Memory For Sale Find New & Refurb C isco Memory Free Shipping & Tech Support! www.Me m oryDe ale rs.com /Me m ory Prepare for Cisco's CCNA Online C C NA C ertification C ourses Get C isco C NA C ertified Now! www.e -le arningce nte r.com
85 Answers
1. Due to a security violation, the passwords must be changed. What information can be learned from the following configuration entries? (Choose two.) Router(config)# line vty 0 3 Router(config-line)# password c13c0 Router(config-line)# login The entries specify three Telnet lines for remote access. ==>The entries specify four Telnet lines for remote access. The entries set the console and Telnet password to "c13c0". Telnet access will be denied because the Telnet configuration is incomplete. ==>Access will be permitted for Telnet using "c13c0" as the password.
2. Which two actions could be taken by a router if a specific match is not made to a route in the routing table? (Choose two.) The packet will be discarded. The packet will be sent back to the source. The packet will be flooded out all interfaces.
==>Neighboring routers are polled to find the best path. ==>The packet will be forwarded to a default route if one is present.
3. Refer to the exhibit. The network administrator remotely accesses the CLI of RouterB from PC1 using a secure connection. Which statement is true about this connection? The Telnet server process is running on PC1. ==>Only the exchange of the Telnet username and password is encrypted. The GET request is sent to RouterA to retrieve data. The SSH service is used to connect PC1 to RouterB.
4. Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.) The prefix of the subnet mask is /26. ==>The network on which this computer resides can have 30 hosts. The computer is unable to communicate outside of the local network. ==>The address that is assigned to the computer represents private addressing. The IP address that is assigned to the computer is routable on the Internet. ==>The IP address that is assigned as the default gateway is valid for this host.
5. What information can be gathered by using the command netstat? the default gateway the routing protocol ==>active TCP connections the locally configured subnet mask
6. Refer to the exhibit. The nslookup command that is shown was issued on a Windows PC host. What does the 10.32.5.74 address represent?
the IP address of the host the default gateway for the host ==>the primary DNS server for the host the home page address for the host
7. Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection? The data is automatically encrypted. A Telnet server process is running on PC1. ==>The connection is made through a VTY session on the router. A GET request was sent to RouterB to retrieve data during this session.
8. Which three addresses are private IP addresses? (Choose three.) ==>10.0.0.1 46.1.1.88 172.31.31.10 172.32.16.10 ==>192.168.8.8
9. Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem? ==>Hosts A and B are not on the same subnet as host C. The IP addresses on the router serial interfaces are wrong. The subnet mask on host C is improperly configured. The FastEthernet interface fa0/0 of router 1 is wrongly configured.
10. Which OSI layer addressing is required to route packets between two networks?
11. What is the effect of using the Router# copy running-config startup-config command on a router? The contents of ROM will change. The contents of RAM will change. ==>The contents of NVRAM will change. The contents of flash will change.
12. A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC? Use the ipconfig /all command at the hosts command prompt. ==>Use the ping 127.0.0.1 command at the command prompt. Use the traceroute command at the command prompt to identify any failures on the path to the gateway. Use FTP to check for connectivity to remote sites. Download a troubleshooting tool from the PC manufacturers website.
13. Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0? 255.255.0.0 255.255.254.0 255.255.252.0 ==>255.255.248.0 255.255.240.0 255.255.255.128
14. Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?
==>only computer D only computer A and computer D only computer B, computer C, and computer D all computers
15. Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.) ==>The cable is suitable for connecting a switch to a router Ethernet port. ==>The cable is suitable for connecting dissimilar types of devices. The cable is unusable and must be rewired. The cable is terminated in a way that the transmit pin is wired to the receive pin. The cable simulates a point-to-point WAN link.
16. Refer to the exhibit. Which layered network model is shown in the diagram? Cisco IETF OSI ==>TCP/IP
17. An administrator makes changes to the default configuration of a router and saves them to NVRAM. After testing, it is discovered that the configurations did not have the desired effect and must be removed. What steps must be taken to remove the changes and return the router to the default configuration? Reboot the router. Use no version of the commands that are issued. ==>Issue the erase startup-config command, and then reboot the router. Issue the erase running-config command, and then reboot the router.
18.
Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for this? Host A is assigned a network address. Host B is assigned a multicast address. Host A and host B belong to different networks. ==>The gateway addresses are network addresses.
19. Refer to the exhibit. A network technician has made several changes to R1 since the configuration has last been saved. The modified configuration did not produce the desired changes. The technician wants to store a backup copy of the saved configuration on a TFTP server before reloading. Which action will cause the unmodified data to be saved on the TFTP server?
20. What can the user do from the command prompt, Router(config-line)# ? Configure one of the network interfaces. ==>Configure one of the physical or virtual lines. Verify the running configuration on the device. Configure the parameters for one of the routing protocols.
21. Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with its default gateway? Use the ping 127.0.0.1 command. Use the ipconfig command. Use the ipconfig/all command. ==>Use the ping 10.0.0.254 command.
22. Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The router cannot ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this problem? Configure the description at interface serial 0/0/0.
==>Configure an IP address on interface serial 0/0/0. Remove the no shutdown command at interface serial 0/0/0 Reboot the router.
23. A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure? console enable ==>enable secret VTY
24. What are two purposes for configuring a banner on a router? (Choose two.) to announce system downtime to prevent unauthorized access to the router to provide a description of interface connections ==>to assist in legal prosecution for unauthorized access ==>to provide a welcome message to users who access the router
25. Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are connected by three routers. Which action will help to identify the path between the hosts? Use the ipconfig command at the host. Use the ipconfig/all command at the destination. ==>Use the tracert command at the host. Use the ping command at the destination.
26. Refer to the exhibit. Which list refers only to end devices? ==>D,E,F,G
27. When must a router serial interface be configured with the clock rate command? when the interface is functioning as a DTE device when the interface timers have been cleared when the connected DTE device is shut down ==>when the interface is functioning as a DCE device
28. Which table accurately associates the RFC 1918 private IP addresses with the correct network mask?
29. Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/IP model? (Choose two.) application layer presentation layer session layer ==>transport layer ==>network layer data link layer physical layer
30. What happens when a host station receives a frame that contains its own MAC address in the destination field? ==>The Layer 2 information is removed and the frame is pushed up to Layer 3. The host station will copy the information to its buffers and send it back out. The frame originated from the host and will be ignored. The Layer 3 information is added to the frame.
31. Refer to the exhibit. Host A is configured with the correct IP address for the default gateway of the router R1 FastEthernet0/1 interface. How will a packet that is sent from host A to host B be handled by the devices on the network? R1 will drop the packet because R1 does not have a specific route in its routing table to the 10.1.1.0/24 network. ==>R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to the directly connected network 10.1.1.0/24. R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a default route to network 10.1.1.0/24. R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a route that is learned by a routing protocol to network 10.1.1.0/24.
32. What type of network is maintained if a server takes no dedicated role in the network? mainframe client/server ==>peer-to-peer centralized
33. In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selected? hub router ==>switch firewall
34. Which TCP/IP model layer creates additional overhead on network resources due to acknowledgments, tracking, and retransmission of data? internet ==>transport application network access
35. How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask of 255.255.248.0? 30 256 ==>2046 2048 4094 4096
36. Which service is used when the nslookup command is issued on a computer? FTP ==>DNS DHCP Telnet
37. Which process provides the means to send and receive data when running multiple applications at the same time on a computer? interleaving ==>sequencing segmentation acknowledgement
38. Which three IPv4 addresses represent valid host addresses for a subnet? (Choose three.) 10.1.12.79/28 ==>10.1.12.113/28 10.1.12.32/28 ==>10.1.11.5/27 ==>10.1.11.97/27 10.1.11.128/27
39. What is the consequence of issuing the erase startup-config command in privileged EXEC mode on a Cisco router? Data stored in RAM will be removed. ==>Data stored in NVRAM will be erased. Information in flash memory will be removed. Flags in the configuration register will be set to 0. Both the startup-config and the running-config will be erased.
40. Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A? IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2 ==>IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17 IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18 IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5 IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1 IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18
41. What is the Cisco IOS? ==>system software for Cisco devices Read Only Memory in Cisco devices non-volatile storage for device configurations an initial operating system that is used for boot functions
42. Which router configuration mode will require user authentication if an administrator issues the enable secret command? user executive mode ==>privileged executive mode global configuration mode service specific configuration mode
43. Which command or commands will require authentication to access the privileged exec mode? RTRA(config)# enable secret cisco RTRA(config)# service password encryption RTRA(config)# line con 0 RTRA(config-line)# login RTRA(config-line)# password cisco ==>RTRA(config)# line vty 0 4 RTRA(config-line)# login RTRA(config-line)# password cisco
44. A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error? access point host hub ==>router switch
45. Which statement is true about Layer 3 addresses? They are physical addresses. ==>They are used in routing decisions. They are only used on local networks. They are altered each time a packet crosses a router.
46. Refer to the exhibit. An administrator on PC1 wants to view some HTML code from a web page housed on the web server. Which client application will allow this request to be started?
47. Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission? application presentation
session ==>transport
48. Refer to the exhibit. PC1 is unable to access PC2. To troubleshoot this problem, the technician needs to confirm that the next hop interface is operational. Which default gateway address should the technician ping from PC1 to confirm this? ==>10.0.0.254 192.168.0.249 192.168.0.250 10.0.1.254
49. An administrator is in the middle of entering a lengthy command when suddenly output from the IOS appears stating that an interface has gone down and then up again. Consequently, the command that the administrator was typing is no longer legible on the terminal. What CLI keystrokes can be entered to return to the line that the administrator was typing? Ctrl-D Ctrl-K Ctrl-R ==>Ctrl-Z
51. Which physical component is used to access and perform the initial configuration on a new unconfigured router?
52. Which option shows how a router will route packets to a remote network? Incoming search terms: which three addresses are private ip addresses (choose three )
Rackmount your Cisco Rack mount kits for your ASA5505 and your Air WLC -2100 series www.rack m ount.it/cisrack Free IPv6 Certification Get started in minutes! Become an IPv6 Guru ipv6.he .ne t Cisco Memory For Sale Find New & Refurb C isco Memory Free Shipping & Tech Support! www.Me m oryDe ale rs.com /Me m ory
85 Answers
1. 5 on Mar 05, 2012 Reply
Ads by Google Cisco CCNA Exam Cisco CCNA Cisco Systems CCNA CCNA Exam
Refer to the exhibit. PC1 is unable to access PC2. To troubleshoot this problem, the technician needs to confirm that the next hop interface is operational. Which default gateway address should the technician ping from PC1 to confirm this? 10.0.0.254 192.168.0.249 192.168.0.250 10.0.1.254 Could you review this question Im not sure its correct I think the answer is the last option. Please reply urgently
FirePlotter A real-time bandwidth monitor for C isco and FortiNet firewalls www.fire plotte r.com Free IPv6 Certification Get started in minutes! Become an IPv6 Guru ipv6.he .ne t Cisco Memory For Sale Find New & Refurb C isco Memory Free Shipping & Tech Support! www.Me m oryDe ale rs.com /Me m ory
0 Votes
0 Votes
0 Votes
the 1st option is the ip add that is being assigned to the Fa0/0 of the router
0 Votes
0 Votes
0 Votes
10.0.0.254 is right .. basic concept .. any pc with switch or not attach with router by interface . this interface is the gatway for pc ( users )
0 Votes
0 Votes
0 Votes
The question is asking the default gateway of PC1, of course its 10.0.0.254. 10.0.1.254 is PC2s default gateway
0 Votes
0 Votes
0 Votes
i think ans will be 192.168.0.250/10.0.1.254 because,here the technician needs to confirm that the next hop interface is operational or not. 10.0.0.254 will not give u any information of next hop..
0 Votes
0 Votes
0 Votes
Answer is 10.0.0.254 because question ask ..ping from PC1 to confirm this? its from PC 1 not from PC 2 ..!!
0 Votes
0 Votes
0 Votes
I think when you are trying to troubleshoot you need to ping the closest gateway or Ip address to you and if It goes through than ping the next one over. Therefor pinging the PC 1s default gateway would seem more reasonable to me and pinging pc 2
0 Votes
0 Votes
0 Votes
The question is WHICH DEFAULT GATEWAY ADDRESS SHOULD THE TECH PING FROM PC 1 we know that 10.0.0.254 and 10.0.1.254 are both default gateways. Now in order to check that the next hop interface is operational you would have to ping address 10.0.1.254 because pinging 10.0.0.254 wouldnt really tell you anything.
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
192.168.0.249 is the correct answer. Theyre asking about PROPER INTERFACE ON DEFAULT ROUTER -> ping to the interface of PC1`s default router.
0 Votes
0 Votes
0 Votes
Nooo, it is not asking what interface to ping its asking what to do to find out if the interface is still operational. The question is which default gateway address is to ping. Pls dont confuse ppl here The next hop (A ROUTER) in case for PC1 will be 10.0.1.254
0 Votes
0 Votes
0 Votes
I think the problem could be anywhere between PC1 and PC2.First step is to ping PC1 default gateway which is 10.0.0.254 if this ping is successful than I can ping next default gateway 10.0.1.254. If ping 10.0.1.254 first and its not successful doesnt mean ping to 10.0.0.254 will be successful.So I believe the answer is 10.0.0.254
0 Votes
0 Votes
0 Votes
MY TWO CENTS WORTH.. Q.3 Refer to the exhibit. The network administrator remotely accesses the CLI of RouterB from PC1 using a secure connection. Which statement is true about this connection? The SSH service is used to connect PC1 to RouterB. Question askes for a SECURE connection, telnet is not secure. Q.4 Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.) The network on which this computer resides can have 30 hosts. The computer is unable to communicate outside of the local network.The gateway address is on a different subnet, this has a 224 mask networks hop in 32 The address that is assigned to the computer represents private addressing Q.8 Which three addresses are private IP addresses? (Choose three.) 10.0.0.1 172.31.31.10.Read question Properly..Choose 3 192.168.8.8 Q.9 The subnet mask on host C is improperly configured. Notice it has a /27, it should be /28. A and B are on the 172.16.31.96 172.16.31.111, C is on 172.16.31.80 172.16.31.95. Q.28 Which table accurately associates the RFC 1918 private IP addresses with the correct network mask? 192.168.0.0 255.255.0.0 /16 172.16.0.0 255.240.0.0 /12 10.0.0.0 255.0.0.0 /8 Q.37 Which process provides the means to send and receive data when running multiple applications at the same time on a computer? Segmentation Q.49 Ctrl-R Redisplays a line
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
Q.28 was answered correct on this site! address space 192.168.0.0 contains 256 subnets -> so you need the /24 subnetmask
0 Votes
0 Votes
0 Votes
No, youre talking about Class C networks. Its not the same to private IP adresses. The private address blocks are: 10.0.0.0 to 10.255.255.255 (10.0.0.0 /8) 172.16.0.0 to 172.31.255.255 (172.16.0.0 /12)
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
43. Which command or commands will require authentication to access the privileged exec mode? RTRA(config)# enable secret cisco RTRA(config)# service password encryption RTRA(config)# line con 0 RTRA(config-line)# login RTRA(config-line)# password cisco RTRA(config)# line vty 0 4 RTRA(config-line)# login RTRA(config-line)# password cisco Could you review this question Im not sure its correct I think the answer is the first option. Please reply urgently
0 Votes
0 Votes
0 Votes
authentication so this will be in sesion like line vty RTRA(config)# line vty 0 4 RTRA(config-line)# login RTRA(config-line)# password cisco is right
0 Votes
0 Votes
0 Votes
The answer should be: RTRA(config)# enable secret cisco RTRA(config)# service password encryption since the question is asking about privileged exec mode not telnet session.
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
But service password encryption will not help you at all to authenticate. It will just encrypt passwords at show running config
0 Votes
0 Votes
0 Votes
Enable secret will only encrypt the password but does not require login. That what the login command is for. RTRA(config)# line vty 0 4 RTRA(config-line)# login RTRA(config-line)# password cisco This is the correct answer and you can reverse the commands to make more sense when setting up the router. RTRA(config)# line vty 0 4 RTRA(config-line)# password cisco RTRA(config-line)# login Doing it that way actually makes more sense.
0 Votes
0 Votes
0 Votes
RTRA(config)# line vty 0 4 RTRA(config-line)# login RTRA(config-line)# password cisco This command is used to make an authentication when the users try to access an device by telnet. So, the correct answer is RTRA(config)# enable secret cisco Since this command is already encrypted, then need no any other command to make so. This command : RTRA(config)# service password encryption is used to encrypt the password that you put on an authentication of both line console and vty.
0 Votes
0 Votes
0 Votes
Ofcourse the first answer is correct. They ask about privilege exec mode, and enable secret password doing it. Try in PT on any device: enable conf t enable secret cisco exit exit and then try to login in to privilege exec mode. The system asku you about the password(cisco). service password encryption is not required and this command dont have influence on seting password for privileged exec mode.
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
Remember is questions like this that get a lot of people. The question is about Authentication to access PRIVILEGED EXEC MODE they are not asking you about loging into the router which would require a login command. enable secret cisco and service password encryption would make the router ask you for a password to access privileged mode. Which makes the first option right.
0 Votes
0 Votes
0 Votes
its easy brova RTRA= user exec mode RTRA# =user priviledge mode RTRA(config)# global config mode kk.reach me anytime
0 Votes
0 Votes
0 Votes
9. Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem? Hosts A and B are not on the same subnet as host C. The IP addresses on the router serial interfaces are wrong. The subnet mask on host C is improperly configured. The FastEthernet interface fa0/0 of router 1 is wrongly configured. Could you review this question Im not sure its correct I think the answer is the last option. Please reply urgently
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
Answer C is maybe expected, but it is not the right one!! The question is: Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem? and it is not because of improper subnet mask. Even with the wrong mask you will be able to ping host A from host C!! So IMHO, none of the answers are right!!!
0 Votes
0 Votes
0 Votes
Yes, I have tried it in packet tracer and the problem does not exist. You can ping hosts A and B regardless of subnet mask on host C. So the question is stupid !!
0 Votes
0 Votes
0 Votes
No, packet tracer is stupid (only emulator). Try connecting PC to a router with different subnet mask than the router interface has even arp requests are not possible as the broadcast address is different. The router will simply not listen
to hosts broadcasts.
0 Votes
0 Votes
0 Votes
The only reason why you can ping its because your in the same subnet (and for some reason packet tracer doesnt care) now router 2 and host C are not even in the same subnet.
0 Votes
0 Votes
0 Votes
No it isnt were pinging to default gateway (its a next hop) from PC1 and thats 10.0.0.254.
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
Q3 The connection is made through a VTY session on the router. about ssh secure the content vty secure username and password ( connection )
0 Votes
0 Votes
0 Votes
IF WE READ THIS Choosing a SSH Client SSH (or Secure Shell) is a protocol that can be used to log into a remote machine (your Virtual Server) and provide secure encrypted communications between your Virtual Server and your local computer. All of the commands you would use in a Telnet client, you can use in an SSH client. The only difference is that the communication is made via encrypted channels to and from your Virtual Server. i think the answer is The SSH service is used to connect PC1 to RouterB.
0 Votes
0 Votes
0 Votes
What about Q2.? Is the answer Neighboring routers are polled to find the best path. right?
0 Votes
0 Votes
0 Votes
Q2 I think the right answer is The packet will be discarded and The packet will be forwarded to a default route if one is present
0 Votes
0 Votes
0 Votes
yes,Im with you (tyny). I think that they are the two right answers.
0 Votes
0 Votes
0 Votes
yes,Im with you (Amir). I think that they are the two right answers.
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
Q43 answer is RTRA(config)# enable secret cisco RTRA(config)# service password encryption Q9 answer is The subnet mask on host C is improperly configured must be /28 like router2 fa 0/0
0 Votes
0 Votes
0 Votes
hey guys in Q3 The network administrator remotely accesses the CLI of RouterB from PC1 using a SECURE connection we all know that telnet is not secure, is that answer right ? should it not be d. *The SSH service is used to connect PC1 to RouterB.
0 Votes
0 Votes
0 Votes
Yes, SSH is the correct answer. Telnet is not secure and therefore the wrong answer.
0 Votes
0 Votes
0 Votes
8. Which three addresses are private IP addresses? (Choose three.) 172.31.31.10 is missing.
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
banner motd messages, im sure that is the wrong answer, should it not be to prevent un authorised access and assist in legal prosecution
0 Votes
0 Votes
0 Votes
A banner doesnt prevent anything, it merely provides some text. As such you can use it only for a warning or to let users know something. It cant actually do anything practical, like preventing access.
0 Votes
0 Votes
0 Votes
I agree, a lot of people seem to be saying its to prevent unauthorized access, but it merely provides a text welcome or legal message. If you want to prevent access, then a password is implemented. Get your facts straight before confusing others.
0 Votes
0 Votes
0 Votes
about Q24 i think the answer will be; 1-to prevent unauthorized access to router 2-to provide a welcome message to users who access the router is that answer true or ..?
0 Votes
0 Votes
0 Votes
So, you think when putting a banner in your router it will prevent me from accessing your router? Lets do this in a hacker perspective
0 Votes
0 Votes
0 Votes
Configuring an appropriate banner is part of a good security plan. At a very minimum, a banner should warn against unauthorized access. Never configure a banner that welcomes an unauthorized user. from he ccna
0 Votes
0 Votes
0 Votes
Q4. Im sure that answer: The IP address that is assigned as the default gateway is valid for this host is incorrect. The computer never reaches his default gateway, why? Because when computer do operation AND on 192.168.34.1(PCs default gateway) and his subnet mask, computer will be think that this IP is from other subnet. When frame is adressed to PC which is from the same subnet(f.e: 192.168.34.48), source computer send packed to the switch, and then to the destination PC, so the correct answer is: The computer is unable to communicate outside of the local network.
0 Votes
0 Votes
0 Votes
Q19. I think the correct answer is A: R1#copry running-config tftp Name of configuration file to write [R1-run]? R1-config Write file R1-config to 192.168.3.2? [confirm] In question we see: the technican save the configuration R1, then he has made several changes, so the wrong configuration is in running-config.
0 Votes
0 Votes
0 Votes
So why would you want to make a backup copy of the running config if its wrong? Re-read this A network technician has made several changes to R1 since the configuration has last been saved. The modified configuration did not produce the desired changes. So the runing config is not good and wants to go back to the start up config and wants to as a backup before reloading.
0 Votes
0 Votes
0 Votes
Refer to question 40 Could you review this question Im not sure its correct I think the answer is IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18 the next hop is 192.168.100.18 thanks Revital
0 Votes
0 Votes
0 Votes
192.168.100.18 is not the next hop, it is a switch. 192.168.100.17 is a router and is the next hop outside of the broadcast domain.
0 Votes
0 Votes
0 Votes
This is correct The switch is no bearing and it cant be assigned as Default Gateway.
0 Votes
0 Votes
0 Votes
24. What are two purposes for configuring a banner on a router? (Choose two.) to announce system downtime to prevent unauthorized access to the router
to provide a description of interface connections to assist in legal prosecution for unauthorized access to provide a welcome message to users who access the router correct answers would : to prevent unauthorized access to the router to assist in legal prosecution for unauthorized access
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
hey guys, im planning on taking the test next month, are these the answers to most of the CCNA test questions? is this enough to take the test?
0 Votes
0 Votes
0 Votes
No it isnt. There is a pool of mor than 500 questions, where you will get about 50 to your exam. Some of my classmates took the exam last week, and they said that there were only about 10 questions they have found in the internet. The other 40 must be solved by yoursefl, and 10 correct answers isnt enough to pass the exam
0 Votes
0 Votes
0 Votes
I have taken final exam two day ago, i advice u to study these qeustions (WITH THE CORRECTIONS OF THE USERES REPLIED), And study the Version of 2010 of these answers.. plus so much little information of the chapters, i had 75% in my exam.. Good Luck
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
28. Which table accurately associates the RFC 1918 private IP addresses with the correct network mask? right answer is: 192.168.0.0 255.240.0.0 172.16.0.0 255.255.0.0 10.0.0.0 255.0.0.0
0 Votes
0 Votes
0 Votes
The correct answer is 10.0.0.0 255.0.0.0 /8 172.16.0.0 255.240.0.0 /12 192.168.0.0 255.255.0.0 /16 see chapter 6 6.2.5.1
0 Votes
0 Votes
0 Votes
43. Which command or commands will require authentication to access the privileged exec mode? correct answer (also will encrypt password) RTRA(config)# enable secret cisco RTRA(config)# service password encryption This is for console password RTRA(config)# line con 0 RTRA(config-line)# login RTRA(config-line)# password cisco This is for TELNET password RTRA(config)# line vty 0 4 RTRA(config-line)# login RTRA(config-line)# password cisco
0 Votes
0 Votes
0 Votes
Can somebody explain me this question? 38. Which three IPv4 addresses represent valid host addresses for a subnet? (Choose three.) 10.1.12.79/28 10.1.12.113/28 10.1.12.32/28
0 Votes
0 Votes
0 Votes
hey its alright here is what i have for u Ans=10.1.12.32/28 10.1.11.97/27 1.e 32 +64=96 so u can use it as subnetting VLSM 10.1.11.128/27 kk
0 Votes
0 Votes
0 Votes
10.1.12.79/28 broadcast address for 64-79 network 10.1.12.113/28 valid 10.1.12.32/28 network address for 32-47 network 10.1.11.5/27 valid 10.1.11.97/27 valid
0 Votes
0 Votes
0 Votes
Q28 read from the following website on page 3. Case closed http://tools.ietf.org/html/rfc1918
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
176.16.0.0 255.255.240.0 to be more precise (240=block of 16 ending 31) RFC 1918 private address 176.16.0.0 176.31.255.255
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
Q48: we need to confirm that the next hop interface is operational or not? we must ping the remote default gateway address. the technician must ping from PC1 to confirm this is 10.0.1.254. because if we ping the near default gateway 10.0.0.254, we do not learn the state of the connection between the routers
0 Votes
0 Votes
0 Votes
# 18 is wrong Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for this? it asked for whats the reason for this problem and gateway address is always the network address. Answer is #3 Host A and host B belong to different networks.
0 Votes
0 Votes
0 Votes
So what A and B belong to different networks? They are connected by Router. Correct answer is still: -> #The gateway addresses are network addresses.
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
0 Votes
Where can I get a copy of this test that actually has the exhibits and diagrams on it? This one on this site does not show any diagrams so the questions and answers make no sense.
0 Votes
0 Votes
0 Votes
Answer Question
I'm Email *
Existing User
Ask a Question
Recommend this on Google
Latest Questions
Python progression path From apprentice to guru Understanding Python decorators What is a metaclass in Python? The Python yield keyword explained Why is one loop so much slower than two loops?
Tag Clouds
.net ajax algorithm android arrays asp.net asp.net-mvc asp.net-mvc-3 c# css database django eclipse facebook html html5 image ios iphone java javascript jquery linux multithreading mysql objective-c oracle performance php python ruby ruby-on-rails ruby-on-rails-3 sql sql-server string vb.net visual-studio visual-studio-2010 web-development
windows winforms wpf xcode xml
Latest Posts
Python progression path From apprentice to guru Understanding Python decorators What is a metaclass in Python? The Python yield keyword explained Why is one loop so much slower than two loops? Cycles in family tree software The Definitive C++ Book Guide and List What is the name of this operator: >? How do I calculate someone's age in C#? Visual Studio optimizations
Recent Answers
arora on Python progression path From apprentice to guru johan-offer on Python progression path From apprentice to guru arora on Python progression path From apprentice to guru xequnsruuh on Python progression path From apprentice to guru xequnsruuh on Python progression path From apprentice to guru harry on Python progression path From apprentice to guru scott on Python progression path From apprentice to guru rajesh on Python progression path From apprentice to guru arora on Python progression path From apprentice to guru harry on Python progression path From apprentice to guru
Recent Searchs
Erouting: ccna2 v4 0 chapter11 mvc3 checkboxfor (#210) Subject must be a page c# facebook login webrequest the application wrapper must end in app prepareforsegue not called estimated app store size availability h not found UnmarshalStructInfoFrom zfdatagrid form reference many to many
2012 Question and answer All right reserved. Answers Theme by Tips4All