search for ccna answer

Thursday, March 25, 2010

Telekom Malaysia high speed broadband unveiled

By JO TIMBUONG

intech@thestar.com.my

PETALING JAYA: UniFi — Telekom Malaysia’s(TMpoint) just launched high speed broadband service — comes in three packages.

Residential subscribers can opt for a 5-megabits per second (Mbps), 10Mbps or 20Mbps connection to the Internet.

The 5Mbps package is priced at RM149 per month, the 10Mbps at RM199, and the 20Mbps at RM249. The subscribers will have to sign on for two years.

Each package also comes with a Dect (Digital Enhanced Cordless Telecommunications) phone, a set-top box for IPTV (Internet Protocol Television), Streamyxzone ID for wireless web access, and a 2GB e-mail box.

Subscribers will also enjoy synchronous upload and download speeds, unlike with the ADSL service now where upload speeds are slower than download speeds.

Telekom Malaysia has also capped the amount of data that can be downloaded using each of the packages, in an effort to maintain high surfing speeds.

The 5Mbps package has a 60GB monthly cap on downloads; the 10Mbps package has a 90GB cap, and the 20Mbps package has a 120GB cap. To compare, a typical two-hour high-definition movie is about 8GB in size.

However, some industry pundits have pointed out that the caps are calculated on a daily basis, which restricts the amount of data that can be downloaded each day in a month.

UniFi is now available in Shah Alam, Subang Jaya, Taman Tun Dr Ismail and Bangsar, in the Klang Valley. It will be rolled out to more areas nationwide over the next two years.

There are business packages available for corporate subscribers. As with the home user service, these are also divided into 5Mbps, 10Mbps and 20Mbps packages.

There are no caps on the corporate packages, but prices are much higher. Companies will have to pay RM199 a month for 5Mbps, RM599 for 10Mbps, and RM899 for 20Mbps.

Telekom Malaysia is holding a press conference at its headquarters this afternoon. More details after this event.

Published: Thursday March 25, 2010 MYT 3:26:00 PM

Saturday, February 27, 2010

CCNA Exploration 1: Network Fundamentals – Final exam

01. When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?
  • IP
  • UDP
  • Ethernet
  • a connectionless acknowledgement
  • an upper-layer, connection-oriented protocol or service
02. Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
  • Connection 1 – rollover cable
    Connection 2 – straight-through cable
    Connection 3 – crossover cable
  • Connection 1 – crossover cable
    Connection 2 – rollover cable
    Connection 3 – crossover cable

  • Connection 1 – straight-through cable
    Connection 2 – crossover cable
    Connection 3 – crossover cable
  • Connection 1 – straight-through cable
    Connection 2 – crossover cable
    Connection 3 – straight-through cable
  • Connection 1 – crossover cable
    Connection 2 – straight-through cable
    Connection 3 – crossover cable
03. Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
  • application
  • presentation
  • session
  • transport
04. Refer to the exhibit. What is the correct destination socket number for a web page request from Host A to the web server?
  • 00-08-a3-b6-ce-46
  • 198.133.219.25:80
  • http://www.cisco.com
  • C 198.133.219.0/24 is directly connected, FastEthernet0/0
05. A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC?
  • Use the ipconfig /all command at the host’s command prompt.
  • Use the ping 127.0.0.1 command at the command prompt.
  • Use the traceroute command at the command prompt to identify any failures on the path to the gateway.
  • Use FTP to check for connectivity to remote sites.
  • Download a troubleshooting tool from the PC manufacturer’s website.
06. Which type of media is immune to EMI and RFI? (Choose two.)
  • 10 Base-T
  • 10 Base-2
  • 10 Base-5
  • 100 Base-FX
  • 100 Base TX
  • 1000 Base LX
07. Refer to the exhibit. The command that is shown was issued on a PC. What does the IP address 192.168.33.2 represent?
  • IP address of the host
  • default gateway of the host
  • IP address of the homepage for the host
  • primary domain name server for the host
  • IP address of the website resolver1.mooki.local
08. Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correctly identifies the component or protocol used at each numbered stage of the diagram.
  • 1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
  • 1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
  • 1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
  • 1.MDA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MUA 7.POP 8.MDA
  • 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
09. What is true regarding network layer addressing? (Choose three)
  • uses a flat structure
  • prevent broadcasts
  • heirarchical
  • uniquely identifies each host
  • 48 bits in length
  • contains a network portion
10. Which OSI layers offers reliable, connection-oriented data communication services?
  • application
  • presentation
  • session
  • transport
  • network
11. Examine the graphic with current configurations. Host A in the Clerical offices failed and was replaced. Although a ping to 127.0.0.1 was successful, the replacement computer can not access the company network. What is the likely cause of the problem?
  • IP address incorrectly entered
  • network cables unplugged
  • subnet mask incorrectly entered
  • network card failure
12. Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?
  • leaving host A
  • leaving ATL
  • leaving Dallas
  • leaving NYC
13. Refer to the exhibit. What two facts can be determined from the information that is given? (Choose two.)
  • This exchange is part of the three-way handshake.
  • The source port indicates that a Telnet session has been initiated.
  • The data is flowing from server to client.
  • The destination port indicates that an HTTP session has been initiated.
  • The data listed is associated with the transport layer.
  • The source port does not support communication with the destination port that is listed.
14. Refer to the exhibit. On the basis of the IP configuration that is shown, what is the reason that Host A and Host B are unable to communicate outside the local network?
  • Host A was assigned a network address.
  • Host B was assigned a multicast address.
  • Host A and Host B belong to different networks.
  • The gateway address was assigned a broadcast address.
15. Which of the following are the address ranges of the private IP addresses? (Choose three.)
  • 10.0.0.0 to 10.255.255.255
  • 200.100.50.0 to 200.100.25.255
  • 150.150.0.0 to 150.150.255.255
  • 172.16.0.0 to 172.31.255.255
  • 192.168.0.0 to 192.168.255.255
  • 127.16.0.0 to 127.31.255.255
16. Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255?
  • 172.16.128.0 255.255.255.224
  • 172.16.128.0 255.255.0.0
  • 172.16.128.0 255.255.192.0
  • 172.16.128.0 255.255.224.0
  • 172.16.128.0 255.255.255.192
17. Which password is automatically encrypted when it is created?
  • vty
  • aux
  • console
  • enable secret
  • enable password
18. Which three statements characterize the transport layer protocols? (Choose three.)
  • TCP and UDP port numbers are used by application layer protocols.






  • TCP uses port numbers to provide reliable transportation of IP packets.





  • UDP uses windowing and acknowledgments for reliable transfer of data.





  • TCP uses windowing and sequencing to provide reliable transfer of data.





  • TCP is a connection-oriented protocol. UDP is a connectionless protocol.





19. When must a router serial interface be configured with the clock rate command?
  • when the interface is functioning as a DTE device
  • when the interface timers have been cleared
  • when the connected DTE device is shut down
  • when the interface is functioning as a DCE device
20. Which two functions of the OSI model occur at layer two? (Choose two.)
  • physical addressing
  • encoding
  • routing
  • cabling
  • media access control
21. A routing issue has occurred in you internetwork. Which of the following type of devices should be examined to isolate this error?
  • access point
  • host
  • hub
  • router
  • switch
22. Refer to the exhibit. With the router running NAT, what IP addresses can be applied to the computer to allow access to the Internet? (Choose three)
  • 192.168.18.38
  • 192.168.18.48
  • 192.168.18.49
  • 192.168.18.52
  • 192.168.18.59
  • 192.168.18.63
23. Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two)
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login
  • The entries specify three Telnet lines for remote access.
  • The entries specify four Telnet lines for remote access.
  • The entries set the console and Telnet password to “c13c0″.
  • Telnet access will be denied because the Telnet configuration is incomplete.
  • Access will be permitted for Telnet using “c13c0″ as the password.
24. As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?
  • 255.255.0.0
  • 255.255.248.0
  • 255.255.252.0
  • 255.255.254.0
  • 255.255.255.0
  • 255.255.255.128
25. Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?
  • The data is automatically encrypted.
  • A Telnet server process is running on PC1.
  • The connection is made through a VTY session on the router.
  • A GET request was sent to RouterB to retrieve data during this session.
26. Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific physical layer requirements. The table lists each segment by number and the cable which has been installed by the network technician between the network components on that segment. From the data given, which segments have the correct cable installed? (Choose three.)
  • segment1
  • segment2
  • segment3
  • segment4
  • segment5
27.  Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.)
  • The address that is assigned to the computer represents private addressing.
  • The computer is unable to communicate outside of the local network.
  • The network of this computer can have 126 hosts.
  • The prefix of the computer address is /27.
  • The IP address that is assigned to the computer is routable on the Internet.
  • The IP address that is assigned to the computer is a broadcast address.
28. Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)
  • 172.16.4.63 /26
  • 172.16.4.129 /26
  • 172.16.4.191 /26
  • 172.16.4.51 /27
  • 172.16.4.95 /27
  • 172.16.4.221 /27
29. Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?
  • IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2
  • IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
  • IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18
  • IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
  • IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1
  • IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18
30. The Layer 4 header contains which type of information to aid in the delivery of data?
  • service port number
  • host logical address
  • device physical address
  • virtual connection identifier
31. During the encapsulation process, which identifiers are added at the transport layer?
  • two networks routing the packets
  • two applications communicating the data
  • two hosts at either end of the communication
  • two nodes on the local network exchanging the frame
32. Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?
  • 1
  • 3
  • 4
  • 5
  • 7
33. Refer to the exhibit. Which logical topology best describes the exhibited network?
  • star
  • ring
  • point-to-point
  • multiaccess
  • mesh
34. Refer to the exhibit. Host A is transmitting data to host B. What addresses will host A use to for the destination IP
and MAC addresses in this communication?

  • Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.62
  • Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.75
  • Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.62
  • Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.75
  • Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.75
  • Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.94
35. Refer to the exhibit. A router, whose table is shown, receives a packet that is destined for 192.168.1.4. How will router treat the packet?
  • The packet will be dropped.
  • The packet will be forwarded via FastEthernet 0/0.
  • The packet will be forwarded to the destination host.
  • The packet will be forwarded to the 192.168.1.3 next-hop address.
36. Refer to the exhibit. Which set of devices contains only intermediary devices?
  • A, B, D, G
  • A, B, E, F
  • C, D, G, I
  • G, H, I, J
37.  Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
  • 127.0.0.1
  • 192.168.64.196
  • 192.168.254.1
  • 192.168.254.9
  • 192.168.254.254
38. Which prompt represents the appropriate mode used for the copy running-config startup-config command ?
  • Switch-6J>
  • Switch-6J#
  • Switch-6J(config)#
  • Switch-6J(config-if)#
  • Switch-6J(config-line)#
39. A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?
  • console
  • enable
  • enable secret
  • VTY
40. Which range of port numbers are reserved for services that are commonly used by applications that run on servers?
  • 0 to 255
  • 0 to 1023
  • 1024 to 49151
  • 49152 to 65535
41. Refer to the exhibit. Which two statements describe the information that is represented in the header? (Choose two)
  • This is a server response.
  • The UDP protocol is being used.
  • The destination port indicates a Telnet session.
  • The return segment will contain a source port of 23.
  • The next session originated from the client of this session will use the source port number 13358.
42. In a Cisco IOS device, where is the startup-configuration file stored?
  • Flash
  • NVRAM
  • RAM
  • ROM
43.  Refer to the exhibit. What two facts can be determined about the exhibited topology? (Choose two)
  • A single broadcast domain is present
  • Two logical address ranges are required.
  • Three broadcast domains are shown.
  • Four networks are needed.
  • Five collision domains exist.
44. What are three characteristics of CSMA/CD? (Choose three)
  • Devices can be configured with a higher transmission priority.
  • A jam signal indicates that the collision has cleared and the media is not busy.
  • A device listens and waits until the media is not busy before transmitting.
  • The device with the electronic token is the only one that can transmit after a collision.
  • All of the devices on a segment see data that passes on the network medium.
  • After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.
45. Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?
  • an FTP client
  • a Telnet client
  • a terminal emulation program
  • a web browser
46. Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send a response to the initial tracert packet from PC1?
  • Athens
  • Ankara
  • London
  • Paris
  • PC4
47. Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?
  • only computer D
  • only computer A and computer D
  • only computer B, computer C, and computer D
  • all computers
48. Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?
  • address translation
  • DHCP services
  • ftpd
  • web server
49. Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue?
  • issue the clock rate command on interface Serial 0/0/0
  • issue the description command on interface Serial 0/0/1
  • issue the ip address command on interface FastEthernet 0/0
  • issue the no shutdown command on interface FastEthernet 0/1

Saturday, February 20, 2010

CCNA Exploration 4,0: Network Fundamentals – Chapter 9 Exam

Chapter 9 Exam Answer
Disclaimer: This questionnaires are just for revision purpose!



01. Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list below.
  • 85
  • 90
  • BA
  • A1
  • B3
  • 1C
02. Which of the following describe interframe spacing? (Choose two.)
  • the minimum interval, measured in bit-times, that any station must wait before sending another frame
  • the maximum interval, measured in bit-times, that any station must wait before sending another frame
  • the 96-bit payload padding inserted into a frame to achieve a legal frame size
  • the 96-bit frame padding transmitted between frames to achieve proper synchronization
  • the time allowed for slow stations to process a frame and prepare for the next frame
  • the maximum interval within which a station must send another frame to avoid being considered unreachable
03. When a collision occurs in a network using CSMA/CD, how do hosts with data to transmit respond after the backoff period has expired?
  • The hosts return to a listen-before-transmit mode.
  • The hosts creating the collision have priority to send data.
  • The hosts creating the collision retransmit the last 16 frames.
  • The hosts extend their delay period to allow for rapid transmission.
04. After an Ethernet collision, when the backoff algorithm is invoked, which device has priority to transmit data?
  • the device involved in the collision with the lowest MAC address
  • the device involved in the collision with the lowest IP address
  • any device in the collision domain whose backoff timer expires first
  • those that began transmitting at the same time
05. Which of the following is a drawback of the CSMA/CD access method?
  • Collisions can decrease network performance.
  • It is more complex than non-deterministic protocols.
  • Deterministic media access protocols slow network performance.
  • CSMA/CD LAN technologies are only available at slower speeds than other LAN technologies.
06. Refer to the exhibit. The switch and workstation are administratively configured for full-duplex operation. Which statement accurately reflects the operation of this link?
  • No collisions will occur on this link.
  • Only one of the devices can transmit at a time.
  • The switch will have priority for transmitting data.
  • The devices will default back to half duplex if excessive collisions occur.
07. Why do hosts on an Ethernet segment that experience a collision use a random delay before attempting to transmit a frame?
  • A random delay is used to ensure a collision-free link.
  • A random delay value for each device is assigned by the manufacturer.
  • A standard delay value could not be agreed upon among networking device vendors.
  • A random delay helps prevent the stations from experiencing another collision during the transmission.

08. In the graphic, Host A has reached 50% completion in sending a 1 KB Ethernet frame to Host D when Host B wishes to transmit its own frame to Host C. What must Host B do?
  • Host B can transmit immediately since it is connected on its own cable segment.
  • Host B must wait to receive a CSMA transmission from the hub, to signal its turn.
  • Host B must send a request signal to Host A by transmitting an interframe gap.
  • Host B must wait until it is certain that Host A has completed sending its frame.

09. Ethernet operates at which layers of the OSI model? (Choose two.)
  • Network layer
  • Transport layer
  • Physical layer
  • Application layer
  • Session layer
  • Data-link layer
10. What does the IEEE 802.2 standard represent in Ethernet technologies?
  • MAC sublayer
  • Physical layer
  • Logical Link Control sublayer
  • Network layer
11. Which statements correctly describe MAC addresses? (Choose three.)
  • dynamically assigned
  • copied into RAM during system startup
  • layer 3 address
  • contains a 3 byte OUI
  • 6 bytes long
  • 32 bits long
12. Refer to the exhibit. Host_A is attempting to contact Server_B. Which statements correctly describe the addressing Host_A will generate in the process? (Choose two.)
  • A packet with the destination IP of Router_B.
  • A frame with the destination MAC address of Switch_A.
  • A packet with the destination IP of Router_A.
  • A frame with the destination MAC address of Router_A.
  • A packet with the destination IP of Server_B.
  • A frame with the destination MAC address of Server_B.
13. Host A has an IP address of 172.16.225.93, a mask of 255.255.248.0, and a default gateway of 172.16.224.1. Host A needs to send a packet to a new host whose IP is 172.16.231.78. Host A performs the ANDing operation on its address and subnet mask. What two things will occur? (Choose two.)
  • Host A will get a result of 172.16.224.0 from the AND process.
  • Host A will send on to the media a broadcast frame that contains the packet.
  • Host A will broadcast an ARP request for the MAC of the host 172.16.231.78.
  • Host A will change the destination IP of the packet to 172.16.224.1 and forward the packet.
  • Host A will encapsulate the packet in a frame with a destination MAC that is the MAC address associated with 172.16.224.1.
14. Which two features make switches preferable to hubs in Ethernet-based networks? (Choose two.)
  • reduction in cross-talk
  • minimizing of collisions
  • support for UTP cabling
  • division into broadcast domains
  • increase in the throughput of communications
15. Ethernet operates at which layer of the TCP/IP network model?
  • application
  • physical
  • transport
  • internet
  • data link
  • network access
16. What are three functions of the upper data link sublayer in the OSI model? (Choose three.)
  • recognizes streams of bits
  • identifies the network layer protocol
  • makes the connection with the upper layers
  • identifies the source and destination applications
  • insulates network layer protocols from changes in physical equipment
  • determines the source of a transmission when multiple devices are transmitting
17. What three primary functions does data link layer encapsulation provide? (Choose three.)




  • addressing
  • error detection
  • frame delimiting
  • port identification
  • path determination
  • IP address resolution
18. What are the two most commonly used media types in Ethernet networks today? (Choose two.)
  • coaxial thicknet
  • copper UTP
  • coaxial thinnet
  • optical fiber
  • shielded twisted pair
19. Refer to the exhibit. Which option correctly identifies content that the frame data field may contain?
  • preamble and stop frame
  • network layer packet
  • physical addressing
  • FCS and SoF
20. What is the primary purpose of ARP?
  • translate URLs to IP addresses
  • resolve IPv4 addresses to MAC addresses
  • provide dynamic IP configuration to network devices
  • convert internal private addresses to external public addresses
Disclaimer: This questionnaires are just for revision purpose!

Tuesday, December 22, 2009

CCNA 1 Exploration 4.0 : Module 1 Answers with Explanation

CCNA stands for Cisco Certified Network Associate. This page contains the examination questions and answers of CCNA 1 Module 1 of CCNA Exploration 4.0. All the questions are taken form different pay-sites, blogs and webpages which are offering several question sets. This page doesn't contain 100% actual question. The questions of CCNA are changing continuously. But don't feel sorrow. I think you will get 50% to 100% questions form here in your examination. All the questions and answers are explained here very carefully.

Credits to rancidTaste :)



Question 01
The console port can be used for which of the following? (Choose three.)
  1. debugging.
  2. password recovery.
  3. routing data between networks.
  4. troubleshooting.
  5. connecting one router to another.


Correct answer: 1, 2 and 4
Explanation: By using router console port you can configure router, can set password and recover password, troubleshooting etc. So, options 1, 2 and 4 are the correct answers. But to route data between networks, you need to define routing protocol. So, option 3 is incorrect. To connect one router to another you need a physical medium. There is no use of console port. So, option 5 is incorrect.

Question 02
Select the statements that correctly describe flash memory in a 2600 series router? (Choose two.)
  1. holds the startup configuration by default.
  2. can be upgraded with single in-line memory modules.
  3. stores Cisco IOS software images.
  4. stores routing table information by default.
  5. maintains the only copy of an IOS image after the router is booted.
Correct answer: 2 and 3
Explanation: Flash memory is an erasable, programmable read-only memory which holds operating system image and microcode. It allows software to be updated without removing any chips and content remain when powered down pr restart. For this reason, 2 and 3 are the correct answers.


Question 03
Which of the following are functions of NVRAM? (Choose two.)
  1. stores the routing table.
  2. retains contents when power is removed.
  3. stores the startup configuration file.
  4. contains the running configuration file.
  5. stores the ARP table.

Correct answer: 2 and 3
Explanation: NVRAM stores the backup/startup configuration file for the router. It retains conten when the router is powered down or restarted.

Question 04
Which of the following descriptions are true regarding the management connections on a Cisco router? (Choose three.)
  1. They are non-network connections.
  2. They are used to connect the router to the rest of the production network.
  3. They are synchronous serial ports.
  4. They are used for initial router configuration.
  5. They are asynchronous serial ports.
  6. They are accessed using their assigned IP address.

Correct answer: 1, 2 and 4
Explanation: Management connections of Cisco router are used to configuration router. These are non-network connections. So, option 1, 2 and 4 are the correct answers. Option 3 and 4 are not correct because it's not a synchronous or asynchronous serial ports. Management connections has no IP address. So, option 6 is not also the correct answer. So, options 1, 2 and 4 are the correct answers.

Question 05
An internetwork must include which of the following? (Choose three.)
  1. switching.
  2. static addressing.
  3. IETF standardization.
  4. dynamic or static routing.
  5. consistent end-to-end addressing.
Correct answer: 1, 4 and 5
Explanation: Internetwork includes switching, dynamic or static routing and it's capable of addressing at the end-to-end addressing. So, option 1, 4 and 5 are correct. Internetwork doesn't include IETF standardization or static addressing.

Question 06
Which of the following are functions of RAM? (Choose three.)
  1. contains startup configuration file.
  2. stores routing table.
  3. holds fast switching cache.
  4. retains contents when power is removed.
  5. stores running configuration file.
Correct answer: 2, 3 and 5
Explanation: Cisco RAM has the following characteristics:
  • stores routing information
  • address resolution protocol (ARP)
  • fast-switching cache
  • packet buffering
  • packet hold queues
  • RAM contents are lost if power is down or restarted
  • provides temporary running memory.
For the above reasons, 2, 3 and 5 options are correct.

Question 07
Terminal emulatror software, such as HyperTerminal, can be used to configure a router. Which of the following HyperTerminal options shown in the graphic are correctly set to allow configuration of a Cisco router? (Choose three.)
  1. bits per second.
  2. data bits.
  3. parity.
  4. stop bits.
  5. flow control.
Correct answer: 2 3 and 4

Question 08
Several Ethernet hosts on a LAN need the gateway services of a Cisco 2500 series router. Which of the following would be needed to physically connect a router to all of the hosts on the LAN? (Choose two.)
  1. a crossover cable between the transceiver on a router and a switch.
  2. a crossover cables between a switch and hosts on a LAN.
  3. a straight-through cable between the auxiliary port on a router and a switch.
  4. a rollover cable between the console port on a router and a switch.
  5. straight-through cables between a switch and hosts on a LAN.
  6. a straight-through cable between the transceiver on a router and a switch.
Correct answer: 5 and 6
Explanation:
Straight-through cables are used for the following types of cabling:
  • switch to router
  • switch to PC or server
  • hub to PC or server
Crossover cables are used for the following types of cabling:
  • switch to switch
  • PC to PC
  • hub to hub
  • router to router
  • router to PC
For the above reasons 5 and 6 are the only true answers.

Question 09
Why is a console connection to a router or switch preferred when troubleshooting? (Choose two.)
  1. can be accessed remotely.
  2. does not depend on network services.
  3. displays startup and error messages by default.
  4. does not require special components.
Answer:

Correct answer: 2 and 3
Explanation:  Console connection doesn't depend on networking services. Moreover, by using this type of connection the startup and error message can be easily captured. That's why 2 and 3 are the correct answers. And the others are not true answers.

Question 10
What do routers use to select the best path for outgoing data packets?
  1. ARP tables.
  2. bridging tables.
  3. routing tables.
  4. switching tables.
Correct answer: 3
Explanation: Router has a routing table and the routing table is used for outgoing data packets. So, option 3 is the correct answer.

Question 11
Which of the following tasks can be accomplished through a management connection on a router? (Choose three.)
  1. troubleshooting problems.
  2. monitoring the system.
  3. capturing LAN data packets.
  4. configuring the router.
  5. routing data packets.

Correct answer: 1, 2 and 5
Explanation: By using management connection, you can configure router, troubleshoot and monitor the system. So, 1, 2 and 5 are the correct answers.

Question 12
Which basic components do a router and a standard desktop PC have in common? (Choose three.)
  1. CPU.
  2. hard drive.
  3. input/output interfaces.
  4. keyboard.
  5. monitor.
  6. system bus.

Correct answer: 1, 3 and 6
Explanation: A router doesn't have any monitor, keyboard and hard drive. So, 2, 4 and 5 are the incorrect answer. The correct answers are 1, 3 and 6.

Question 13
Which of the following describes the function of a WAN?
  1. connects peripherals in a single location.
  2. connects multiple networks in a single building.
  3. provides connectivity on a LAN.
  4. provides connectivity over a large geographic area.

Correct answer: 4
Explanation:WAN means Wide Area Network which connects a large geographical area network. So, 4 is the only one correct answer.

Question 14
ABC Company just purchased three new routers to start their company network. Which items are needed to establish a terminal session between a PC and the router for the initial configuration? (Choose three.)
  1. straight-through cable.
  2. terminal emulation software.
  3. rollover cable.
  4. RJ-45 to DB-9 connector.
  5. V.35 cable.

Correct answer: 2 3 and 4
Explanation: To connect a PC and a router, you need one rollover cable, RJ-45 to DB-9 connectors and you need a software which is the terminal emulator software. So, 2, 3 and 4 are the correct answers.

Question 15
During the initial configuration of a 2600 series Cisco router, which cable is required for connecting a PC to the console port?
  1. twisted
  2. crossover
  3. rollover
  4. straight
Correct answer: 3
Explanation: To connect a PC and a router, a crossover cable is used. But when you are configuring your router, then a rollover cable is used. For more explanation, see explanation of question 08.


Question 16
What contains the instructions that a router uses control the flow of traffic through its interfaces?
  1. packet configuration.
  2. configuration files.
  3. flash memory.
  4. internal components.

Correct answer: 2
Explanation: Only the configuration file can control the flow of traffic through its interface.So, option 2 is the correct answer.

Question 17
Which of the followings are true regarding router interfaces? (Choose three.)
  1. provide temporary memory for the router configuration files.
  2. connect the router to the network for packet entry and exit.
  3. can be on the motherboard or a separate module.
  4. hold the IOS image.
  5. connect the router to LANs and WANs.

Correct answer: 2 3 and 5
Explanation: By using a router, you can connect LANs and WANS. So, option 5 is correct. All the interfaces are placed on motherboard. So, option 3 is also correct. By using the interfaces the packets are coming and out. So, option 2 is also correct. So, option 2, 3 and 5 are the correct answers.


Question 18
Which of the following devices are used in the construction of a WAN? (Choose three.)
  1. hubs.
  2. routers.
  3. communication servers.
  4. transceivers.
  5. modems.
  6. multi-port repeaters.
Correct answer: 2 3 and 5
Explanation:
WAN is used to communicate large distance network. So, routers, communication servers and modems are used here. So, 2, 3 and 5 are the correct answers.

Question 19
Which router component holds the configuration file when power is lost?
  1. volatile random access memory.
  2. read only memory.
  3. non-volatile random access memory.
  4. flash memory.

Correct answer: 3
Explanation: See the explanation of question 3.

Question 20
Which of the following layers of the OSI model are incorporated in WAN standards? (Choose two.)
  1. physical layer.
  2. application layer.
  3. transport layer.
  4. data link layer.
  5. session layer.

Correct answer: 1, 4
Explanation: Physical layer, Data Link layer and Network Layer are the incorporated in WAN standards. So, 1 and 4 are the correct answers.

© Written by rancidTaste

Disclaimer: Please use this information wisely. Use it as study reference rather than just copy and paste the answer. 

Thursday, December 10, 2009

Ads: CCNA answer 100% correct

Testpassport professional IT Q&A vendors, provide related CCNA Q&A.

CCNA Questions & Answers are created by our certified senior experts combination PROMETRIC or VUE true-to-date environmental examination of the original title. "CCNA Questions & Answers", including the latest examination of the original title, and with all the correct answers, we promised that the CCNA Q&A coverage of 96%.



  1. 640-721:Implementing Cisco Unified Wireless Networking Essentials (IUWNE)
  2. 640-553:IINS Implementing Cisco IOS Network Security
  3. 640-816:Interconnecting Cisco Networking Devices Part 2
  4. 640-822:Interconnecting Cisco Networking Devices Part 1
  5. 640-802:Cisco Certified Network Associate(CCNA)
  6. 640-821:Introduction to Cisco Networking Technologies
  7. 640-811:Interconnecting Cisco Networking Devices
  8. 640-801:Cisco Certified Network Associate (CCNA)

1. CCNA Questions & Answers are from cooperation exam center of the real original title, summaried by our professional team and collated by senior IT lectured in co-training center to make sure the professional quality of the Q&A. The correctly of the Q&A is 100%, the coverage of CCNA Q&A are more than 96%. All you need to study the whole Q&A before you participate the CCNA certification exam, it should be possible to easily complete the exam and pass the certification.

2. Testpassport to all the Q&A, we promised "do not pass the exam give you a full refund". If you buy our CCNA Q&A and did not pass the exam during the the Q&A update. take the examination report card that stamped with PROMETRIC or VUE test centers Seal. we will refund your full cost of CCNA Q&A, absolutely guarantee you interests have no losses. (For a full refund details)

3. Our CCNA Q&A are update in time is according to the change of factory test. when CCNA Q&A has changed. we will update as "the latest Q&A" in 2 days. And update free for the customers during the Q&A update.
Testpassport certified Q&A network provide the latest CCNA Q&A, ensure you pass the exam at your first try and easy to obtain the certificate.

Official Website: http://www.testpassport.com/CCNA/

Tuesday, October 27, 2009

OCT 2009 CCNA Exploration 4.0 EWAN Chapter 8 - Accessing the WAN

 updated: OCT 2009 by bluefiz 100%  

1. Which two pieces of information are typically found on a logical network diagram? (Choose two.)
- cable types
- connector types
- interface identifiers
- DLCI for virtual circuits

- operating system versions

2. Excessive broadcasts are generally a symptom of a problem at which layer?
- physical
- data link
- network
- transport

3. What is one example of a physical layer problem?
- incorrect encapsulation
- incorrect STP configuration
- incorrect ARP mapping
- incorrect clock rate

4. Which two components should be taken into consideration when establishing a network baseline? (Choose two.)
- information about the network design
- IP addressing allocation on the network
- requirements about the service provider setup
- requirements for access control lists to regulate traffic
- expected performance under normal operating conditions

5. Refer to the exhibit. Which two steps should be taken during the process of creating network documentation? (Choose two.)


- Record the information about the devices discovered in the Campus network only.
- Record the information about the devices discovered in the entire network, including the remote locations.
- Transfer any information about the devices from the network configuration table that corresponds to a component of the topology diagram.

- Transfer only the Layer 2 and Layer 3 information about the devices from the network configuration table that corresponds to a component of the topology diagram.
- Transfer the recorded information about the devices from the network configuration table gathered during peak network utilization that corresponds to a component of the topology diagram.

6. Which two statements are true concerning logical networking models? (Choose two.)
- TCP/IP splits the lowest layer of the OSI model into two separate layers.
- The top layer of the TCP/IP model combines the functions of the top three OSI layers.
- Troubleshooting with the TCP/IP model requires different techniques than with the OSI model.
- The network access layer is responsible for exchanging packets between devices on a TCP/IP network.
- The Internet layer provides communication between applications, such as FTP, HTTP, and SMTP on separate hosts.
- The TCP/IP network access layer corresponds to the OSI physical and data link layers.

7. Clients across the company are reporting poor performance across all corporate applications running in the data center. Internet access and applications running across the corporate WAN are performing normally. The network administrator observes a continual broadcast of random meaningless traffic (jabber) on the application server LAN in the data center on a protocol analyzer. How should the administrator start troubleshooting?
- The jabber in the data center indicates a local physical layer problem. Use the protocol analyzer to determine the source of the jabber, and then check for a recent NIC driver update or bad cabling.
- Because all clients are experiencing application problems, the administrator should use a top-down approach with the application servers in the data center.
- The scope of the problem indicates a likely routing or spanning-tree problem. Begin by checking routing tables, and follow up using appropriate STP show commands to find a loop if routing is working normally.
- Poll the staff to determine if any recent changes have been made. Back out all the changes one by one until the error condition is fixed.

8. Which troubleshooting approach is suggested for dealing with a complex problem that is suspected of being caused by faulty network cabling?
- bottom up
- top down
- divide and conquer
- middle out

9. A technician has been asked to make several changes to the configuration and topology of a network and then determine the outcome of the changes. What tool can be used to determine the overall effect caused by the changes?
- baselining tool
- knowledge base
- protocol analyzer
- cable tester

10. A technician has been asked to troubleshoot an existing switched network but is unable to locate documentation for the VLAN configuration. Which troubleshooting tool allows the technician to map and discover VLAN and port assignments?
- cable analyzer
- network analyzer
- protocol analyzer
- knowledge base

11. Refer to the exhibit. Users on the Internal LAN are unable to connect to the www server. The network administrator pings the server and verifies that NAT is functioning correctly. Which OSI layer should the administrator begin to troubleshoot next?


- physical
- data link
- network
- application

12. When gathering symptoms for troubleshooting a network problem, which step could result in getting an external administrator involved in the process?
- narrowing the scope
- gathering symptoms from suspect devices - analyzing existing symptoms
- determining ownership

13. Refer to the exhibit. Which three pieces of information can be determined by analyzing the output shown? (Choose three.)
- A carrier detect signal is present.
- Keepalives are being received successfully.

- Default encapsulation is used on this serial link.
- Packets passing this interface cannot exceed 1 KB in size.
- The reliability of this link is very low.
- The LCP negotiation phase is complete.

14. Refer to the exhibit. Users at Branch B are reporting trouble accessing a corporate website running on a server that is located at HQ. HQ and Branch A users can access the website. R3 is able to ping 10.10.10.1 successfully but not 10.10.10.2. The users at Branch B can access servers at Branch A. Which two statements are true aboutthe troubleshooting efforts? (Choose two.)

- The web server should be tested for an application layer problem.
- Frame Relay at R3 and R2 should be tested to narrow the scope of the problem.
- The fact that users at Branch A are working normally proves that there is no problem at R2.
- An ACL entry error could cause the failure at Layer 4 in either R3 or R2.
- The successful ping from R3 to R1 proves that the WAN is functioning normally. Therefore, the problem has to be in the upper layers.

15. Users are complaining of very long wait times to access resources on the network. The show interface command reveals collision counts far above the network baseline. At which OSI layer should the administrator begin troubleshooting?
- application
- transport
- network
- data link
- physical

16. Encapsulation errors from mismatched WAN protocols on a serial link between two routers indicate a problem at which OSI layer?
- physical
- data link
- network
- transport

17. What combination of IP address and wildcard mask should be used to specify only the last 8 addresses in the subnet 192.168.3.32/28?
- 192.168.3.32 0.0.0.7
- 192.168.3.32 0.0.0.15
- 192.168.3.40 0.0.0.7
- 192.168.3.40 0.0.0.15

18. A network administrator has received complaints that users on a local LAN can retrieve e-mail from a remote e-mail server but are unable to open web pages on the same server. Services at which two layers of the OSI model should be investigated during the troubleshooting process? (Choose two.)
- physical layer
- data link layer
- network layer
- transport layer
- application layer


19. Information about which OSI layers of connected Cisco devices can be verified with the show cdp neighbors command?
- All layers
- Layer 1, Layer 2, and Layer 3
- Layer 1, Layer 2, Layer 3, and Layer 4
- Layer 6 and Layer 7

20. Which three approaches should be used when attempting to gather data from users for troubleshooting? (Choose three.)
- Determine fault.
- Get to know the user to build trust.
- Obtain information by asking simple pertinent questions.
- Impress the user with use of technical language and skills.
- Determine if the problem is related to time or a specific event.
- Determine if the user can re-create the problem or events leading to the problem.


updated: OCT 2009 by bluefiz 100%
For image version, please send your request to lovestoryhouse@gmail.com. thx.
Disclaimer: This questionnaires are just for revision purpose! 

OCT 2009 CCNA Exploration 4.0 EWAN Chapter 7 - Accessing the WAN

  updated: OCT 2009 by bluefiz 100%

1. Refer to the exhibit. A network technician determines DHCP clients are not working properly. The clients are receiving IP configuration information from a DHCP server configured on the router but cannot access the Internet. From the output in the graphic, what is the most likely problem?

- The DHCP server service is not enabled.
- The inside interface for DCHP is not defined.
- The DHCP pool is not bound to the interface.
- The pool does not have a default router defined for the clients.
- All the host addresses have been excluded from the DHCP pool.

2. Refer to the exhibit. On the basis of the configuration shown, how should the pool of the excluded addresses be assigned to key hosts on the network, such as router interfaces, printers, and servers?

- The addresses are statically assigned by the network administrator.
- The DHCP server dynamically assigns the addresses.
- The addresses must be listed under the DHCP pool of addresses before they are available for static assignment.
- The addresses must be listed under the DHCP pool of addresses before they are available for dynamic assignment.

3. Refer to the exhibit. According to the output, how many addresses have been successfully assigned by this DHCP server?


- 1
- 6
- 7
- 8
-9

4. What are two benefits of NAT? (Choose two.)
- It saves public IP addresses.
- It adds a degree of privacy and security to a network.

- It increases routing performance.
- It makes troubleshooting routing issues easier.
- It makes tunneling with IPsec less complicated.

5. What is true regarding the differences between NAT and PAT?
- PAT uses the word "overload" at the end of the access-list statement to share a single registered address.
- Static NAT allows an unregistered address to map to multiple registered addresses.
- Dynamic NAT allows hosts to receive the same global address each time external access is required.
- PAT uses unique source port numbers to distinguish between translations.

6. What type of NAT should a network administrator use to ensure that a web server on the inside network is always available to the outside network?
- NAT overload
- static NAT
- dynamic NAT
- PAT

7. Refer to the exhibit. Which address or addresses represent the inside global address?


- 10.1.1.2
- 192.168.0.100
- 209.165.20.25
- any address in the 10.1.1.0 network

8. Refer to the exhibit. Which two statements about the configuration are true? (Choose two.)

- Traffic from the 10.1.1.0 network will be translated.
- Traffic from the 209.165.200.0 network will be translated.
- Permitted traffic gets translated to a single inside global IP address.
- A pool of inside global IP addresses from the 10.1.1.0 network will be used for translation.
- External users from the 209.165.200.0 network can reach private addresses on the 10.1.1.0 and 10.1.2.0 networks.

9. Refer to the exhibit. What is the purpose of the command marked with an arrow shown in the partial configuration output of a Cisco broadband router?


- defines which addresses can be translated
- defines which addresses are allowed into the router
- defines which addresses are assigned to a NAT pool
- defines which addresses are allowed out of the router

10. A technician has been told by a supervisor to always clear any dynamic translations before attempting to troubleshoot a failed NAT connection. Why has the supervisor issued these instructions?
- The supervisor wants to clear any confidential information that may be seen by the technician.
- Because entries can be cached for long periods of time, the supervisor wants to prevent decisions being made based on old data.
- The translation table may be full and is unable to make new translations until space is available.
- Clearing the translations causes the starting configuration to be reread and may correct translation problems that have occurred.

11. Refer to the exhibit. Traffic exiting R1 is failing translation. What part of the configuration is most likely incorrect?

- ip nat pool statement
- access-list statement
- ip nat inside is on the wrong interface
- interface s0/0/2 should be a private IP address 
 

12. Refer to the exhibit. A technician used SDM to enter the NAT configuration for a Cisco router. Which statement correctly describes the result of the configuration?

- A user on the inside sees web traffic coming from 192.168.1.3 using port 8080.
- The address 172.16.1.1 is translated into an address from the pool beginning with 192.168.1.3.
- A user on the outside network sees a request addressed from 192.168.1.3 using port 80.
- A user on the outside must address traffic to port 8080 to reach the address 172.16.1.1.
 
13. Refer to the exhibit. How many IPv6 broadcast domains exist in this topology?

- 0
- 1
- 2
- 3
- 4

14. A network administrator wants to connect two IPv6 islands. The easiest way is through a public network that uses only IPv4 equipment. What simple solution solves the problem?
- Replace the devices on the public network with devices that support IPv6.
- Configure RIPng on the border routers of each IPv6 island.
- Configure the routers to take advantage of dual-stack technology.
- Use tunneling to encapsulate the IPv6 traffic in the IPv4 protocol.

15. After activating IPv6 routing on a Cisco router and programming IPv6 addresses on multiple interfaces, what is the remaining step to activate RIPng?
- Enter the interface programming mode for each IPv6 interface and enable IPng RIP.
- Enter the ipv6 router rip name command and then use network statements to activate RIPng on the interfaces.
- Enter the router rip command, and then activate RIPng using the version command. RIPng then automatically runs on all IPv6 interfaces.
- Enter the interface programming mode for each IPv6 interface and enable the multicast group FF02::9, and then activate RIPng globally using the ipv6 router rip name command.

16. Refer to the exhibit. The FTP server has an RFC 1918 private address. Users on the Internet need to connect to the FTP server on the Fa0/0 LAN of R1. Which three configurations must be completed on R1? (Choose three.)

- dynamic NAT
- NAT with overloading
- open port 20
- open port 21

- open port 23
- NAT with port forwarding

17. Refer to the exhibit. R1 is performing NAT for the 10.1.1.0/24 network, and R2 is performing NAT for the 192.168.1.2/24 network. What would be valid destination IP address for HostA to put in its IP header when communicating with the web server?



- 10.1.1.1
- 172.30.20.2
- 192.168.1.2
- 255.255.255.255

18. Refer to the exhibit. Which two addresses could be assigned to traffic leaving S0 as a result of the statement ip nat pool Tampa 179.9.8.96 179.9.8.111 netmask 255.255.255.240? (Choose two.)

- 10.0.0.125
- 179.9.8.95
- 179.9.8.98
- 179.9.8.101

- 179.9.8.112

19. Refer to the exhibit. IPv6 address 2006:1::1/64 eui-64 has been configured on the router FastEthernet0/0 interface. Which statement accurately describes the EUI-64 identifier configuration?

- It will randomly generate a 64 bit interface ID.
- It will assign an address from the pool of IPv6 private addresses to the interface.
- It will assign only the registry prefix of the IPv6 Global Unicast address to the interface.
- The configuration will derive the interface portion of the IPv6 address from the MAC address of the interface.

20. How many bits of an IPv6 address are used to identify the interface ID?
- 32
- 48
- 64
- 128

21. Your organization is issued the IPv6 prefix of 2001:0000:130F::/48 by your service provider. With this prefix, how many bits are available for your organization to create subnetworks?
- 8
- 16
- 80
- 128

 updated: OCT 2009 by bluefiz 100%
For image version, please send your request to lovestoryhouse@gmail.com. thx.
Disclaimer: This questionnaires are just for revision purpose! 
 

OCT 2009 CCNA Exploration 4.0 EWAN Chapter 6 - Accessing the WAN

 updated: OCT 2009 by bluefiz 100%

1. Which two statements about DSL are true? (Choose two.)
- users are on a shared medium
- uses RF signal transmission
- local loop can be up to 3.5 miles (5.5km)
- physical and data link layers are defined by DOCSIS
- user connections are aggregated at a DSLAM located at the CO

2. Which two Layer 1 requirements are outlined in the Data-over-Cable Service Interface Specification (DOCSIS)? (Choose two.)
- channel widths
- access method
- maximum data rate
- modulation techniques
- compression techniques

3. Which two statements are valid solutions for a cable ISP to reduce congestion for users? (Choose two.)
- use higher RF frequencies
- allocate an additional channel
- subdivide the network to reduce users on each segment

- reduce the length of the local loop to 5.5 kilometers or less
- use filters and splitters at the customer site to separate voice from data traffic

4. A technician has been asked to configure a broadband connection for a teleworker. The technician has been instructed that all uploads and downloads for the connection must use existing phone lines. Which broadband technology should be used?
- cable
- DSL
- ISDN
- POTS

5. After conducting research to learn about common remote connection options for teleworkers, a network administrator has decided to implement remote access over broadband to establish VPN connections over the public Internet. What is the result of this solution?
- A reliable connection is established at greater speeds than what is offered from dialup over POTS. Security is increased, but username and password information are sent in plain text.
- The connection has increased security and reliable connectivity. Users need a remote VPN router or VPN client software.
- Security and reliability are increased at a substantial loss in throughput, which is considered acceptable when supporting a single user environment.
- Reliability and security are increased without the need for additional equipment, when compared to dialup connections using POTS.

6. What are the three main functions of a secure VPN? (Choose three.)
- accounting
- authentication
- authorization
- data availability
- data confidentiality
- data integrity

7. Which two methods could an administrator use to authenticate users on a remote access VPN? (Choose two.)
- digital certificates
- ESP
- hashing algorithms
- smart cards
- WPA

8. Data confidentiality through a VPN is achieved through which two methods? (Choose two.)
- digital certificates
- encryption
- encapsulation
- hashing
- passwords

9. Data confidentiality through a VPN can be enhanced through the use of which three encryption protocols? (Choose three.)
- AES
- DES

- AH
- hash
- MPLS
- RSA

10. Which is an example of symmetric-key encryption?
- Diffie-Hellman
- digital certificate
- pre-shared key
- RSA signature

11. Which statement describes cable?
- Delivering services over a cable network requires downstream frequencies in the 50 to 860 MHz range, and upstream frequencies in the 5 to 42 MHz range.
- The cable subscriber must purchase a cable modem termination system (CMTS)
- Each cable subscriber has dedicated upstream and downstream bandwidth.
- Cable subscribers may expect up to 27 Mbps of bandwidth on the upload path.

12. A company is using WiMAX to provide access for teleworkers. What home equipment must the company provide at the teleworker's site?
- a WiMAX tower
- a one-way multicast satellite
- a WiMAX receiver
- an access point connected to the company WLAN

13. Which two features can be associated with the Worldwide Interoperability for Microwave Access (WiMAX) telecommunication technology? (Choose two.)
- supports municipal wireless networks utilizing mesh technologies
- covers areas as large as 7,500 square kilometers
- supports point-to-point links, but not full mobile cellular-type access
- connects directly to the Internet through high-bandwidth connections
- operates at lower speeds than Wi-Fi, but supports many more users

14. While monitoring traffic on a cable network, a technician notes that data is being transmitted at 38 MHz. Which statement describes the situation observed by the technician?
- Data is being transmitted from the subscriber to the headend.
- Data is flowing downstream.
- Cable television transmissions are interfering with voice and data transmissions.
- The system is experiencing congestion in the lower frequency ranges.

15. Refer to the exhibit. All users have a legitimate purpose and the necessary persissions to access the Corporate network. Based on the topology shown, which locations are able to establish VPN connectivity with the Corporate network?


- Locations C, D, and E can support VPN connectivity. Locations A and B require an additional PIX Firewall appliance installed on the edge of the network.
- Locations C and E can support VPN connectivity. Locations A, B, and D require an additional PIX Firewall appliance installed on the edge of the network.
- Locations A, B, D, and E can support VPN connectivity. Location C requires an additional router on the edge of the network.
- All locations can support VPN connectivity.

16. What two protocols provide data authentication and integrity for IPsec? (Choose two.)
- AH
- L2TP
- ESP
- GRE
- PPTP

17. Which two protocols can be used to encapsulate traffic that is traversing a VPN tunnel? (Choose two.)
- ATM
- CHAP
- IPsec
- IPX
- MPLS
- PPTP

18. Refer to the exhibit. A teleworker is connected over the Internet to the HQ Office. What type of secure connection can be established between the teleworker and the HQ Office?

- a GRE tunnel
- a site-to-site VPN
- a remote-access VPN
- the user must be at the office location to establish a secure connection

19. Refer to the exhibit. A VPN tunnel has been established between the HQ Office and the Branch Office over the public Internet. Which three mechanisms are required by the devices on each end of the VPN tunnel to protect the data from being intercepted and modified? (Choose three.)

- The devices must use a dedicated Layer 2 connection.
- The devices must have the VPN client software installed.
- The two parties must inspect the traffic against the same ACLs.
- The two parties must establish a secret key used by encryption and hash algorithms.
- The two parties must agree on the encryption algorithm to be used over the VPN tunnel.
- The devices must be authenticated before the communication path is considered secure.



 updated: OCT 2009 by bluefiz 100%
For image version, please send your request to lovestoryhouse@gmail.com. thx.
Disclaimer: This questionnaires are just for revision purpose!