SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

CCNA 4 Chapter 1 V4.0

Labels: CCNA 4 Chapter 1 V4.0
1
What are two mechanisms that provide redundancy for server farm
implementations? (Choose two.)

host intrusion prevention systems

virtual private networks

network intrusion prevention systems

Rapid Spanning Tree Protocol

Hot Standby Routing Protocol


2
The ability to connect securely to a private network over a public network is
provided by which WAN technology?

DSL

Frame Relay

ISDN

PSTN

VPN


3
Which three statements describe the functions of the Cisco hierarchical network
design model? (Choose three.)

Route summarization is not necessary at the core and distribution layers.

The distribution layer is responsible for traffic filtering and isolating failures from
the core.

Two goals of the core layer are 100 percent uptime and maximizing throughput.

The access layer provides a means of connecting end devices to the network.

The distribution layer distributes network traffic directly to end users.
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

The core layer usually employs a star topology.


4
A network designer is creating a new network. The design must offer enough
redundancy to provide protection against a single link or device failure, yet must not
be too
complex or expensive to implement. What topology would fill these needs?

star

full mesh

partial mesh

extended star

hub and spoke


5
Refer to the exhibit. If the firewall module has been correctly configured using best
practices for
network security, which statement is true about the security design for the network?

Servers in the network are not protected from internal attacks.

Servers in the DMZ are protected from internal and external attacks.

Servers in the server farm are protected from internal and external attacks.

Traffic from the external networks is not able to access the servers in the DMZ.


6
Which statement is true about a DMZ in a traditional network firewall design?

A DMZ is designed to provide service for external access but not for internal access.

Servers in the DMZ provide limited information that can be accessed from external
networks.

User access to the DMZ from the Internet and the internal network usually is
treated the same way.

All servers in the enterprise network should be located in a DMZ because of enhanced
security measures.
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/


7
download and upload documents on the network file server. What network connection
would be
most cost efficient while still meeting the security and connectivity needs of this
teleworker?

dedicated leased line connection with a dialup backup link

Frame Relay connection with a DSL backup link

DSL VPN connection with a dialup backup link

ATM connection with a DSL VPN backup link

DSL connection with no backup link


8
Refer to the exhibit. The network administrator creates a standard access control list
to prohibit
traffic from the 192.168.1.0/24 network from reaching the 192.168.2.0/24 network
while still
permitting Internet access for all networks. On which router interface and in which
direction
should it be applied?

interface fa0/0, inbound

interface fa0/0, outbound

interface fa0/1, inbound

interface fa0/1, outbound


9
Refer to the exhibit. The server broadcasts an ARP request for the MAC address of its
default
gateway. If STP is not enabled, what is the result of this ARP request?

Router_1 contains the broadcast and replies with the MAC address of the next-hop
router.

Switch_A replies with the MAC address of the Router_1 E0 interface.

Switch_A and Switch_B continuously flood the message onto the network.
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

Switch_B forwards the broadcast request and replies with the Router_1 address.


10
What are two best practices in wireless LAN design to ensure secure wireless
access to the corporate network? (Choose two.)

Configure APs for broadcast SSID.

Place APs as far apart as possible.

Use a separate WLAN for employees.

Configure WPA.

Use wireless routers in all IDFs.


11
In a well-designed, high-availability network, which device significantly affects the
most users if a failure occurs?

desktop PC of the user

large switch in the network core layer

large switch in the network distribution layer

small workgroup switch in the network access layer


12
Which two statements are true regarding network convergence? (Choose two.)

In a large network, using the EIGRP or OSPF routing protocols rather than RIPv2
may
improve convergence time.

Using STP at the core layer improves convergence time by allowing the use of
redundant links between devices.

Route summarization improves convergence time by minimizing the size of the
routing
table.

A full mesh topology improves convergence time by allowing load balancing.

ACLs can be configured to improve convergence time.
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/



13
Centralizing servers in a data center server farm can provide which benefit over a
distributed server environment?

It keeps client-to-server traffic local to a single subnet.

Servers located in a data center require less bandwidth.

It is easier to filter and prioritize traffic to and from the data center.

Server farms are not subject to denial of service attacks.


14
Refer to the exhibit. What effect does the ACL shown have on network traffic,
assuming that it is
correctly applied to the interface?

All traffic to network 172.16.0.0 is denied.

All TCP traffic is denied to and from network 172.16.0.0.

All Telnet traffic from the 172.16.0.0 network to any destination is denied.

All port 23 traffic to the 172.16.0.0 network is denied.

All traffic from the 172.16.0.0 network is denied to any other network.


15
Which Cisco IOS function can be configured at the distribution layer to filter
unwanted traffic and provide traffic management?

virus protection

spyware protection

VPNs

access control lists


16
What kind of ACL inspects outbound UDP, TCP, and ICMP traffic and allows
inbound access only to traffic that belongs to these established sessions?
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

dynamic ACL

time-based ACL

reflexive ACL

lock and key ACL


17
Which three functions are performed at the distribution layer of the hierarchical
network model? (Choose three.)

summarizing routes from the access layer

allowing end users to access the local network

providing the gateway of last resort for core layer devices

preserving bandwidth at the access layer by filtering network functions

isolating network problems to prevent them from affecting the core layer

utilizing redundant links for load balancing to increase available bandwidth


18
Refer to the exhibit. Which two devices are part of the access design layer? (Choose
two.)

Edge2

ISP4

BR4

FC-AP

FC-CPE-1

FC-ASW-2


19
What is true about implementing a centralized server farm topology?

requires direct cabling from the MPOE to enhance the performance of servers
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

requires the addition of high-capacity switches to each workgroup

provides defined entry and exit points so that filtering and securing traffic is easier

allows for placement of workgroup servers at the access layer


20
Refer to the exhibit. What happens when Host 1 attempts to send data?

Frames from Host 1 are dropped, but no other action is taken.

Frames from Host 1 cause the interface to shut down, and a log message is sent.

Frames from Host 1 are forwarded, but a log message is sent.

Frames from Host 1 are forwarded, and the mac-address table is updated.


21
Which two considerations are valid when designing access layer security?(Choose
two.)

In a large wireless network, the most efficient method to secure the WLAN is MAC
address filtering.

DoS attacks are normally launched against end-user PCs and can be mitigated by
installing personal firewalls on all company PCs.

SSH is more secure than Telnet to administer network devices.

Disabling unused ports on the switches helps prevent unauthorized access to the
network.

All Telnet passwords are at least 6 characters long.


22
What address can be used to summarize only networks 172.16.0.0/24,
172.16.1.0/24, 172.16.2.0/24, and 172.16.3.0/24?

172.16.0.0/21

172.16.0.0/22

172.16.0.0 255.255.255.248

172.16.0.0 255.255.254.0
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/



23
Which two items in a physical WLAN design can be identified through a site
survey? (Choose two.)

the types of antennas that are required

the encryption techniques that are required

the access point hardware that is required

the different levels of access that are required

the connection reliability that is required


24
Refer to the exhibit. Which two statements correctly describe the benefits of the
network access
layer design that is shown? (Choose two.)

If host A sends a broadcast message, only hosts in VLAN10 receive the broadcast
frame.

If host A attempts to transmit data at the same time as another host, only hosts in
VLAN10 are affected by the collision.

Segmenting all voice traffic on a separate VLAN facilitates the implementation of
QoS.

VLANs improve network performance by facilitating the use of route
summarization.

VLANs at the access layer help guarantee network availability by facilitating load
balancing.


25
What are three ways to ensure that an unwanted user does not connect to a
wireless network and view the data? (Choose three.)

Disable SSID broadcasting.

Configure filters to restrict IP addresses.

Use authentication between clients and the wireless device.
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

Use NetBIOS name filtering between clients and the wireless device.

Configure strong encryption such as WPA.

Use a WEP compression method.

Contenu connexe

Tendances

Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2Anne Starr
 
Ch 01 --- introduction to sdn-nfv
Ch 01 --- introduction to sdn-nfvCh 01 --- introduction to sdn-nfv
Ch 01 --- introduction to sdn-nfvYoram Orzach
 
Integrating Multimedia Services Over Software Defined Networking
Integrating Multimedia Services Over Software Defined NetworkingIntegrating Multimedia Services Over Software Defined Networking
Integrating Multimedia Services Over Software Defined NetworkingIRJET Journal
 
Campas network design overview
Campas network design overviewCampas network design overview
Campas network design overviewAnushka Hapuhinna
 
Linux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic ControlLinux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic Controlsandy_vasan
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training PresentationRohit Singh
 
SDN Fundamentals - short presentation
SDN Fundamentals -  short presentationSDN Fundamentals -  short presentation
SDN Fundamentals - short presentationAzhar Khuwaja
 
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...Rambus
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...Tarun Khaneja
 
The NFV, SDN & Wireless Network Infrastructure Market: 2015 - 2020 - Opportun...
The NFV, SDN & Wireless Network Infrastructure Market: 2015 - 2020 - Opportun...The NFV, SDN & Wireless Network Infrastructure Market: 2015 - 2020 - Opportun...
The NFV, SDN & Wireless Network Infrastructure Market: 2015 - 2020 - Opportun...LeeSam111
 
summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer Dheeraj Giri
 
Cto’s guide to sdn, nfv and vnf
Cto’s guide to sdn, nfv and vnfCto’s guide to sdn, nfv and vnf
Cto’s guide to sdn, nfv and vnfPaulo R
 
Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015AFCEA International
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Security of software defined networking (sdn) and  cognitive radio network (crn)Security of software defined networking (sdn) and  cognitive radio network (crn)
Security of software defined networking (sdn) and cognitive radio network (crn)Ameer Sameer
 

Tendances (20)

Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2
 
Ch 01 --- introduction to sdn-nfv
Ch 01 --- introduction to sdn-nfvCh 01 --- introduction to sdn-nfv
Ch 01 --- introduction to sdn-nfv
 
Integrating Multimedia Services Over Software Defined Networking
Integrating Multimedia Services Over Software Defined NetworkingIntegrating Multimedia Services Over Software Defined Networking
Integrating Multimedia Services Over Software Defined Networking
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
Campas network design overview
Campas network design overviewCampas network design overview
Campas network design overview
 
Linux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic ControlLinux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic Control
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
 
SDN Fundamentals - short presentation
SDN Fundamentals -  short presentationSDN Fundamentals -  short presentation
SDN Fundamentals - short presentation
 
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
 
The NFV, SDN & Wireless Network Infrastructure Market: 2015 - 2020 - Opportun...
The NFV, SDN & Wireless Network Infrastructure Market: 2015 - 2020 - Opportun...The NFV, SDN & Wireless Network Infrastructure Market: 2015 - 2020 - Opportun...
The NFV, SDN & Wireless Network Infrastructure Market: 2015 - 2020 - Opportun...
 
Kurose ross wi_fi
Kurose ross wi_fiKurose ross wi_fi
Kurose ross wi_fi
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer
 
Cto’s guide to sdn, nfv and vnf
Cto’s guide to sdn, nfv and vnfCto’s guide to sdn, nfv and vnf
Cto’s guide to sdn, nfv and vnf
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Security of software defined networking (sdn) and  cognitive radio network (crn)Security of software defined networking (sdn) and  cognitive radio network (crn)
Security of software defined networking (sdn) and cognitive radio network (crn)
 

En vedette

Ccna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 AnswersCcna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 Answersccna4discovery
 
Mikroformáty aneb jak z počítače udělat vševědoucího brouka Pytlíka
Mikroformáty aneb jak z počítače udělat vševědoucího brouka PytlíkaMikroformáty aneb jak z počítače udělat vševědoucího brouka Pytlíka
Mikroformáty aneb jak z počítače udělat vševědoucího brouka PytlíkaMartin Hassman
 
V čem je tvorba rozšíření v Google Chrome lepší než ve Firefoxu?
V čem je tvorba rozšíření v Google Chrome lepší než ve Firefoxu?V čem je tvorba rozšíření v Google Chrome lepší než ve Firefoxu?
V čem je tvorba rozšíření v Google Chrome lepší než ve Firefoxu?Martin Hassman
 
Sensor connected health eco systems ready to play
Sensor connected health eco systems ready to playSensor connected health eco systems ready to play
Sensor connected health eco systems ready to playJames Burns
 
Games With Sensors: CommonSenses - A proposed health game platform
Games With Sensors: CommonSenses - A proposed health game platformGames With Sensors: CommonSenses - A proposed health game platform
Games With Sensors: CommonSenses - A proposed health game platformJames Burns
 
Games for health 2012: My Sensor Said So: What Personal Biometric Sensors Can...
Games for health 2012: My Sensor Said So: What Personal Biometric Sensors Can...Games for health 2012: My Sensor Said So: What Personal Biometric Sensors Can...
Games for health 2012: My Sensor Said So: What Personal Biometric Sensors Can...James Burns
 
Cisco 100-101 Exam Questions and Answers
Cisco 100-101 Exam Questions and AnswersCisco 100-101 Exam Questions and Answers
Cisco 100-101 Exam Questions and Answersadam_jhon
 
Virtualization Questions
Virtualization QuestionsVirtualization Questions
Virtualization QuestionsTrupti Jethva
 
Top 7 system administrator interview questions answers
Top 7 system administrator interview questions answersTop 7 system administrator interview questions answers
Top 7 system administrator interview questions answersSuccessSecrets247
 

En vedette (10)

Ccna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 AnswersCcna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 Answers
 
Mikroformáty aneb jak z počítače udělat vševědoucího brouka Pytlíka
Mikroformáty aneb jak z počítače udělat vševědoucího brouka PytlíkaMikroformáty aneb jak z počítače udělat vševědoucího brouka Pytlíka
Mikroformáty aneb jak z počítače udělat vševědoucího brouka Pytlíka
 
V čem je tvorba rozšíření v Google Chrome lepší než ve Firefoxu?
V čem je tvorba rozšíření v Google Chrome lepší než ve Firefoxu?V čem je tvorba rozšíření v Google Chrome lepší než ve Firefoxu?
V čem je tvorba rozšíření v Google Chrome lepší než ve Firefoxu?
 
Sensor connected health eco systems ready to play
Sensor connected health eco systems ready to playSensor connected health eco systems ready to play
Sensor connected health eco systems ready to play
 
Games With Sensors: CommonSenses - A proposed health game platform
Games With Sensors: CommonSenses - A proposed health game platformGames With Sensors: CommonSenses - A proposed health game platform
Games With Sensors: CommonSenses - A proposed health game platform
 
Games for health 2012: My Sensor Said So: What Personal Biometric Sensors Can...
Games for health 2012: My Sensor Said So: What Personal Biometric Sensors Can...Games for health 2012: My Sensor Said So: What Personal Biometric Sensors Can...
Games for health 2012: My Sensor Said So: What Personal Biometric Sensors Can...
 
Energy 1
Energy 1Energy 1
Energy 1
 
Cisco 100-101 Exam Questions and Answers
Cisco 100-101 Exam Questions and AnswersCisco 100-101 Exam Questions and Answers
Cisco 100-101 Exam Questions and Answers
 
Virtualization Questions
Virtualization QuestionsVirtualization Questions
Virtualization Questions
 
Top 7 system administrator interview questions answers
Top 7 system administrator interview questions answersTop 7 system administrator interview questions answers
Top 7 system administrator interview questions answers
 

Similaire à Ccna 4 Chapter 1 V4.0 Answers

Ccna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 AnswersCcna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 Answersccna4discovery
 
Ccna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 AnswersCcna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 Answersccna4discovery
 
CCNA 1 v6.0 Final Exam Answers Option B 2018
CCNA 1 v6.0 Final Exam Answers Option B  2018CCNA 1 v6.0 Final Exam Answers Option B  2018
CCNA 1 v6.0 Final Exam Answers Option B 2018Download Mipdfcom
 
Ccna 4 chapter 1 v4.0 answers 2011
Ccna 4 chapter 1 v4.0 answers 2011Ccna 4 chapter 1 v4.0 answers 2011
Ccna 4 chapter 1 v4.0 answers 2011Dân Chơi
 
Ccna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 AnswersCcna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 Answersccna4discovery
 
Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011Dân Chơi
 
Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5friv4schoolgames
 
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014Đồng Quốc Vương
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesIJCNCJournal
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reportsShakib Ansaar
 
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answersCcnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answersĐồng Quốc Vương
 
Ch18 Internet Security
Ch18 Internet SecurityCh18 Internet Security
Ch18 Internet Securityphanleson
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesVamsi Krishna Kalavala
 
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014Đồng Quốc Vương
 

Similaire à Ccna 4 Chapter 1 V4.0 Answers (20)

Examen1ccna3v5.0
Examen1ccna3v5.0Examen1ccna3v5.0
Examen1ccna3v5.0
 
Ccna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 AnswersCcna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 Answers
 
Ccna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 AnswersCcna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 Answers
 
Ccna 2 chapter 1 2014 v5
Ccna 2 chapter 1 2014 v5Ccna 2 chapter 1 2014 v5
Ccna 2 chapter 1 2014 v5
 
Ccna1 presentation
Ccna1 presentationCcna1 presentation
Ccna1 presentation
 
CCNA 1 Chapter 11 v5.0 2014
CCNA 1 Chapter 11 v5.0 2014CCNA 1 Chapter 11 v5.0 2014
CCNA 1 Chapter 11 v5.0 2014
 
lecciones ccna3
lecciones ccna3lecciones ccna3
lecciones ccna3
 
CCNA 1 v6.0 Final Exam Answers Option B 2018
CCNA 1 v6.0 Final Exam Answers Option B  2018CCNA 1 v6.0 Final Exam Answers Option B  2018
CCNA 1 v6.0 Final Exam Answers Option B 2018
 
Ccna 4 chapter 1 v4.0 answers 2011
Ccna 4 chapter 1 v4.0 answers 2011Ccna 4 chapter 1 v4.0 answers 2011
Ccna 4 chapter 1 v4.0 answers 2011
 
Ccna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 AnswersCcna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 Answers
 
Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011
 
Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5
 
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devices
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answersCcnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
 
Ch18 Internet Security
Ch18 Internet SecurityCh18 Internet Security
Ch18 Internet Security
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
Ccna report
Ccna reportCcna report
Ccna report
 
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
 

Plus de ccna4discovery

Ccna 4 Chapter 9 V4.0 Answers
Ccna 4 Chapter 9 V4.0 AnswersCcna 4 Chapter 9 V4.0 Answers
Ccna 4 Chapter 9 V4.0 Answersccna4discovery
 
Ccna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 AnswersCcna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 Answersccna4discovery
 
Ccna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 AnswersCcna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 Answersccna4discovery
 
Ccna 3 Final V4.0 Answers
Ccna 3 Final V4.0 AnswersCcna 3 Final V4.0 Answers
Ccna 3 Final V4.0 Answersccna4discovery
 
Ccna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 AnswersCcna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 Answersccna4discovery
 
Ccna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 AnswersCcna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 Answersccna4discovery
 
Ccna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 AnswersCcna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 Answersccna4discovery
 
Ccna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 AnswersCcna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 Answersccna4discovery
 

Plus de ccna4discovery (8)

Ccna 4 Chapter 9 V4.0 Answers
Ccna 4 Chapter 9 V4.0 AnswersCcna 4 Chapter 9 V4.0 Answers
Ccna 4 Chapter 9 V4.0 Answers
 
Ccna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 AnswersCcna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 Answers
 
Ccna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 AnswersCcna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 Answers
 
Ccna 3 Final V4.0 Answers
Ccna 3 Final V4.0 AnswersCcna 3 Final V4.0 Answers
Ccna 3 Final V4.0 Answers
 
Ccna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 AnswersCcna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 Answers
 
Ccna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 AnswersCcna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 Answers
 
Ccna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 AnswersCcna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 Answers
 
Ccna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 AnswersCcna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 Answers
 

Dernier

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Dernier (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Ccna 4 Chapter 1 V4.0 Answers

  • 1. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ CCNA 4 Chapter 1 V4.0 Labels: CCNA 4 Chapter 1 V4.0 1 What are two mechanisms that provide redundancy for server farm implementations? (Choose two.) host intrusion prevention systems virtual private networks network intrusion prevention systems Rapid Spanning Tree Protocol Hot Standby Routing Protocol 2 The ability to connect securely to a private network over a public network is provided by which WAN technology? DSL Frame Relay ISDN PSTN VPN 3 Which three statements describe the functions of the Cisco hierarchical network design model? (Choose three.) Route summarization is not necessary at the core and distribution layers. The distribution layer is responsible for traffic filtering and isolating failures from the core. Two goals of the core layer are 100 percent uptime and maximizing throughput. The access layer provides a means of connecting end devices to the network. The distribution layer distributes network traffic directly to end users.
  • 2. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ The core layer usually employs a star topology. 4 A network designer is creating a new network. The design must offer enough redundancy to provide protection against a single link or device failure, yet must not be too complex or expensive to implement. What topology would fill these needs? star full mesh partial mesh extended star hub and spoke 5 Refer to the exhibit. If the firewall module has been correctly configured using best practices for network security, which statement is true about the security design for the network? Servers in the network are not protected from internal attacks. Servers in the DMZ are protected from internal and external attacks. Servers in the server farm are protected from internal and external attacks. Traffic from the external networks is not able to access the servers in the DMZ. 6 Which statement is true about a DMZ in a traditional network firewall design? A DMZ is designed to provide service for external access but not for internal access. Servers in the DMZ provide limited information that can be accessed from external networks. User access to the DMZ from the Internet and the internal network usually is treated the same way. All servers in the enterprise network should be located in a DMZ because of enhanced security measures.
  • 3. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ 7 download and upload documents on the network file server. What network connection would be most cost efficient while still meeting the security and connectivity needs of this teleworker? dedicated leased line connection with a dialup backup link Frame Relay connection with a DSL backup link DSL VPN connection with a dialup backup link ATM connection with a DSL VPN backup link DSL connection with no backup link 8 Refer to the exhibit. The network administrator creates a standard access control list to prohibit traffic from the 192.168.1.0/24 network from reaching the 192.168.2.0/24 network while still permitting Internet access for all networks. On which router interface and in which direction should it be applied? interface fa0/0, inbound interface fa0/0, outbound interface fa0/1, inbound interface fa0/1, outbound 9 Refer to the exhibit. The server broadcasts an ARP request for the MAC address of its default gateway. If STP is not enabled, what is the result of this ARP request? Router_1 contains the broadcast and replies with the MAC address of the next-hop router. Switch_A replies with the MAC address of the Router_1 E0 interface. Switch_A and Switch_B continuously flood the message onto the network.
  • 4. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ Switch_B forwards the broadcast request and replies with the Router_1 address. 10 What are two best practices in wireless LAN design to ensure secure wireless access to the corporate network? (Choose two.) Configure APs for broadcast SSID. Place APs as far apart as possible. Use a separate WLAN for employees. Configure WPA. Use wireless routers in all IDFs. 11 In a well-designed, high-availability network, which device significantly affects the most users if a failure occurs? desktop PC of the user large switch in the network core layer large switch in the network distribution layer small workgroup switch in the network access layer 12 Which two statements are true regarding network convergence? (Choose two.) In a large network, using the EIGRP or OSPF routing protocols rather than RIPv2 may improve convergence time. Using STP at the core layer improves convergence time by allowing the use of redundant links between devices. Route summarization improves convergence time by minimizing the size of the routing table. A full mesh topology improves convergence time by allowing load balancing. ACLs can be configured to improve convergence time.
  • 5. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ 13 Centralizing servers in a data center server farm can provide which benefit over a distributed server environment? It keeps client-to-server traffic local to a single subnet. Servers located in a data center require less bandwidth. It is easier to filter and prioritize traffic to and from the data center. Server farms are not subject to denial of service attacks. 14 Refer to the exhibit. What effect does the ACL shown have on network traffic, assuming that it is correctly applied to the interface? All traffic to network 172.16.0.0 is denied. All TCP traffic is denied to and from network 172.16.0.0. All Telnet traffic from the 172.16.0.0 network to any destination is denied. All port 23 traffic to the 172.16.0.0 network is denied. All traffic from the 172.16.0.0 network is denied to any other network. 15 Which Cisco IOS function can be configured at the distribution layer to filter unwanted traffic and provide traffic management? virus protection spyware protection VPNs access control lists 16 What kind of ACL inspects outbound UDP, TCP, and ICMP traffic and allows inbound access only to traffic that belongs to these established sessions?
  • 6. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ dynamic ACL time-based ACL reflexive ACL lock and key ACL 17 Which three functions are performed at the distribution layer of the hierarchical network model? (Choose three.) summarizing routes from the access layer allowing end users to access the local network providing the gateway of last resort for core layer devices preserving bandwidth at the access layer by filtering network functions isolating network problems to prevent them from affecting the core layer utilizing redundant links for load balancing to increase available bandwidth 18 Refer to the exhibit. Which two devices are part of the access design layer? (Choose two.) Edge2 ISP4 BR4 FC-AP FC-CPE-1 FC-ASW-2 19 What is true about implementing a centralized server farm topology? requires direct cabling from the MPOE to enhance the performance of servers
  • 7. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ requires the addition of high-capacity switches to each workgroup provides defined entry and exit points so that filtering and securing traffic is easier allows for placement of workgroup servers at the access layer 20 Refer to the exhibit. What happens when Host 1 attempts to send data? Frames from Host 1 are dropped, but no other action is taken. Frames from Host 1 cause the interface to shut down, and a log message is sent. Frames from Host 1 are forwarded, but a log message is sent. Frames from Host 1 are forwarded, and the mac-address table is updated. 21 Which two considerations are valid when designing access layer security?(Choose two.) In a large wireless network, the most efficient method to secure the WLAN is MAC address filtering. DoS attacks are normally launched against end-user PCs and can be mitigated by installing personal firewalls on all company PCs. SSH is more secure than Telnet to administer network devices. Disabling unused ports on the switches helps prevent unauthorized access to the network. All Telnet passwords are at least 6 characters long. 22 What address can be used to summarize only networks 172.16.0.0/24, 172.16.1.0/24, 172.16.2.0/24, and 172.16.3.0/24? 172.16.0.0/21 172.16.0.0/22 172.16.0.0 255.255.255.248 172.16.0.0 255.255.254.0
  • 8. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ 23 Which two items in a physical WLAN design can be identified through a site survey? (Choose two.) the types of antennas that are required the encryption techniques that are required the access point hardware that is required the different levels of access that are required the connection reliability that is required 24 Refer to the exhibit. Which two statements correctly describe the benefits of the network access layer design that is shown? (Choose two.) If host A sends a broadcast message, only hosts in VLAN10 receive the broadcast frame. If host A attempts to transmit data at the same time as another host, only hosts in VLAN10 are affected by the collision. Segmenting all voice traffic on a separate VLAN facilitates the implementation of QoS. VLANs improve network performance by facilitating the use of route summarization. VLANs at the access layer help guarantee network availability by facilitating load balancing. 25 What are three ways to ensure that an unwanted user does not connect to a wireless network and view the data? (Choose three.) Disable SSID broadcasting. Configure filters to restrict IP addresses. Use authentication between clients and the wireless device.
  • 9. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ Use NetBIOS name filtering between clients and the wireless device. Configure strong encryption such as WPA. Use a WEP compression method.