SlideShare une entreprise Scribd logo
1  sur  6
www.ccnafinal.net www.ccnafinalexam.com www.ccnaanswers.org www.ccna4u.net
                      www.ccna4u.org www.ccna4u.info


CCNA 4 Chapter 6 V4.0 Answers
1. Which two protocols can be used to encapsulate traffic that is traversing a VPN
tunnel? (Choose two.)
ATM
CHAP
IPsec
IPX
MPLS
PPTP


2. What are the three main functions of a secure VPN? (Choose three.)
accounting
authentication
authorization
data availability
data confidentiality
data integrity

3. Data confidentiality through a VPN can be enhanced through the use of which
three encryption protocols? (Choose three.)
AES
DES
AH
hash
MPLS
RSA

4. While monitoring traffic on a cable network, a technician notes that data is being
transmitted at 38 MHz. Which statement describes the situation observed by the
technician?
Data is being transmitted from the subscriber to the headend.
Data is flowing downstream.
Cable television transmissions are interfering with voice and data transmissions.
The system is experiencing congestion in the lower frequency ranges.

5. Which two statements are valid solutions for a cable ISP to reduce congestion for
users? (Choose two.)
use higher RF frequencies
allocate an additional channel
subdivide the network to reduce users on each segment
reduce the length of the local loop to 5.5 kilometers or less
use filters and splitters at the customer site to separate voice from data traffic
www.ccnafinal.net www.ccnafinalexam.com www.ccnaanswers.org www.ccna4u.net
                      www.ccna4u.org www.ccna4u.info

6. Data confidentiality through a VPN is achieved through which two methods?
(Choose two.)
digital certificates
encryption
encapsulation
hashing
passwords

7. What two protocols provide data authentication and integrity for IPsec? (Choose
two.)
AH
L2TP
ESP
GRE
PPTP

8. Which two methods could an administrator use to authenticate users on a remote
access VPN? (Choose two.)
digital certificates
ESP
hashing algorithms
smart cards
WPA

9. Which is an example of symmetric-key encryption?
Diffie-Hellman
digital certificate
pre-shared key
RSA signature

10.




ccna chapter 6

Refer to the exhibit. A teleworker is connected over the Internet to the HQ Office.
What type of secure connection can be established between the teleworker and the
HQ Office?
a GRE tunnel
a site-to-site VPN
www.ccnafinal.net www.ccnafinalexam.com www.ccnaanswers.org www.ccna4u.net
                      www.ccna4u.org www.ccna4u.info

a remote-access VPN
the user must be at the office location to establish a secure connection

11. After conducting research to learn about common remote connection options for
teleworkers, a network administrator has decided to implement remote access over
broadband to establish VPN connections over the public Internet. What is the result
of this solution?
A reliable connection is established at greater speeds than what is offered from dialup
over POTS. Security is increased, but username and password information are sent in
plain text.
The connection has increased security and reliable connectivity. Users need a remote
VPN router or VPN client software.
Security and reliability are increased at a substantial loss in throughput, which is
considered acceptable when supporting a single user environment.
Reliability and security are increased without the need for additional equipment, when
compared to dialup connections using POTS.

12. Which two statements about DSL are true? (Choose two.)
users are on a shared medium
uses RF signal transmission
local loop can be up to 3.5 miles (5.5km)
physical and data link layers are defined by DOCSIS
user connections are aggregated at a DSLAM located at the CO

13. A company is using WiMAX to provide access for teleworkers. What home
equipment must the company provide at the teleworker’s site?
a WiMAX tower
a one-way multicast satellite
a WiMAX receiver
an access point connected to the company WLAN

14. A technician has been asked to configure a broadband connection for a
teleworker. The technician has been instructed that all uploads and downloads for
the connection must use existing phone lines. Which broadband technology should
be used?
cable
DSL
ISDN
POTS

15. Which two Layer 1 requirements are outlined in the Data-over-Cable Service
Interface Specification (DOCSIS)? (Choose two.)
channel widths
access method
maximum data rate
www.ccnafinal.net www.ccnafinalexam.com www.ccnaanswers.org www.ccna4u.net
                      www.ccna4u.org www.ccna4u.info

modulation techniques
compression techniques

16.




ccna 4 chapter 6 answers

Refer to the exhibit. All users have a legitimate purpose and the necessary
permissions to access the Corporate network. Based on the topology shown, which
locations are able to establish VPN connectivity with the Corporate network?
Locations C, D, and E can support VPN connectivity. Locations A and B require an
additional PIX Firewall appliance installed on the edge of the network.
Locations C and E can support VPN connectivity. Locations A, B, and D require an
additional PIX Firewall appliance installed on the edge of the network.
Locations A, B, D, and E can support VPN connectivity. Location C requires an
additional router on the edge of the network.
All locations can support VPN connectivity.

17. Which two features can be associated with the Worldwide Interoperability for
Microwave Access (WiMAX) telecommunication technology? (Choose two.)
supports municipal wireless networks utilizing mesh technologies
www.ccnafinal.net www.ccnafinalexam.com www.ccnaanswers.org www.ccna4u.net
                      www.ccna4u.org www.ccna4u.info

covers areas as large as 7,500 square kilometers
supports point-to-point links, but not full mobile cellular-type access
connects directly to the Internet through high-bandwidth connections
operates at lower speeds than Wi-Fi, but supports many more users

18.




ccna 4 chapter 6

Refer to the exhibit. A VPN tunnel has been established between the HQ Office and
the Branch Office over the public Internet. Which three mechanisms are required
by the devices on each end of the VPN tunnel to protect the data from being
intercepted and modified? (Choose three.)
The devices must use a dedicated Layer 2 connection.
The devices must have the VPN client software installed.
The two parties must inspect the traffic against the same ACLs.
The two parties must establish a secret key used by encryption and hash algorithms.
The two parties must agree on the encryption algorithm to be used over the VPN tunnel.
The devices must be authenticated before the communication path is considered secure.

19. Which statement describes cable?
Delivering services over a cable network requires downstream frequencies in the 50 to
860 MHz range, and upstream frequencies in the 5 to 42 MHz range.
The cable subscriber must purchase a cable modem termination system (CMTS)
Each cable subscriber has dedicated upstream and downstream bandwidth.
Cable subscribers may expect up to 27 Mbps of bandwidth on the upload path.

Taged:
ccna 4 ver 4 chapter 6 exam answers,CCNA v 4 E 1 chapter 2 3 exam question january
2011,ccnafinal net chapter 6 4 0

Related Posts

      •   CCNA 4 Final Exam V4.0 Answers
      •   CCNA 4 Chapter 8 V4.0 Answers
      •   CCNA 4 Chapter 7 V4.0 Answers
www.ccnafinal.net www.ccnafinalexam.com www.ccnaanswers.org www.ccna4u.net
                      www.ccna4u.org www.ccna4u.info

   •   CCNA 4 Chapter 5 V4.0 Answers
   •   CCNA 4 Chapter 4 V4.0 Answers
   •   CCNA 4 Chapter 3 V4.0 Answers
   •   CCNA 4 Chapter 2 V4.0 Answers
   •   CCNA 4 Chapter 1 V4.0 Answers
   •   CCNA 3 Chapter 6 V4.0 Answers
   •   CCNA 4 Final Exam Answers (A)
   •   CCNA 4 Final Exam Answers (C)
   •   CCNA 4 Final Exam Answers (D)
   •   CCNA 4 Final answers (100% Guaranteed – Updated Dec 2010)
   •   CCNA 4 Final exam December 2010
   •   CCNA 4 Final Exam Questions and Answers 2010

Tags: CCNA 4, CCNA 4 Final, CCNA 4 Final Exam, CCNA 4 Final Exam Answers,
ccna 4 final exam answers 2010, ccna 4 final exam answers 2011, CCNA 4 Final Exam
Questions and Answers 2010, ccna final exam answers 4.0, CCNA4 Final, ccna4 final
exam
CCNA 4 Final exam December 2010 →

One Response to CCNA 4 Final Exam Questions and Answers 2010

Contenu connexe

Tendances

19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)
Jeff Green
 
ccna presentation 2013
ccna presentation 2013ccna presentation 2013
ccna presentation 2013
RoHit VashIsht
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)
Jeff Green
 

Tendances (20)

Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Introduction to Mobile IPv6
Introduction to Mobile IPv6Introduction to Mobile IPv6
Introduction to Mobile IPv6
 
Vpn
VpnVpn
Vpn
 
802.1x
802.1x802.1x
802.1x
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "
 
Proxy Mobile IPv6 (PMIPv6)
Proxy Mobile IPv6 (PMIPv6)Proxy Mobile IPv6 (PMIPv6)
Proxy Mobile IPv6 (PMIPv6)
 
Remote access connection
Remote access connection Remote access connection
Remote access connection
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Remote Access
Remote AccessRemote Access
Remote Access
 
Mobile I Pv6
Mobile I Pv6Mobile I Pv6
Mobile I Pv6
 
Ccna exploration exams
Ccna exploration examsCcna exploration exams
Ccna exploration exams
 
VPN presentation
VPN presentationVPN presentation
VPN presentation
 
Secured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRRSecured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRR
 
Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeley
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
 
ccna presentation 2013
ccna presentation 2013ccna presentation 2013
ccna presentation 2013
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)
 

Similaire à Ccna 4 chapter 6 v4.0 answers 2011

Ccna 4 chapter 1 v4.0 answers 2011
Ccna 4 chapter 1 v4.0 answers 2011Ccna 4 chapter 1 v4.0 answers 2011
Ccna 4 chapter 1 v4.0 answers 2011
Dân Chơi
 
Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011
Dân Chơi
 
Ccna 4 chapter 2 v4.0 answers 2011
Ccna 4 chapter 2 v4.0 answers 2011Ccna 4 chapter 2 v4.0 answers 2011
Ccna 4 chapter 2 v4.0 answers 2011
Dân Chơi
 
Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_exam
Đồng Quốc Vương
 
Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5
friv4schoolgames
 
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Đồng Quốc Vương
 
Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5
friv4schoolgames
 
CNv6_instructorPPT_Chapter3.pptx
CNv6_instructorPPT_Chapter3.pptxCNv6_instructorPPT_Chapter3.pptx
CNv6_instructorPPT_Chapter3.pptx
VishalThakor19
 
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Đồng Quốc Vương
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
Erin Rivera
 

Similaire à Ccna 4 chapter 6 v4.0 answers 2011 (20)

Ccna 4 chapter 1 v4.0 answers 2011
Ccna 4 chapter 1 v4.0 answers 2011Ccna 4 chapter 1 v4.0 answers 2011
Ccna 4 chapter 1 v4.0 answers 2011
 
Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011Ccna 3 chapter 1 v4.0 answers 2011
Ccna 3 chapter 1 v4.0 answers 2011
 
Ccna 4 chapter 2 v4.0 answers 2011
Ccna 4 chapter 2 v4.0 answers 2011Ccna 4 chapter 2 v4.0 answers 2011
Ccna 4 chapter 2 v4.0 answers 2011
 
Ccna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 AnswersCcna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 Answers
 
Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011
 
Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_exam
 
CCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxCCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptx
 
Tutorial 1 chapter 1
Tutorial 1 chapter 1Tutorial 1 chapter 1
Tutorial 1 chapter 1
 
Ccna guide
Ccna guideCcna guide
Ccna guide
 
Ccna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 AnswersCcna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 Answers
 
Multi Bandwidth Data path design for 5G Wireless Systems
Multi Bandwidth Data path design for 5G Wireless SystemsMulti Bandwidth Data path design for 5G Wireless Systems
Multi Bandwidth Data path design for 5G Wireless Systems
 
Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5
 
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
 
Ccna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 AnswersCcna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 Answers
 
Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5
 
CNv6_instructorPPT_Chapter3.pptx
CNv6_instructorPPT_Chapter3.pptxCNv6_instructorPPT_Chapter3.pptx
CNv6_instructorPPT_Chapter3.pptx
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
 

Plus de Dân Chơi

Ccna 2 chapter 11 v4.0 answers 2011
Ccna 2 chapter 11 v4.0 answers 2011Ccna 2 chapter 11 v4.0 answers 2011
Ccna 2 chapter 11 v4.0 answers 2011
Dân Chơi
 
Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011
Dân Chơi
 
Ccna 1 chapter 11 v4.0 answers 2011
Ccna 1 chapter 11 v4.0 answers 2011Ccna 1 chapter 11 v4.0 answers 2011
Ccna 1 chapter 11 v4.0 answers 2011
Dân Chơi
 
Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011
Dân Chơi
 
Ccna 1 chapter 6 v4.0 answers 2011
Ccna 1 chapter 6 v4.0 answers 2011Ccna 1 chapter 6 v4.0 answers 2011
Ccna 1 chapter 6 v4.0 answers 2011
Dân Chơi
 
Ccna 1 chapter 5 v4.0 answers 2011
Ccna 1 chapter 5 v4.0 answers 2011Ccna 1 chapter 5 v4.0 answers 2011
Ccna 1 chapter 5 v4.0 answers 2011
Dân Chơi
 
Ccna 2 chapter 2 v4.0 answers 2011
Ccna 2 chapter 2 v4.0 answers 2011Ccna 2 chapter 2 v4.0 answers 2011
Ccna 2 chapter 2 v4.0 answers 2011
Dân Chơi
 
Ccna 2 chapter 5 v4.0 answers 2011
Ccna 2 chapter 5 v4.0 answers 2011Ccna 2 chapter 5 v4.0 answers 2011
Ccna 2 chapter 5 v4.0 answers 2011
Dân Chơi
 
Ccna 3 chapter 2 v4.0 answers 2011
Ccna 3 chapter 2 v4.0 answers 2011Ccna 3 chapter 2 v4.0 answers 2011
Ccna 3 chapter 2 v4.0 answers 2011
Dân Chơi
 
Ccna 3 chapter 4 v4.0 answers 2011
Ccna 3 chapter 4 v4.0 answers 2011Ccna 3 chapter 4 v4.0 answers 2011
Ccna 3 chapter 4 v4.0 answers 2011
Dân Chơi
 
Ccna 3 chapter 3 v4.0 answers 2011
Ccna 3 chapter 3 v4.0 answers 2011Ccna 3 chapter 3 v4.0 answers 2011
Ccna 3 chapter 3 v4.0 answers 2011
Dân Chơi
 
Ccna 3 chapter 6 v4.0 answers 2011
Ccna 3 chapter 6 v4.0 answers 2011Ccna 3 chapter 6 v4.0 answers 2011
Ccna 3 chapter 6 v4.0 answers 2011
Dân Chơi
 
Ccna 2 chapter 8 v4.0 answers 2011
Ccna 2 chapter 8 v4.0 answers 2011Ccna 2 chapter 8 v4.0 answers 2011
Ccna 2 chapter 8 v4.0 answers 2011
Dân Chơi
 
Ccna 2 chapter 7 v4.0 answers 2011
Ccna 2 chapter 7 v4.0 answers 2011Ccna 2 chapter 7 v4.0 answers 2011
Ccna 2 chapter 7 v4.0 answers 2011
Dân Chơi
 
Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011
Dân Chơi
 
Ccna 3 chapter 5 v4.0 answers 2011
Ccna 3 chapter 5 v4.0 answers 2011Ccna 3 chapter 5 v4.0 answers 2011
Ccna 3 chapter 5 v4.0 answers 2011
Dân Chơi
 
Ccna 1 chapter 8 v4.0 answers 2011
Ccna 1 chapter 8 v4.0 answers 2011Ccna 1 chapter 8 v4.0 answers 2011
Ccna 1 chapter 8 v4.0 answers 2011
Dân Chơi
 
Ccna 1 chapter 3 v4.0 answers 100 updated 2011
Ccna 1 chapter 3 v4.0 answers 100 updated 2011Ccna 1 chapter 3 v4.0 answers 100 updated 2011
Ccna 1 chapter 3 v4.0 answers 100 updated 2011
Dân Chơi
 
Ccna 2 chapter 9 v4.0 answers 2011
Ccna 2 chapter 9 v4.0 answers 2011Ccna 2 chapter 9 v4.0 answers 2011
Ccna 2 chapter 9 v4.0 answers 2011
Dân Chơi
 

Plus de Dân Chơi (20)

Chương 1
Chương 1Chương 1
Chương 1
 
Ccna 2 chapter 11 v4.0 answers 2011
Ccna 2 chapter 11 v4.0 answers 2011Ccna 2 chapter 11 v4.0 answers 2011
Ccna 2 chapter 11 v4.0 answers 2011
 
Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011
 
Ccna 1 chapter 11 v4.0 answers 2011
Ccna 1 chapter 11 v4.0 answers 2011Ccna 1 chapter 11 v4.0 answers 2011
Ccna 1 chapter 11 v4.0 answers 2011
 
Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011
 
Ccna 1 chapter 6 v4.0 answers 2011
Ccna 1 chapter 6 v4.0 answers 2011Ccna 1 chapter 6 v4.0 answers 2011
Ccna 1 chapter 6 v4.0 answers 2011
 
Ccna 1 chapter 5 v4.0 answers 2011
Ccna 1 chapter 5 v4.0 answers 2011Ccna 1 chapter 5 v4.0 answers 2011
Ccna 1 chapter 5 v4.0 answers 2011
 
Ccna 2 chapter 2 v4.0 answers 2011
Ccna 2 chapter 2 v4.0 answers 2011Ccna 2 chapter 2 v4.0 answers 2011
Ccna 2 chapter 2 v4.0 answers 2011
 
Ccna 2 chapter 5 v4.0 answers 2011
Ccna 2 chapter 5 v4.0 answers 2011Ccna 2 chapter 5 v4.0 answers 2011
Ccna 2 chapter 5 v4.0 answers 2011
 
Ccna 3 chapter 2 v4.0 answers 2011
Ccna 3 chapter 2 v4.0 answers 2011Ccna 3 chapter 2 v4.0 answers 2011
Ccna 3 chapter 2 v4.0 answers 2011
 
Ccna 3 chapter 4 v4.0 answers 2011
Ccna 3 chapter 4 v4.0 answers 2011Ccna 3 chapter 4 v4.0 answers 2011
Ccna 3 chapter 4 v4.0 answers 2011
 
Ccna 3 chapter 3 v4.0 answers 2011
Ccna 3 chapter 3 v4.0 answers 2011Ccna 3 chapter 3 v4.0 answers 2011
Ccna 3 chapter 3 v4.0 answers 2011
 
Ccna 3 chapter 6 v4.0 answers 2011
Ccna 3 chapter 6 v4.0 answers 2011Ccna 3 chapter 6 v4.0 answers 2011
Ccna 3 chapter 6 v4.0 answers 2011
 
Ccna 2 chapter 8 v4.0 answers 2011
Ccna 2 chapter 8 v4.0 answers 2011Ccna 2 chapter 8 v4.0 answers 2011
Ccna 2 chapter 8 v4.0 answers 2011
 
Ccna 2 chapter 7 v4.0 answers 2011
Ccna 2 chapter 7 v4.0 answers 2011Ccna 2 chapter 7 v4.0 answers 2011
Ccna 2 chapter 7 v4.0 answers 2011
 
Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011
 
Ccna 3 chapter 5 v4.0 answers 2011
Ccna 3 chapter 5 v4.0 answers 2011Ccna 3 chapter 5 v4.0 answers 2011
Ccna 3 chapter 5 v4.0 answers 2011
 
Ccna 1 chapter 8 v4.0 answers 2011
Ccna 1 chapter 8 v4.0 answers 2011Ccna 1 chapter 8 v4.0 answers 2011
Ccna 1 chapter 8 v4.0 answers 2011
 
Ccna 1 chapter 3 v4.0 answers 100 updated 2011
Ccna 1 chapter 3 v4.0 answers 100 updated 2011Ccna 1 chapter 3 v4.0 answers 100 updated 2011
Ccna 1 chapter 3 v4.0 answers 100 updated 2011
 
Ccna 2 chapter 9 v4.0 answers 2011
Ccna 2 chapter 9 v4.0 answers 2011Ccna 2 chapter 9 v4.0 answers 2011
Ccna 2 chapter 9 v4.0 answers 2011
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Ccna 4 chapter 6 v4.0 answers 2011

  • 1. www.ccnafinal.net www.ccnafinalexam.com www.ccnaanswers.org www.ccna4u.net www.ccna4u.org www.ccna4u.info CCNA 4 Chapter 6 V4.0 Answers 1. Which two protocols can be used to encapsulate traffic that is traversing a VPN tunnel? (Choose two.) ATM CHAP IPsec IPX MPLS PPTP 2. What are the three main functions of a secure VPN? (Choose three.) accounting authentication authorization data availability data confidentiality data integrity 3. Data confidentiality through a VPN can be enhanced through the use of which three encryption protocols? (Choose three.) AES DES AH hash MPLS RSA 4. While monitoring traffic on a cable network, a technician notes that data is being transmitted at 38 MHz. Which statement describes the situation observed by the technician? Data is being transmitted from the subscriber to the headend. Data is flowing downstream. Cable television transmissions are interfering with voice and data transmissions. The system is experiencing congestion in the lower frequency ranges. 5. Which two statements are valid solutions for a cable ISP to reduce congestion for users? (Choose two.) use higher RF frequencies allocate an additional channel subdivide the network to reduce users on each segment reduce the length of the local loop to 5.5 kilometers or less use filters and splitters at the customer site to separate voice from data traffic
  • 2. www.ccnafinal.net www.ccnafinalexam.com www.ccnaanswers.org www.ccna4u.net www.ccna4u.org www.ccna4u.info 6. Data confidentiality through a VPN is achieved through which two methods? (Choose two.) digital certificates encryption encapsulation hashing passwords 7. What two protocols provide data authentication and integrity for IPsec? (Choose two.) AH L2TP ESP GRE PPTP 8. Which two methods could an administrator use to authenticate users on a remote access VPN? (Choose two.) digital certificates ESP hashing algorithms smart cards WPA 9. Which is an example of symmetric-key encryption? Diffie-Hellman digital certificate pre-shared key RSA signature 10. ccna chapter 6 Refer to the exhibit. A teleworker is connected over the Internet to the HQ Office. What type of secure connection can be established between the teleworker and the HQ Office? a GRE tunnel a site-to-site VPN
  • 3. www.ccnafinal.net www.ccnafinalexam.com www.ccnaanswers.org www.ccna4u.net www.ccna4u.org www.ccna4u.info a remote-access VPN the user must be at the office location to establish a secure connection 11. After conducting research to learn about common remote connection options for teleworkers, a network administrator has decided to implement remote access over broadband to establish VPN connections over the public Internet. What is the result of this solution? A reliable connection is established at greater speeds than what is offered from dialup over POTS. Security is increased, but username and password information are sent in plain text. The connection has increased security and reliable connectivity. Users need a remote VPN router or VPN client software. Security and reliability are increased at a substantial loss in throughput, which is considered acceptable when supporting a single user environment. Reliability and security are increased without the need for additional equipment, when compared to dialup connections using POTS. 12. Which two statements about DSL are true? (Choose two.) users are on a shared medium uses RF signal transmission local loop can be up to 3.5 miles (5.5km) physical and data link layers are defined by DOCSIS user connections are aggregated at a DSLAM located at the CO 13. A company is using WiMAX to provide access for teleworkers. What home equipment must the company provide at the teleworker’s site? a WiMAX tower a one-way multicast satellite a WiMAX receiver an access point connected to the company WLAN 14. A technician has been asked to configure a broadband connection for a teleworker. The technician has been instructed that all uploads and downloads for the connection must use existing phone lines. Which broadband technology should be used? cable DSL ISDN POTS 15. Which two Layer 1 requirements are outlined in the Data-over-Cable Service Interface Specification (DOCSIS)? (Choose two.) channel widths access method maximum data rate
  • 4. www.ccnafinal.net www.ccnafinalexam.com www.ccnaanswers.org www.ccna4u.net www.ccna4u.org www.ccna4u.info modulation techniques compression techniques 16. ccna 4 chapter 6 answers Refer to the exhibit. All users have a legitimate purpose and the necessary permissions to access the Corporate network. Based on the topology shown, which locations are able to establish VPN connectivity with the Corporate network? Locations C, D, and E can support VPN connectivity. Locations A and B require an additional PIX Firewall appliance installed on the edge of the network. Locations C and E can support VPN connectivity. Locations A, B, and D require an additional PIX Firewall appliance installed on the edge of the network. Locations A, B, D, and E can support VPN connectivity. Location C requires an additional router on the edge of the network. All locations can support VPN connectivity. 17. Which two features can be associated with the Worldwide Interoperability for Microwave Access (WiMAX) telecommunication technology? (Choose two.) supports municipal wireless networks utilizing mesh technologies
  • 5. www.ccnafinal.net www.ccnafinalexam.com www.ccnaanswers.org www.ccna4u.net www.ccna4u.org www.ccna4u.info covers areas as large as 7,500 square kilometers supports point-to-point links, but not full mobile cellular-type access connects directly to the Internet through high-bandwidth connections operates at lower speeds than Wi-Fi, but supports many more users 18. ccna 4 chapter 6 Refer to the exhibit. A VPN tunnel has been established between the HQ Office and the Branch Office over the public Internet. Which three mechanisms are required by the devices on each end of the VPN tunnel to protect the data from being intercepted and modified? (Choose three.) The devices must use a dedicated Layer 2 connection. The devices must have the VPN client software installed. The two parties must inspect the traffic against the same ACLs. The two parties must establish a secret key used by encryption and hash algorithms. The two parties must agree on the encryption algorithm to be used over the VPN tunnel. The devices must be authenticated before the communication path is considered secure. 19. Which statement describes cable? Delivering services over a cable network requires downstream frequencies in the 50 to 860 MHz range, and upstream frequencies in the 5 to 42 MHz range. The cable subscriber must purchase a cable modem termination system (CMTS) Each cable subscriber has dedicated upstream and downstream bandwidth. Cable subscribers may expect up to 27 Mbps of bandwidth on the upload path. Taged: ccna 4 ver 4 chapter 6 exam answers,CCNA v 4 E 1 chapter 2 3 exam question january 2011,ccnafinal net chapter 6 4 0 Related Posts • CCNA 4 Final Exam V4.0 Answers • CCNA 4 Chapter 8 V4.0 Answers • CCNA 4 Chapter 7 V4.0 Answers
  • 6. www.ccnafinal.net www.ccnafinalexam.com www.ccnaanswers.org www.ccna4u.net www.ccna4u.org www.ccna4u.info • CCNA 4 Chapter 5 V4.0 Answers • CCNA 4 Chapter 4 V4.0 Answers • CCNA 4 Chapter 3 V4.0 Answers • CCNA 4 Chapter 2 V4.0 Answers • CCNA 4 Chapter 1 V4.0 Answers • CCNA 3 Chapter 6 V4.0 Answers • CCNA 4 Final Exam Answers (A) • CCNA 4 Final Exam Answers (C) • CCNA 4 Final Exam Answers (D) • CCNA 4 Final answers (100% Guaranteed – Updated Dec 2010) • CCNA 4 Final exam December 2010 • CCNA 4 Final Exam Questions and Answers 2010 Tags: CCNA 4, CCNA 4 Final, CCNA 4 Final Exam, CCNA 4 Final Exam Answers, ccna 4 final exam answers 2010, ccna 4 final exam answers 2011, CCNA 4 Final Exam Questions and Answers 2010, ccna final exam answers 4.0, CCNA4 Final, ccna4 final exam CCNA 4 Final exam December 2010 → One Response to CCNA 4 Final Exam Questions and Answers 2010