SlideShare a Scribd company logo
1 of 9
Download to read offline
CCNA-4-Answers.blogspot.com



CCNA 4 Answers
CCNA 4 Answers, CCNA 1 Version 4.0 Answers, CCNA 2 Version 4.0 Answers,
CCNA 3 Version 4.0 Answers, CCNA 4 Version 4.0 Answers, CCNA 1 Final Version
4.0 Answers, CCNA 2 Final Version 4.0 Answers, CCNA 3 Final Version 4.0
Answers, CCNA 4 Final Version 4.0 Answers

Showing posts with label CCNA 2 Module 1 Version 4.0 Answers.
Show all posts
Showing posts with label CCNA 2 Module 1 Version 4.0 Answers.
Show all posts

CCNA 2 Module 1 Version 4.0 Answers

1. If a router cannot find a valid configuration file during the startup
sequence, what will occur?

The startup sequence will reset.
*The router will prompt the user for a response to enter setup mode.
The startup sequence will halt until a valid configuration file is acquired.
The router will generate a default configuration file based on the last
valid configuration.
The router will monitor local traffic to determine routing protocol
configuration requirements.

2.

Refer to the exhibit. The network administrator has configured the router
with the interface IP addresses shown for the directly connected
networks. Pings from the router to hosts on the connected networks or
pings between router interfaces are not working. What is the most likely
problem?


The destination networks do not exist.
The IP addresses on the router interfaces must be configured as network
addresses and not host addresses.
* The interfaces must be enabled with the no shutdown command.
Each interface must be configured with the clock rate command.

3.
CCNA-4-Answers.blogspot.com

Refer to the exhibit. What can be concluded from the routing table output
in the exhibit? (Choose two.)


This router only has two interfaces.
The router interfaces are not operational yet.
This router is configured to forward packets to remote networks.
* The FastEthernet0/0 and Serial0/0/0 interfaces of this router were
configured with an IP address and the no shutdown command.
* An IP packet received by this router with a destination address of
198.18.9.1 will be forwarded out of the Serial0/0/0 interface.

4.

Refer to the exhibit. The frame shown in the exhibit was received by the
router. The router interfaces are operational. How will the router process
this frame? (Choose two.)

The router will change the source and destination IP address in the packet
before forwarding the frame.
* The router will change the frame type to one supported by the WAN
link before forwarding the frame.
The router will use the destination MAC address to determine which
interface to forward the packet.
The router will look up the MAC address of the S0/0/0 interface in the
ARP table and add it to the frame before forwarding.
* The frame was received on the Fa0/0 interface of the router and will be
switched to the S0/0/0 interface.
The frame was received on the S0/0/0 interface of the router and will be
switched to the Fa0/0 interface.

5.
Passwords can be used to restrict access to all or parts of the Cisco IOS.
Select the modes and interfaces that can be protected with passwords.
(Choose three.)


* VTY interface
* console interface
Ethernet interface
secret EXEC mode
* privileged EXEC mode
router configuration mode
CCNA-4-Answers.blogspot.com


6.
Which two statements correctly describe the components of a router?
(Choose two.)

RAM permanently stores the configuration file used during the boot
sequence.
* ROM contains diagnostics executed on hardware modules.
NVRAM stores a backup copy of the IOS used during the boot sequence.
* Flash memory does not lose its contents during a reboot.
ROM contains the most current and most complete version of the IOS.
Flash contains boot system commands to identify the location of the IOS

7.

Refer to the exhibit. After host 2 is connected to the switch on the LAN,
host 2 is unable to communicate with host 1. What is the cause of this
problem?

The subnet mask of host 2 is incorrect.
* Host 1 and host 2 are on different networks.
The switch needs an IP address that is not configured.
The router LAN interface and host 1 are on different networks.
The IP address of host 1 is on a different network than is the LAN
interface of the router.

8. Which are functions of a router? (Choose three.)

* packet switching
extension of network segments
* segmentation of broadcast domains
* selection of best path based on logical addressing
election of best path based on physical addressing

9.

Refer to the exhibit. All routers have a route in its routing table to each
network that is shown in the exhibit. Default routes have not been issued
on these routers. What can be concluded about how packets are
forwarded in this network? (Choose two.)

If RouterC receives a packet that is destined for 10.5.1.1, it will be
forwarded out interface Fa0/0.
CCNA-4-Answers.blogspot.com

* If RouterA receives a packet that is destined for 192.168.3.146, it will
be forwarded out interface S0/0/1.
* If RouterB receives a packet that is destined for 10.5.27.15, it will be
forwarded out interface S0/0/1.
If RouterB receives a packet that is destined for 172.20.255.1, it will be
forwarded out interface S0/0/0.
If RouterC receives a packet that is destined for 192.16.5.101, it will be
forwarded out interface S0/0/1.


10.

The serial connection shown in the graphic needs to be configured.
Which configuration commands must be made on the Sydney router to
establish connectivity with the Melbourne site? (Choose three.)
* Sydney(config-if)# ip address 201.100.53.2 255.255.255.0
* Sydney(config-if)# no shutdown
Sydney(config-if)# ip address 201.100.53.1 255.255.255.224
* Sydney(config-if)# clock rate 56000
Sydney(config-if)# ip host Melbourne 201.100.53.2

11.

Refer to the exhibit. What can be concluded from the output of the
running-configuration of a router?

The passwords are encrypted.
The current configuration was saved to NVRAM.
The configuration that is shown will be the one used on the next reboot.
* The commands that are displayed determine the current operation of the
router.

12.

Refer to the exhibit. Host A pings host B. When R4 accepts the ping into
the Ethernet interface, what two pieces of header information are
included? (Choose two.)

source IP address: 192.168.10.129
source IP address: BBBB.3333.5677
destination IP address: 192.168.10.33
* destination IP address: 192.168.10.134
* destination MAC address: 9999.DADC.1234
CCNA-4-Answers.blogspot.com


13. What is the outcome of entering these commands?

R1(config)# line vty 0 4
R1(config-line)# password check123
R1(config-line)# login

ensures that a password is entered before entering user EXEC mode
* sets the password to be used for connecting to this router via Telnet
requires check123 to be entered before the configuration can be saved
creates a local user account for logging in to a router or switch

14. Which of the following is the correct flow of routines for a router
startup?

* load bootstrap, load IOS, apply configuration
load bootstrap, apply configuration, load IOS
load IOS, load bootstrap, apply configuration, check hardware
check hardware, apply configuration, load bootstrap, load IOS

15.
What three processes does a router execute when it receives a packet
from one network that is destined for another network? (Choose three.)

* decapsulates the Layer 3 packet by stripping off the Layer 2 frame
header
uses the destination MAC Address in the IP Header to look up the next-
hop address in the routing table
leaves the Layer 2 frame header intact when decapsulating the Layer 3
packet
* uses the destination IP Address in the IP header to look up the next-hop
address in the routing table
* encapsulates the Layer 3 packet into the new Layer 2 frame and
forwards it out the exit interface
encapsulates the Layer 3 packet into a special Layer 1 frame and forwards
it to the exit interface

16.
The network administrator needs to connect two routers directly via their
FastEthernet ports. What cable should the network administrator use?

straight-through
rollover
CCNA-4-Answers.blogspot.com

* cross-over
serial

17. Which two statements describe characteristics of load balancing?
(Choose two.)

Load balancing occurs when a router sends the same packet to different
destination networks. Load balancing occurs when a router sends the
same packet to different destination networks.
* Load balancing allows a router to forward packets over multiple paths
to the same destination network.
* Unequal cost load balancing is supported by EIGRP.
If multiple paths with different metrics to a destinations exist, the router
cannot support load balancing.

18. What information about the router and its startup process can be
gathered from the output of the show version command? (Choose three.)

* the last restart method
the command buffer contents
the amount of NVRAM and FLASH used
* the configuration register settings
* the location from where the IOS loaded

19.

Which interfaces in the exhibit could be used for a leased line WAN
connection? (Choose two.)

*1
2
3
*4
5
6

20. From what location can a router load the Cisco IOS during the boot
process? (Choose two.)

RAM
* TFTP server
NVRAM
setup routine
CCNA-4-Answers.blogspot.com

* Flash memory
terminal

21. A network administrator has just entered new configurations into
Router1. Which command should be executed to save configuration
changes to NVRAM?

Router1# copy running-config flash
Router1(config)# copy running-config flash
Router1# copy running-config startup-config
* Router1(config)# copy running-config startup-config
Router1# copy startup-config running-config
Router1(config)# copy startup-config running-config

22. What is the default sequence for loading the configuration file?

NVRAM, FLASH, ROM
FLASH, TFTP,CONSOLE
* NVRAM, TFTP, CONSOLE
FLASH, TFTP, ROM

23. What header address information does a router change in the
information it receives from an attached Ethernet interface before
information is transmitted out another interface?


only the Layer 2 source address
only the Layer 2 destination address
only the Layer 3 source address
only the Layer 3 destination address
* the Layer 2 source and destination address
the Layer 3 source and destination address
0 comments
Labels: CCNA 2 Module 1 Version 4.0 Answers
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Labels

      CCNA 1 Final Version 4.0 Answers (1)
      CCNA 1 Module 1 Version 4.0 Answers (1)
      CCNA 1 Module 10 Version 4.0 Answers (1)
      CCNA 1 Module 11 Version 4.0 Answers (1)
CCNA-4-Answers.blogspot.com

     CCNA 1 Module 2 Version 4.0 Answers (1)
     CCNA 1 Module 3 Version 4.0 Answers (1)
     CCNA 1 Module 4 Version 4.0 Answers (1)
     CCNA 1 Module 5 Version 4.0 Answers (1)
     CCNA 1 Module 6 Version 4.0 Answers (1)
     CCNA 1 Module 7 Version 4.0 Answers (1)
     CCNA 1 Module 8 Version 4.0 Answers (1)
     CCNA 1 Module 9 Version 4.0 Answers (1)
     CCNA 2 Final 1 Version 4.0 Answers (1)
     CCNA 2 Final 2 Version 4.0 Answers (1)
     CCNA 2 Module 1 Version 4.0 Answers (1)
     CCNA 2 Module 10 Version 4.0 Answers (1)
     CCNA 2 Module 11 Version 4.0 Answers (1)
     CCNA 2 Module 2 Version 4.0 Answers (1)
     CCNA 2 Module 3 Version 4.0 Answers (1)
     CCNA 2 Module 4 Version 4.0 Answers (1)
     CCNA 2 Module 5 Version 4.0 Answers (1)
     CCNA 2 Module 6 Version 4.0 Answers (1)
     CCNA 2 Module 7 Version 4.0 Answers (1)
     CCNA 2 Module 8 Version 4.0 Answers (1)
     CCNA 2 Module 9 Version 4.0 Answers (1)
     CCNA 3 Final 1 Version 4.0 Answers (1)
     CCNA 3 Module 1 Version 4.0 Answers (1)
     CCNA 3 Module 2 Version 4.0 Answers (1)
     CCNA 3 Module 3 Version 4.0 Answers (1)
     CCNA 3 Module 4 Version 4.0 Answers (1)
     CCNA 3 Module 5 Version 4.0 Answers (1)
     CCNA 3 Module 6 Version 4.0 Answers (1)
     CCNA 3 Module 7 Version 4.0 Answers (1)
     CCNA 4 Final 1 Version 4.0 Answers (1)
     CCNA 4 Final 2 Version 4.0 Answers (1)
     CCNA 4 Final 3 Version 4.0 Answers (1)
     CCNA 4 Final 4 Version 4.0 Answers (1)
     CCNA 4 Module 1 Version 4.0 Answers (1)
     CCNA 4 Module 2 Version 4.0 Answers (1)
     CCNA 4 Module 3 Version 4.0 Answers (1)
     CCNA 4 Module 4 Version 4.0 Answers (1)
     CCNA 4 Module 5 Version 4.0 Answers (1)
     CCNA 4 Module 6 Version 4.0 Answers (1)
     CCNA 4 Module 7 Version 4.0 Answers (1)
     CCNA 4 Module 8 Version 4.0 Answers (1)
CCNA-4-Answers.blogspot.com

More Related Content

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Featured

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 

Featured (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

Ccna 2 Module 1 Version 4.0 Answers

  • 1. CCNA-4-Answers.blogspot.com CCNA 4 Answers CCNA 4 Answers, CCNA 1 Version 4.0 Answers, CCNA 2 Version 4.0 Answers, CCNA 3 Version 4.0 Answers, CCNA 4 Version 4.0 Answers, CCNA 1 Final Version 4.0 Answers, CCNA 2 Final Version 4.0 Answers, CCNA 3 Final Version 4.0 Answers, CCNA 4 Final Version 4.0 Answers Showing posts with label CCNA 2 Module 1 Version 4.0 Answers. Show all posts Showing posts with label CCNA 2 Module 1 Version 4.0 Answers. Show all posts CCNA 2 Module 1 Version 4.0 Answers 1. If a router cannot find a valid configuration file during the startup sequence, what will occur? The startup sequence will reset. *The router will prompt the user for a response to enter setup mode. The startup sequence will halt until a valid configuration file is acquired. The router will generate a default configuration file based on the last valid configuration. The router will monitor local traffic to determine routing protocol configuration requirements. 2. Refer to the exhibit. The network administrator has configured the router with the interface IP addresses shown for the directly connected networks. Pings from the router to hosts on the connected networks or pings between router interfaces are not working. What is the most likely problem? The destination networks do not exist. The IP addresses on the router interfaces must be configured as network addresses and not host addresses. * The interfaces must be enabled with the no shutdown command. Each interface must be configured with the clock rate command. 3.
  • 2. CCNA-4-Answers.blogspot.com Refer to the exhibit. What can be concluded from the routing table output in the exhibit? (Choose two.) This router only has two interfaces. The router interfaces are not operational yet. This router is configured to forward packets to remote networks. * The FastEthernet0/0 and Serial0/0/0 interfaces of this router were configured with an IP address and the no shutdown command. * An IP packet received by this router with a destination address of 198.18.9.1 will be forwarded out of the Serial0/0/0 interface. 4. Refer to the exhibit. The frame shown in the exhibit was received by the router. The router interfaces are operational. How will the router process this frame? (Choose two.) The router will change the source and destination IP address in the packet before forwarding the frame. * The router will change the frame type to one supported by the WAN link before forwarding the frame. The router will use the destination MAC address to determine which interface to forward the packet. The router will look up the MAC address of the S0/0/0 interface in the ARP table and add it to the frame before forwarding. * The frame was received on the Fa0/0 interface of the router and will be switched to the S0/0/0 interface. The frame was received on the S0/0/0 interface of the router and will be switched to the Fa0/0 interface. 5. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.) * VTY interface * console interface Ethernet interface secret EXEC mode * privileged EXEC mode router configuration mode
  • 3. CCNA-4-Answers.blogspot.com 6. Which two statements correctly describe the components of a router? (Choose two.) RAM permanently stores the configuration file used during the boot sequence. * ROM contains diagnostics executed on hardware modules. NVRAM stores a backup copy of the IOS used during the boot sequence. * Flash memory does not lose its contents during a reboot. ROM contains the most current and most complete version of the IOS. Flash contains boot system commands to identify the location of the IOS 7. Refer to the exhibit. After host 2 is connected to the switch on the LAN, host 2 is unable to communicate with host 1. What is the cause of this problem? The subnet mask of host 2 is incorrect. * Host 1 and host 2 are on different networks. The switch needs an IP address that is not configured. The router LAN interface and host 1 are on different networks. The IP address of host 1 is on a different network than is the LAN interface of the router. 8. Which are functions of a router? (Choose three.) * packet switching extension of network segments * segmentation of broadcast domains * selection of best path based on logical addressing election of best path based on physical addressing 9. Refer to the exhibit. All routers have a route in its routing table to each network that is shown in the exhibit. Default routes have not been issued on these routers. What can be concluded about how packets are forwarded in this network? (Choose two.) If RouterC receives a packet that is destined for 10.5.1.1, it will be forwarded out interface Fa0/0.
  • 4. CCNA-4-Answers.blogspot.com * If RouterA receives a packet that is destined for 192.168.3.146, it will be forwarded out interface S0/0/1. * If RouterB receives a packet that is destined for 10.5.27.15, it will be forwarded out interface S0/0/1. If RouterB receives a packet that is destined for 172.20.255.1, it will be forwarded out interface S0/0/0. If RouterC receives a packet that is destined for 192.16.5.101, it will be forwarded out interface S0/0/1. 10. The serial connection shown in the graphic needs to be configured. Which configuration commands must be made on the Sydney router to establish connectivity with the Melbourne site? (Choose three.) * Sydney(config-if)# ip address 201.100.53.2 255.255.255.0 * Sydney(config-if)# no shutdown Sydney(config-if)# ip address 201.100.53.1 255.255.255.224 * Sydney(config-if)# clock rate 56000 Sydney(config-if)# ip host Melbourne 201.100.53.2 11. Refer to the exhibit. What can be concluded from the output of the running-configuration of a router? The passwords are encrypted. The current configuration was saved to NVRAM. The configuration that is shown will be the one used on the next reboot. * The commands that are displayed determine the current operation of the router. 12. Refer to the exhibit. Host A pings host B. When R4 accepts the ping into the Ethernet interface, what two pieces of header information are included? (Choose two.) source IP address: 192.168.10.129 source IP address: BBBB.3333.5677 destination IP address: 192.168.10.33 * destination IP address: 192.168.10.134 * destination MAC address: 9999.DADC.1234
  • 5. CCNA-4-Answers.blogspot.com 13. What is the outcome of entering these commands? R1(config)# line vty 0 4 R1(config-line)# password check123 R1(config-line)# login ensures that a password is entered before entering user EXEC mode * sets the password to be used for connecting to this router via Telnet requires check123 to be entered before the configuration can be saved creates a local user account for logging in to a router or switch 14. Which of the following is the correct flow of routines for a router startup? * load bootstrap, load IOS, apply configuration load bootstrap, apply configuration, load IOS load IOS, load bootstrap, apply configuration, check hardware check hardware, apply configuration, load bootstrap, load IOS 15. What three processes does a router execute when it receives a packet from one network that is destined for another network? (Choose three.) * decapsulates the Layer 3 packet by stripping off the Layer 2 frame header uses the destination MAC Address in the IP Header to look up the next- hop address in the routing table leaves the Layer 2 frame header intact when decapsulating the Layer 3 packet * uses the destination IP Address in the IP header to look up the next-hop address in the routing table * encapsulates the Layer 3 packet into the new Layer 2 frame and forwards it out the exit interface encapsulates the Layer 3 packet into a special Layer 1 frame and forwards it to the exit interface 16. The network administrator needs to connect two routers directly via their FastEthernet ports. What cable should the network administrator use? straight-through rollover
  • 6. CCNA-4-Answers.blogspot.com * cross-over serial 17. Which two statements describe characteristics of load balancing? (Choose two.) Load balancing occurs when a router sends the same packet to different destination networks. Load balancing occurs when a router sends the same packet to different destination networks. * Load balancing allows a router to forward packets over multiple paths to the same destination network. * Unequal cost load balancing is supported by EIGRP. If multiple paths with different metrics to a destinations exist, the router cannot support load balancing. 18. What information about the router and its startup process can be gathered from the output of the show version command? (Choose three.) * the last restart method the command buffer contents the amount of NVRAM and FLASH used * the configuration register settings * the location from where the IOS loaded 19. Which interfaces in the exhibit could be used for a leased line WAN connection? (Choose two.) *1 2 3 *4 5 6 20. From what location can a router load the Cisco IOS during the boot process? (Choose two.) RAM * TFTP server NVRAM setup routine
  • 7. CCNA-4-Answers.blogspot.com * Flash memory terminal 21. A network administrator has just entered new configurations into Router1. Which command should be executed to save configuration changes to NVRAM? Router1# copy running-config flash Router1(config)# copy running-config flash Router1# copy running-config startup-config * Router1(config)# copy running-config startup-config Router1# copy startup-config running-config Router1(config)# copy startup-config running-config 22. What is the default sequence for loading the configuration file? NVRAM, FLASH, ROM FLASH, TFTP,CONSOLE * NVRAM, TFTP, CONSOLE FLASH, TFTP, ROM 23. What header address information does a router change in the information it receives from an attached Ethernet interface before information is transmitted out another interface? only the Layer 2 source address only the Layer 2 destination address only the Layer 3 source address only the Layer 3 destination address * the Layer 2 source and destination address the Layer 3 source and destination address 0 comments Labels: CCNA 2 Module 1 Version 4.0 Answers Newer Posts Older Posts Home Subscribe to: Posts (Atom) Labels  CCNA 1 Final Version 4.0 Answers (1)  CCNA 1 Module 1 Version 4.0 Answers (1)  CCNA 1 Module 10 Version 4.0 Answers (1)  CCNA 1 Module 11 Version 4.0 Answers (1)
  • 8. CCNA-4-Answers.blogspot.com  CCNA 1 Module 2 Version 4.0 Answers (1)  CCNA 1 Module 3 Version 4.0 Answers (1)  CCNA 1 Module 4 Version 4.0 Answers (1)  CCNA 1 Module 5 Version 4.0 Answers (1)  CCNA 1 Module 6 Version 4.0 Answers (1)  CCNA 1 Module 7 Version 4.0 Answers (1)  CCNA 1 Module 8 Version 4.0 Answers (1)  CCNA 1 Module 9 Version 4.0 Answers (1)  CCNA 2 Final 1 Version 4.0 Answers (1)  CCNA 2 Final 2 Version 4.0 Answers (1)  CCNA 2 Module 1 Version 4.0 Answers (1)  CCNA 2 Module 10 Version 4.0 Answers (1)  CCNA 2 Module 11 Version 4.0 Answers (1)  CCNA 2 Module 2 Version 4.0 Answers (1)  CCNA 2 Module 3 Version 4.0 Answers (1)  CCNA 2 Module 4 Version 4.0 Answers (1)  CCNA 2 Module 5 Version 4.0 Answers (1)  CCNA 2 Module 6 Version 4.0 Answers (1)  CCNA 2 Module 7 Version 4.0 Answers (1)  CCNA 2 Module 8 Version 4.0 Answers (1)  CCNA 2 Module 9 Version 4.0 Answers (1)  CCNA 3 Final 1 Version 4.0 Answers (1)  CCNA 3 Module 1 Version 4.0 Answers (1)  CCNA 3 Module 2 Version 4.0 Answers (1)  CCNA 3 Module 3 Version 4.0 Answers (1)  CCNA 3 Module 4 Version 4.0 Answers (1)  CCNA 3 Module 5 Version 4.0 Answers (1)  CCNA 3 Module 6 Version 4.0 Answers (1)  CCNA 3 Module 7 Version 4.0 Answers (1)  CCNA 4 Final 1 Version 4.0 Answers (1)  CCNA 4 Final 2 Version 4.0 Answers (1)  CCNA 4 Final 3 Version 4.0 Answers (1)  CCNA 4 Final 4 Version 4.0 Answers (1)  CCNA 4 Module 1 Version 4.0 Answers (1)  CCNA 4 Module 2 Version 4.0 Answers (1)  CCNA 4 Module 3 Version 4.0 Answers (1)  CCNA 4 Module 4 Version 4.0 Answers (1)  CCNA 4 Module 5 Version 4.0 Answers (1)  CCNA 4 Module 6 Version 4.0 Answers (1)  CCNA 4 Module 7 Version 4.0 Answers (1)  CCNA 4 Module 8 Version 4.0 Answers (1)