http://heiserz.com/2012/01/01/dsmbisp-chapter-4-ccna-discovery-2-4-1-2012-100/
Static NAT works by mapping a specific inside local IP address to what other specific address type? inside global outside local outside global private IP address 20. What must happen for a privately addressed host on an inside local network to be able to communicate with an outside destination host on the Internet? The host IP address must be translated to an outside private address
http://www.ccna4u.org/2011/06/ccna-1-chapter-2-v4-0-answers-100-updated-2011.html
Which three questions must be answered before continuing with the IOS selection and upgrade? (Choose three.) Are the devices on the same LAN? Do the devices have enough NVRAM to store the IOS image? What models of routers and switches require upgrades? What ports are installed on the routers and switches? Do the routers and switches have enough RAM and flash memory for the proposed IOS versions? What features are required for the devices? 3. thank u so much! Reply Dan says: February 1, 2013 at 3:46 pm THANK YOU FOR POSTING THIS!!!! Reply Dol says: March 14, 2013 at 11:00 pm Thanks for your questions and answers
CCNA Discovery 4.1 - CCNA Discovery Answers - CCNA 4.1 Answers: CCNA 3 Chapter 6 V4.0
http://ccna-discovery-4.blogspot.com/2009/04/ccna-3-chapter-6-v40.html
What is the purpose of the configuration commands added on router B?allows router A to form an adjacency with router Bprovides a stable OSPF router ID on router Bprovides a method of testing router trafficcreates the OSPF adjacency table on router B16Refer to the exhibit. What is the purpose of the value 128 shown in bold?It is the OSPF cost metric.It is the OSPF administrative distance.It is the value assigned by the Dijkstra algorithm that designates the distance in hops to the network.It is the value assigned to an interface that is used by the DUAL algorithm to determine the metric.15Refer to the exhibit
http://www.ccna4u.org/2011/06/ccna-1-chapter-8-v4-0-answers-100-2011.html
When an IPv6 enabled host needs to discover the MAC address of an intended IPv6 destination, which destination address is used by the source host in the NS message? all-node multicast address solicited-node multicast address link-local address of the receiver global unicast address of the receiver 16. When will a router drop a traceroute packet? when the router receives an ICMP Time Exceeded message when the RTT value reaches zero when the host responds with an ICMP Echo Reply message when the value in the TTL field reaches zero when the values of both the Echo Request and Echo Reply messages reach zero 17
http://ccnaanswers.com/
The new security policy for the company allows all IP traffic from the Engineering LAN to the Internet while only web traffic from the Marketing LAN is allowed to the Internet. If a network has converged, what is true about the link-state database held by each router in the same OSPF area? Each router has a link-state database containing the same status information
CCNA Discovery 4.1 - CCNA Discovery Answers - CCNA 4.1 Answers
http://ccna-discovery-4.blogspot.com/
What is the advantage of using WPA to secure a wireless network?It uses a 128-bit pre-shared hexadecimal key to prevent unauthorized wireless access.**It uses an advanced encryption key that is never transmitted between host and access point.It is supported on older wireless hardware, thus providing maximum compatibility with enterprise equipment.It requires the MAC address of a network device that is requesting wireless access to be on a list of approved MAC addresses.4. How is it likely that the hacker gained access to the network?The hacker used a software tool to crack the shared hexadecimal wireless key.**The hacker obtained the MAC address of a permitted host, and cloned it on his wireless laptop NIC.The attacker mounted a denial of service attack to overwhelm the firewall before penetrating the wireless LAN.The hacker gained wireless access to the MAC address database and added his own MAC address to the list of permitted addresses.10
No comments:
Post a Comment