SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

CCNA 3 Chapter 2 V4.0

Labels: CCNA 3 Chapter 2 V4.0
1.
What type of connection point is a point of presence (POP)?
a. between a client and a host
b. between two local networks
c. between a computer and a switch
d. between an ISP and an Enterprise network ****


2.
A network administrator needs to configure Telnet access to a router. Which group of
commands
enable Telnet access to the router?
a. Router(config)# enable password class
Router(config)# line con 0
Router(config-line)# login
Router(config-line)# password cisco
b. Router(config)# ip host 192.168.1.1 NewYork
Router(config)# enable password cisco
c. Router(config)# line aux 0
Router(config-line)# login
Router(config-line)# password cisco
d. Router(config)# enable password class ****
Router(config)# line vty 0 4
Router(config-line)# login
Router(config-line)# password cisco


3.
Which two types of information should be included in a business continuity plan?
(Choose two.)
a. maintenance time periods
b. intrusion monitoring records
c. offsite data storage procedures
d. alternate IT processing locations *****
e. problem resolution escalation steps ****
4. Which two router parameters can be set from interface configuration mode?
(Choose two.)
a. IP address ****
b. Telnet password
c. hostname
d. console password
e. subnet mask ****
f. enable secret password
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

5.
Which two devices protect a corporate network against malicious attacks at the
enterprise edge ?(Choose two.)
a. demarc
b. IP security (IPSec)
c. Data Service Unit (DSU)
d. intrusion prevention system (IPS) ****
e. intrusion detection system (IDS) ****


6.
Which three steps must be performed to remove all VLAN information from a switch
but retain the
rest of the configuration? (Choose three.)
a. Remove all VLAN associations from the interfaces.
b. Remove the 802.1q encapsulation from the interface.
c. Issue the command copy start run.
d. Issue the command delete flash:vlan.dat. ****
e. Issue the command erase start. ****
f. Reload the switch. ****


7.
What is the demarcation?
a. physical point where the ISP responsibilty ends and the customer responsibilty
begins ****
b. physical location where all server farm connections meet before being distributed
into the Core
c. point of entry for outside attacks and is often vulnerable
d. point of entry for all Access Layer connections from the Distribution Layer devices


8.
Which device is responsible for moving packets between multiple network segments?
a. router ****
b. switch
c. CSU/DSU
d. IDS device


10.
What information can an administrator learn using the show version command?
a. Cisco IOS filename ****
b. configured routing protocol
c. status of each interface
d. IP addresses of all interfaces
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

11.
Which two situations require a network administrator to use out-of-band management
to change a
router configuration? (Choose two.)
a. Network links to the router are down. ****
b. No Telnet password has been configured on the router.
c. The administrator can only connect to the router using SSH.
d. The network interfaces of the router are not configured with IP addresses. ****
e. Company security policy requires that only HTTPS be used to connect to routers.


12.
It is crucial that network administrators be able to examine and configure network
devices from
their homes. Which two approaches allow this connectivity without increasing
vulnerability to external
attacks? (Choose two.)
a. Configure a special link at the POP to allow external entry from the home
computer.
b. Set up VPN access between the home computer and the network. ****
c. Install a cable modem in the home to link to the network.
d. Configure ACLs on the edge routers that allow only authorized users to access
management ports
on network devices. ****
e. Configure a server in the DMZ with a special username and password to allow
external access.


13.
A network administrator must define specific business processes to implement if a
catastrophic
disaster prevents a company from performing daily business routines. Which portion
of the network
documentation is the administrator defining?
a. business security plan
b. business continuity plan ****
c. network solvency plan
d. service level agreement
e. network maintenance plan


14.
A DoS attack crippled the daily operations of a large company for 8 hours. Which two
options
could be implemented by the network administrator to possibly prevent such an attack
in the future?
(Choose two.)
a. install security devices with IDS and IPS at the enterprise edge ****
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

b. reset all user passwords every 30 days
c. filter packets based on IP address, traffic pattern, and protocol ****
d. deny external workers VPN access to internal resources
e. ensure critical devices are physically secure and placed behind the demarc


15.
A network manager wants to have processes in place to ensure that network upgrades
do not affect
business operations. What will the network manager create for this purpose?
a. business security plan
b. business continuity plan
c. service level agreement
d. network maintenance plan ****


16.
An investment company has multiple servers that hold mission critical data. They are
worried that if
something happens to these servers, they will lose this valuable information. Which
type of plan is
needed for this company to help minimize loss in the event of a server crash?
a. business security ****
b. business continuity
c. network maintenance
d. service level agreement


17.
When searching for information about authentication methods and usernames of
company
personnel, where can a network administrator look?
a. Business Continuity Plan
b. Business Security Plan ****
c. Network Maintenance Plan
d. Service Level Agreement


18.
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/




Refer to the exhibit. Which statement is true about port Fa5/1?
a. When a violation is detected, the port will log the information to a syslog server.
b. When a violation is detected, the port will go into err-disable mode.
c. There have been 11 security violations since the last reload.
d. The port is currently in the shutdown state. ****

Weitere ähnliche Inhalte

Mehr von ccna4discovery

Ccna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 AnswersCcna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 Answersccna4discovery
 
Ccna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 AnswersCcna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 Answersccna4discovery
 
Ccna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 AnswersCcna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 Answersccna4discovery
 
Ccna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 AnswersCcna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 Answersccna4discovery
 
Ccna 3 Final V4.0 Answers
Ccna 3 Final V4.0 AnswersCcna 3 Final V4.0 Answers
Ccna 3 Final V4.0 Answersccna4discovery
 
Ccna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 AnswersCcna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 Answersccna4discovery
 
Ccna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 AnswersCcna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 Answersccna4discovery
 

Mehr von ccna4discovery (7)

Ccna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 AnswersCcna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 Answers
 
Ccna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 AnswersCcna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 Answers
 
Ccna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 AnswersCcna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 Answers
 
Ccna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 AnswersCcna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 Answers
 
Ccna 3 Final V4.0 Answers
Ccna 3 Final V4.0 AnswersCcna 3 Final V4.0 Answers
Ccna 3 Final V4.0 Answers
 
Ccna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 AnswersCcna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 Answers
 
Ccna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 AnswersCcna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 Answers
 

Kürzlich hochgeladen

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Kürzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Ccna 3 Chapter 2 V4.0 Answers

  • 1. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ CCNA 3 Chapter 2 V4.0 Labels: CCNA 3 Chapter 2 V4.0 1. What type of connection point is a point of presence (POP)? a. between a client and a host b. between two local networks c. between a computer and a switch d. between an ISP and an Enterprise network **** 2. A network administrator needs to configure Telnet access to a router. Which group of commands enable Telnet access to the router? a. Router(config)# enable password class Router(config)# line con 0 Router(config-line)# login Router(config-line)# password cisco b. Router(config)# ip host 192.168.1.1 NewYork Router(config)# enable password cisco c. Router(config)# line aux 0 Router(config-line)# login Router(config-line)# password cisco d. Router(config)# enable password class **** Router(config)# line vty 0 4 Router(config-line)# login Router(config-line)# password cisco 3. Which two types of information should be included in a business continuity plan? (Choose two.) a. maintenance time periods b. intrusion monitoring records c. offsite data storage procedures d. alternate IT processing locations ***** e. problem resolution escalation steps **** 4. Which two router parameters can be set from interface configuration mode? (Choose two.) a. IP address **** b. Telnet password c. hostname d. console password e. subnet mask **** f. enable secret password
  • 2. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ 5. Which two devices protect a corporate network against malicious attacks at the enterprise edge ?(Choose two.) a. demarc b. IP security (IPSec) c. Data Service Unit (DSU) d. intrusion prevention system (IPS) **** e. intrusion detection system (IDS) **** 6. Which three steps must be performed to remove all VLAN information from a switch but retain the rest of the configuration? (Choose three.) a. Remove all VLAN associations from the interfaces. b. Remove the 802.1q encapsulation from the interface. c. Issue the command copy start run. d. Issue the command delete flash:vlan.dat. **** e. Issue the command erase start. **** f. Reload the switch. **** 7. What is the demarcation? a. physical point where the ISP responsibilty ends and the customer responsibilty begins **** b. physical location where all server farm connections meet before being distributed into the Core c. point of entry for outside attacks and is often vulnerable d. point of entry for all Access Layer connections from the Distribution Layer devices 8. Which device is responsible for moving packets between multiple network segments? a. router **** b. switch c. CSU/DSU d. IDS device 10. What information can an administrator learn using the show version command? a. Cisco IOS filename **** b. configured routing protocol c. status of each interface d. IP addresses of all interfaces
  • 3. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ 11. Which two situations require a network administrator to use out-of-band management to change a router configuration? (Choose two.) a. Network links to the router are down. **** b. No Telnet password has been configured on the router. c. The administrator can only connect to the router using SSH. d. The network interfaces of the router are not configured with IP addresses. **** e. Company security policy requires that only HTTPS be used to connect to routers. 12. It is crucial that network administrators be able to examine and configure network devices from their homes. Which two approaches allow this connectivity without increasing vulnerability to external attacks? (Choose two.) a. Configure a special link at the POP to allow external entry from the home computer. b. Set up VPN access between the home computer and the network. **** c. Install a cable modem in the home to link to the network. d. Configure ACLs on the edge routers that allow only authorized users to access management ports on network devices. **** e. Configure a server in the DMZ with a special username and password to allow external access. 13. A network administrator must define specific business processes to implement if a catastrophic disaster prevents a company from performing daily business routines. Which portion of the network documentation is the administrator defining? a. business security plan b. business continuity plan **** c. network solvency plan d. service level agreement e. network maintenance plan 14. A DoS attack crippled the daily operations of a large company for 8 hours. Which two options could be implemented by the network administrator to possibly prevent such an attack in the future? (Choose two.) a. install security devices with IDS and IPS at the enterprise edge ****
  • 4. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ b. reset all user passwords every 30 days c. filter packets based on IP address, traffic pattern, and protocol **** d. deny external workers VPN access to internal resources e. ensure critical devices are physically secure and placed behind the demarc 15. A network manager wants to have processes in place to ensure that network upgrades do not affect business operations. What will the network manager create for this purpose? a. business security plan b. business continuity plan c. service level agreement d. network maintenance plan **** 16. An investment company has multiple servers that hold mission critical data. They are worried that if something happens to these servers, they will lose this valuable information. Which type of plan is needed for this company to help minimize loss in the event of a server crash? a. business security **** b. business continuity c. network maintenance d. service level agreement 17. When searching for information about authentication methods and usernames of company personnel, where can a network administrator look? a. Business Continuity Plan b. Business Security Plan **** c. Network Maintenance Plan d. Service Level Agreement 18.
  • 5. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ Refer to the exhibit. Which statement is true about port Fa5/1? a. When a violation is detected, the port will log the information to a syslog server. b. When a violation is detected, the port will go into err-disable mode. c. There have been 11 security violations since the last reload. d. The port is currently in the shutdown state. ****