The new security policy for the company allows all IP traffic from the Engineering LAN to the Internet while only web traffic from the Marketing LAN is allowed to the Internet. If a network has converged, what is true about the link-state database held by each router in the same OSPF area? Each router has a link-state database containing the same status information
Static NAT works by mapping a specific inside local IP address to what other specific address type? inside global outside local outside global private IP address 20. What must happen for a privately addressed host on an inside local network to be able to communicate with an outside destination host on the Internet? The host IP address must be translated to an outside private address
What two criteria are used to help select network media? (Choose two.) the types of data that need to be prioritized the cost of the end devices utilized in the network the distance the media can successfully carry a signal the number of intermediary devices installed in the network the environment where the media is to be installed 2. Which two Internet connection options do not require that physical cables be run to the building? (Choose two.) DSL cellular satellite dialup dedicated leased line 9
CCNA Discovery 4.1 - CCNA Discovery Answers - CCNA 4.1 Answers: CCNA 3 Chapter 6 V4.0
What is the purpose of the configuration commands added on router B?allows router A to form an adjacency with router Bprovides a stable OSPF router ID on router Bprovides a method of testing router trafficcreates the OSPF adjacency table on router B16Refer to the exhibit. What is the purpose of the value 128 shown in bold?It is the OSPF cost metric.It is the OSPF administrative distance.It is the value assigned by the Dijkstra algorithm that designates the distance in hops to the network.It is the value assigned to an interface that is used by the DUAL algorithm to determine the metric.15Refer to the exhibit
CCNA Discovery 4.1 - CCNA Discovery Answers - CCNA 4.1 Answers
What is the advantage of using WPA to secure a wireless network?It uses a 128-bit pre-shared hexadecimal key to prevent unauthorized wireless access.**It uses an advanced encryption key that is never transmitted between host and access point.It is supported on older wireless hardware, thus providing maximum compatibility with enterprise equipment.It requires the MAC address of a network device that is requesting wireless access to be on a list of approved MAC addresses.4. How is it likely that the hacker gained access to the network?The hacker used a software tool to crack the shared hexadecimal wireless key.**The hacker obtained the MAC address of a permitted host, and cloned it on his wireless laptop NIC.The attacker mounted a denial of service attack to overwhelm the firewall before penetrating the wireless LAN.The hacker gained wireless access to the MAC address database and added his own MAC address to the list of permitted addresses.10
When an IPv6 enabled host needs to discover the MAC address of an intended IPv6 destination, which destination address is used by the source host in the NS message? all-node multicast address solicited-node multicast address link-local address of the receiver global unicast address of the receiver 16. When will a router drop a traceroute packet? when the router receives an ICMP Time Exceeded message when the RTT value reaches zero when the host responds with an ICMP Echo Reply message when the value in the TTL field reaches zero when the values of both the Echo Request and Echo Reply messages reach zero 17
No comments:
Post a Comment