2008年12月2日星期二

10 Q&As Of CCNA Certification Exam

The following are part of CCNA exam Q&A from www.certay.com. You can go to certay and consult live-support for more information if you are interested in its products. Now let’s look at the following study-guides offered by certay.


1. What are two reasons that a network administrator would use access lists? (Choose two.)


A: to control vty access into a router

B: to control broadcast traffic through a router

C: to filter traffic as it passes through a router

D: to filter traffic that originates from the router mb2-631

E: to replace passwords as a line of defense against security incursions


Correct Answers: A, C


2. A default Frame Relay WAN is classified as what type of physical network?


A: point-to-point

B: broadcast multi-access

C: nonbroadcast multi-access

D: nonbroadcast multipoint

E: broadcast point-to-multipoint

Correct Answers: C


3. A single 802.11g access point has been configured and installed in the center of a square office. A few wireless users are experiencing slow performance and drops while most users are operating at peak efficiency. What are three likely causes of this problem? (Choose three.) 70-272


A: mismatched TKIP encryption

B: null SSID

C: cordless phones

D: mismatched SSID

E: metal file cabinets

F: antenna type or direction

Correct Answers: C, E, F


4. The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router. Which of the following statements is true concerning this command?


A: This command should be executed from the global configuration mode. 9L0-402

B: The IP address 10.121.16.8 is the local router port used to forward data.

C: 102 is the remote DLCI that will receive the information.

D: This command is required for all Frame Relay configurations. 642-873

E: The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC.


Correct Answers: E


5. Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server?


A: denial of service

B: brute force

C: reconnaissance

D: Trojan horse


Correct Answers: A


6. Which of the following are associated with the application layer of the OSI model? (Choose two.)


A: ping

B: Telnet 642-533

C: FTP

D: TCP

E: IP


Correct Answers: B, C


7. For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?


A: IP

B: ICMP

C: TCP

D: UDP 70-630


Correct Answers: B


8. What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)


A: Allow unrestricted access to the console or VTY ports.

B: Use a firewall to restrict access from the outside to the network devices.

C: Always use Telnet to access the device command line because its data is automatically encrypted.

D: Use SSH or another encrypted and authenticated transport to access device configurations.

E: Prevent the loss of passwords by disabling password encryption. 70-297


Correct Answers: B, D


9. Which spread spectrum technology does the 802.11b standard define for operation?


A: IR

B: DSSS

C: FHSS

D: DSSS and FHSS

E: IR, FHSS, and DSSS


Correct Answers: B


14. What are two security appliances that can be installed in a network? (Choose two.)


A: ATM

B: IDS

C: IOS

D: IOX

E: IPS

F: SDM

Correct Answers: B, E


More information:650-621 1z0-042 642-503 70-640 640-802 642-901 1Y0-731 MB2-633 920-221