The following are part of CCNA exam Q&A from www.certay.com. You can go to certay and consult live-support for more information if you are interested in its products. Now let’s look at the following study-guides offered by certay.
1. What are two reasons that a network administrator would use access lists? (Choose two.)
A: to control vty access into a router
B: to control broadcast traffic through a router
C: to filter traffic as it passes through a router
D: to filter traffic that originates from the router mb2-631
E: to replace passwords as a line of defense against security incursions
Correct Answers: A, C
2. A default Frame Relay WAN is classified as what type of physical network?
A: point-to-point
B: broadcast multi-access
C: nonbroadcast multi-access
D: nonbroadcast multipoint
E: broadcast point-to-multipoint
Correct Answers: C
3. A single 802.11g access point has been configured and installed in the center of a square office. A few wireless users are experiencing slow performance and drops while most users are operating at peak efficiency. What are three likely causes of this problem? (Choose three.) 70-272
A: mismatched TKIP encryption
B: null SSID
C: cordless phones
D: mismatched SSID
E: metal file cabinets
F: antenna type or direction
Correct Answers: C, E, F
4. The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router. Which of the following statements is true concerning this command?
A: This command should be executed from the global configuration mode. 9L0-402
B: The IP address 10.121.16.8 is the local router port used to forward data.
C: 102 is the remote DLCI that will receive the information.
D: This command is required for all Frame Relay configurations. 642-873
E: The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC.
Correct Answers: E
5. Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server?
A: denial of service
B: brute force
C: reconnaissance
D: Trojan horse
Correct Answers: A
6. Which of the following are associated with the application layer of the OSI model? (Choose two.)
A: ping
B: Telnet 642-533
C: FTP
D: TCP
E: IP
Correct Answers: B, C
7. For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?
A: IP
B: ICMP
C: TCP
D: UDP 70-630
Correct Answers: B
8. What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)
A: Allow unrestricted access to the console or VTY ports.
B: Use a firewall to restrict access from the outside to the network devices.
C: Always use Telnet to access the device command line because its data is automatically encrypted.
D: Use SSH or another encrypted and authenticated transport to access device configurations.
E: Prevent the loss of passwords by disabling password encryption. 70-297
Correct Answers: B, D
9. Which spread spectrum technology does the 802.11b standard define for operation?
A: IR
B: DSSS
C: FHSS
D: DSSS and FHSS
E: IR, FHSS, and DSSS
Correct Answers: B
14. What are two security appliances that can be installed in a network? (Choose two.)
A: ATM
B: IDS
C: IOS
D: IOX
E: IPS
F: SDM
Correct Answers: B, E
More information:650-621 1z0-042 642-503 70-640 640-802 642-901 1Y0-731 MB2-633 920-221