Monday, June 30, 2008

It's Monday, June 30, and here are the answers to Sunday's CCNA, CCENT, and CCNP practice exam questions.

Daily CCNA Security questions begin today!

CCENT Certification:

A frame enters a switch port. The destination MAC address is known. Which of the following terms best describes how the frame will be transmitted?

A. unicast

B. filtered

C. forwarded

D. broadcast

E. multicast

Answer: A. The frame will be unicast to the destination via the appropriate port.


What is the basic role of broadcasts in IP Version 6?

Answer: There isn't one - IPv6 does not use broadcasts.


Route maps contain an "implicit deny". What happens to packets that have the implicit deny applied to them?

A. They're sent to the null interface.

B. They're dropped at the incoming interface.

C. They're routed normally.

D. They're dropped by the routing engine and an ICMP error message is generated.

Answer: C. Packets that have no specific match in the route map will be implicitly denied, but this implicit deny has a different meaning than the one you're used to from your ACL work. A route map implicit deny does not drop packets - rather, these packets are unaffected by the route map and are routed normally.


Short answer: How many classes can be defined for Priority Queueing?

Answer: 64.


Name the six major categories of information that can be recorded by the Accounting process.

Answer: Here's a brief look at each category and what accounting information can be recorded...

Commands: Information regarding EXEC mode commands issued by a user.

Connection: Information regarding all outbound connections made from network access server. Includes Telnet and rlogin.

EXEC: Information about user EXEC terminal sessions.

Network: Information regarding all PPP, ARAP, and SLIP sessions.

Resource: Information regarding start and stop records for calls passing authentication, and stop records for calls that fail authentication.

System: Non-user-related system-level events are recorded.


Which of the following is most susceptible to "war driving"?




Answer: C. Wired Equivalent Privacy (WEP) has some real problems:

Clear-text keys

Static keys (makes passwords easier to guess)

One-way authentication (client does not authenticate AP, making it easier for rogue access points to infiltrate the WLAN)

Encryption scheme is very easily broken in a matter of seconds

The term "war driving" refers to the process of driving around a neighborhood or business district in hopes of finding a non-secured WLAN. WEP is particularly susceptible to war driving for the reasons listed above.

New questions later today!

To your success,

Chris Bryant
CCIE #12933

No comments:

Blog Archive