It's Tuesday, August 26, and here are the answers to yesterday's CCNA, CCENT, and CCNP practice exam questions!

Security, Voice, and Wireless questions are now part of the daily blog questions, and over 100 practice exams, tutorials, and articles regarding those three new Cisco certifications will be posted over the next few weeks and months!

Let's take a look at the answers to yesterday's questions....

CCNA Certification And CCENT Certification:

Which of the following can make a line protocol go down?

A. Mismatched encapsulation types

B. Frame map statements that are missing the broadcast option

C. Absence of a clockrate from the DCE

D. Failure to configure an IP address on the interface

Answer: A, C. The other two choices can cause connectivity issues, but they will not make the line protocol go down. Mismatched encap types (HDLC on one end, PPP on the other) will force the line protocol down, as will the absence of a clockrate.



CCNA Security Certification / CCNP ISCW Exam:

You're ensuring that only the devices in a VPN that should see the data in unencrypted format will see the data that way. Which of the following are you practicing?

A. data confidentiality

B. data integrity

C. replay attack protection

D. data origin authentication

Answer: A.

Data Confidentiality means that only the devices that should see the data in an unencrypted form will see the data that way.


Data Integrity means that the recipient of the data can guarantee that the received data is the same as the transmitted data - in short, that the data was not altered during transport.


Data Origin Authentication guarantees that the data originated from a specific endpoint.


Anti-replay protection (sometimes just called "replay protection") protects against replay attacks, a malicious repeat and/or delay of a valid transmission.



CCNA Wireless: (That link goes to my new CCNA Wireless Resource Page, with practice exams and tutorials coming soon!)

Which of the following describes WPA?

A. One-way authentication

B. Uses dynamic keys

C. Uses MIC to protect against replay attacks

D. Can use "dot1x" for authentication

Answers: B, C, D. WPA uses two-way authentication. The other statements are correct, with "dot1x" being the common term for 802.1x authentication.



CCNA Voice: (That link goes to my CCNA Voice Resource Page)

Which of the following are required steps in the analog-to-digital signal conversion process?

A. sampling

B. encoding

C. compression

D. quantization

Answers: A, B, D. Compression is optional and often desirable, but not required.




CCNP Certification / BSCI Exam:

When you use the aggregate-address command to aggregate BGP routes, what effect will this have on the aggregated routes in the BGP tables of neighbors who receive the aggregate route?

A. By default, those routes will time out and only the aggregate will be seen.

B. By default, those routes will immediately be removed and only the aggregate will be seen.

C. The more-specific routes will remain in the downstream BGP table.

D. The more-specific routes will not remain in the downstream BGP tables, but they can be configured to remain if the no-remove option is used with the aggregate-address command.

Answer: C. The aggregate-address command will create an aggregate, naturally, but the routes that have been aggregrated by default will remain in the downstream routers' BGP tables.


CCNP Certification / BCMSN Exam:

Short answer: What are the two major components of CEF?

Answer: CEF has two major components - the Forwarding Information Base and the Adjacency Table.



CCNP / ONT Exam: (My ONT Study Package is now available!)

Short answer: What's "weighted" in WRED?

Answer: WRED allows us to assign weights to traffic flows, increasing the chance of less-important packets being dropped when congestion occurs.

Check today's other blog posts for new CCNA Security exam tutorials and a new CCNA / CCENT practice exam!

To your success,

Chris Bryant
CCIE #12933
http://www.thebryantadvantage.com/

Comments

Popular posts from this blog