Show Posts in

CCNA1 v6.0 Chapter 2 Exam Answers

1. What is the function of the kernel of an operating software? It provides a user interface that allows users to request a specific task. The kernel links the hardware drivers with the underlying electronics of a computer. It is an application that allows the initial configuration of …

CCNA1 v6.0 Chapter 1 Exam Answers

1. A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.) better security easy to create* better device performance when acting as both client and server lacks centralized administration* less cost to implement* scalable 2. …

CCNA 1 v6.0 Pretest Exam Answers

CCNA 1 v6.0 Pretest Exam Answers 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. 11110010 11011011 11110110 11100111* 11100101 11101110   2. Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list …

CCNA Security v2.0 Chapter 11 Exam Answers

1. Which security test is appropriate for detecting system weaknesses such as misconfiguration, default passwords, and potential DoS targets? vulnerability scanning* network scanning integrity checkers penetration testing   2. How does network scanning help assess operations security? It can simulate attacks from malicious sources. It can log abnormal …

CCNA Security v2.0 Chapter 10 Exam Answers

1. Which statement describes the function provided to a network administratorwho uses the Cisco Adaptive Security Device Manager (ASDM) GUI that runs as a Java Web Start application? The administrator can connect to and manage a single ASA.* The administrator can connect to and manage multiple ASA devices. …

CCNA Security 2.0 PT Practice SA Part 1 Answers

CCNA Security 2.0 PT Practice SA – Part 1 A few things to keep in mind while completing this activity: Do not use the browser Back button or close or reload any exam windows during the exam. Do not close Packet Tracer when you are done. It will close automatically. …

CCNA Security v2.0 Chapter 9 Exam Answers

1. Refer to the exhibit. An administrator creates three zones (A, B, and C) in an ASA that filters traffic. Traffic originating from Zone A going to Zone C is denied, and traffic originating from Zone B going to Zone C is denied. What is a possible scenario …

CCNA Security v2.0 Chapter 8 Exam Answers

1. Refer to the exhibit. How will traffic that does not match that defined by access list 101 be treated by the router? It will be sent unencrypted.* It will be sent encrypted. It will be blocked. It will be discarded.   2. What three protocols must be …

CCNA Security v2.0 Chapter 7 Exam Answers

1. What is the focus of cryptanalysis? hiding secret codes developing secret codes breaking encrypted codes* implementing encrypted codes   2. How many bits does the Data Encryption Standard (DES) use for data encryption? 40 bits 56 bits* 64 bits 72 bits   3. Which statement describes the …

CCNA Security v2.0 Chapter 6 Exam Answers

1. Refer to the exhibit. The Fa0/2 interface on switch S1 has been configured with the switchport port-security mac-address 0023.189d.6456 command and a workstation has been connected. What could be the reason that the Fa0/2 interface is shutdown? The connection between S1 and PC1 is via a crossover …