Sponsor

Advertisment

CCNA 4 R&S: Connecting Networks Chapter 8 v5.02 + v5.03 Exam Answers 2016

Friday, August 19, 2016

CCNA 4 R&S: Connecting Networks Chapter 8 v5.02 + v5.03 Exam Answers 2016

You can download fresh questions. Daily updated. 

LAST UPDATE: TODAY 


1.

Refer to the exhibit. Which two conclusions can be drawn from the syslog message that was generated by the router? (Choose two.)
This message resulted from an unusual error requiring reconfiguration of the interface.
This message indicates that the interface should be replaced.
This message is a level 5 notification message.
This message indicates that service timestamps have been configured.
This message indicates that the interface changed state five times.

2. A network technician has issued the service timestamps log datetime command in the configuration of the branch router. Which additional command is required to include the date and time in logged events?
Branch1(config)# service timestamps log uptime
Branch1# clock set 08:00:00 05 AUG 2013
Branch1(config)# service timestamps debug datetime
Branch1# copy running-config startup-config

3.

Refer to the exhibit. From what location have the syslog messages been retrieved?
syslog server
syslog client
router RAM
router NVRAM

4.

Refer to the exhibit. What does the number 17:46:26.143 represent?
the time passed since the syslog server has been started
the time when the syslog message was issued
the time passed since the interfaces have been up
the time on the router when the show logging command was issued

5. What are SNMP trap messages?
messages that are used by the NMS to query the device for data
unsolicited messages that are sent by the SNMP agent and alert the NMS to a condition on the network
messages that are used by the NMS to change configuration variables in the agent device
messages that are sent periodically by the NMS to the SNMP agents that reside on managed devices to query the device for
data

6. How can SNMP access be restricted to a specific SNMP manager?
Use the snmp-server community command to configure the community string with no access level.
Specify the IP address of the SNMP manager by using the snmp-server host command.
Use the snmp-server traps command to enable traps on an SNMP manager.
Define an ACL and reference it by using the snmp-server community command.

7. A network administrator issues two commands on a router:
R1(config)# snmp-server host 10.10.50.25 version 2c campus
R1(config)# snmp-server enable traps
What can be concluded after the commands are entered?
No traps are sent, because the notification-types argument was not specified yet.
Traps are sent with the source IP address as 10.10.50.25.
If an interface comes up, a trap is sent to the server.
The snmp-server enable traps command needs to be used repeatedly if a particular subset of trap types is desired.

8. What is a difference between SNMP and NetFlow?
Unlike NetFlow, SNMP uses a “push”-based model.
NetFlow collects more detailed traffic statistics on IP networks than SNMP does.
SNMP only gathers traffic statistics, whereas NetFlow can also collect many other performance indicators, such as interface
errors and CPU usage.
Unlike NetFlow, SNMP may be used to provide IP accounting for billing purposes.

9. How does NetFlow function on a Cisco router or multilayer switch?
Netflow captures and analyzes traffic.
One user connection to an application exists as two NetFlow flows.
On 2960 switches, Netlow allows for data export.
NetFlow does not consume any additional memory.

10. Which type of information can an administrator obtain with the show ip cache flow command?
the NetFlow version that is enabled
whether NetFlow is configured on the correct interface and in the correct direction
the configuration of the export parameters
the protocol that uses the largest volume of traffic
11. What is the most common purpose of implementing NetFlow in a networked environment?
to support accounting and monitoring with consumer applications
to actively capture traffic from networked devices
to monitor live data usage and to control traffic flow with set messages
to passively capture changing events that occur in the network and to perform after-the-fact-analysis

12. Which destination do Cisco routers and switches use by default when sending syslog messages for all severity levels?
RAM
NVRAM
nearest syslog server
console

13. Which SNMP feature provides a solution to the main disadvantage of SNMP polling?
SNMP community strings
SNMP set messages
SNMP get messages
SNMP trap messages

14. Which statement describes SNMP operation?
A get request is used by the SNMP agent to query the device for data.
A set request is used by the NMS to change configuration variables in the agent device.
An NMS periodically polls the SNMP agents that are residing on managed devices by using traps to query the devices for data.
An SNMP agent that resides on a managed device collects information about the device and stores that information remotely in the MIB that is located on the NMS.

15. A network administrator has issued the logging trap 4 global configuration mode command. What is the result of this command?
After four events, the syslog client will send an event message to the syslog server.
The syslog client will send to the syslog server any event message that has a severity level of 4 and higher.
The syslog client will send to the syslog server event messages with an identification trap level of only 4.
The syslog client will send to the syslog server any event message that has a severity level of 4 and lower.

16. When logging is used, which severity level indicates that a device is unusable?
Critical – Level 2
Alert – Level 1
Emergency-Level 0 
Error-Level 3
17.

Refer to the exhibit. While planning an upgrade, a network administrator uses the Cisco NetFlow utility to analyze data flow in the current network. Which protocol used the greatest amount of network time?
TCP-FTP
TCP-Telnet
UDP-DNS
TCP-other
UDP-other

18. Which two statements describe items to be considered in configuring NetFlow? (Choose two.)
Netflow requires both management and agent software.
NetFlow can only be used if all devices on the network support it.
Netflow can only be used in a unidirectional flow.
Netflow requires UDP port 514 for notification messages.
Netflow consumes additional memory.

19. When SNMPvl or SNMPv2 is being used, which feature provides secure access to MIB objects?
message integrity
source validation
community strings
packet encryption

20.

Refer to the exhibit. What can be concluded from the produced output?
An ACL was configured to restrict SNMP access to an SNMP manager.
This is the output of the show snmp command without any parameters.
The system contact was not configured with the snmp server contact command

21. What are the most common syslog messages?
output messages that are generated from debug output
linkup and link down messages
those that occur when a packet matches a parameter condition in an access control list
error messages about hardware or software malfunctions

22. A network administrator has issued the snmp-server user adminl admin v3 encrypted auth md5 abc789 priv des 256 key99 command. What are two features of this command? (Choose two.)
It forces the network manager to log into the agent to retrieve the SNMP messages.
It restricts SNMP access to defined SNMP managers.
It uses the MD5 authentication of the SNMP messages.
It allows a network administrator to configure a secret encrypted password on the SNMP server.
It adds a new user to the SNMP group.

23. Fill in the blank.
The   “syslog”   protocol uses UDP port 514 and is the most common method to access system messages provided by networking devices.
24 When SNMPv1 or SNMPv2 is being used, which feature provides secure access to MIB objects?
packet encryption
source validation
community strings 
message integrity
25  A network administrator has issued the snmp-server user admin1 admin v3 encrypted auth md5 abc789 priv des 256 key99 command. What are two features of this command? (Choose two.)
It uses the MD5 authentication of the SNMP messages. 
It allows a network administrator to configure a secret encrypted password on the SNMP server.
It adds a new user to the SNMP group. 
It restricts SNMP access to defined SNMP managers.
It forces the network manager to log into the agent to retrieve the SNMP messages.
NEW QUESTIONS
26. Which SNMP version uses weak community string-based access control and supports bulk retrieval?
SNMPv3​
SNMPv1
SNMPv2c*
SNMPv2Classic​
———
27. Which protocol or service can be configured to send unsolicited messages to alert the network administrator about a network event such as an extremely high CPU utilization on a router?
SNMP*
NetFlow
syslog
NTP
———
28. Which protocol or service allows network administrators to receive system messages that are provided by network devices?
SNMP
syslog*
NetFlow
NTP
———-
29. The command ntp server 10.1.1.1 is issued on a router. What impact does this command have?
determines which server to send system log files to
synchronizes the clock of the device to the timeserver that is located at IP address 10.1.1.1*
identifies the server on which to store backup configurations
ensures that all logging will have a time stamp associated with it
—–
30. Which syslog message type is accessible only to an administrator and only via the Cisco CLI?
alerts
debugging*
emergency
errors
———–
31. Which protocol is used by network administrators to track and gather statistics on TCP/IP packets that are entering or exiting network devices?
syslog
NetFlow*
NTP
SNMP
Read more ...

CCNA 4 R&S: Connecting Networks Chapter 5 v5.02 + v5.03 Exam Answers 2016

Friday, August 19, 2016

CCNA 4 R&S: Connecting Networks Chapter 5 v5.02 + v5.03 Exam Answers 2016

You can download fresh questions. Daily updated. 

LAST UPDATE: TODAY 


1 Typically, which network device would be used to perform NAT for a corporate environment?
DHCP server
host device
router
server
switch

2 What is the group of public IPv4 addresses used on a NAT-enabled router known as?
outside local addresses
inside local addresses
inside global addresses
outside global addresses

3 When NAT is employed in a small office, which address type is typically used for hosts on the local LAN?
private IP addresses
global public IP addresses
Internet-routable addresses
both private and public IP addresses

4 Which version of NAT allows many hosts inside a private network to simultaneously use a single inside global address for connecting to the Internet?
PAT
static NAT
dynamic NAT
port forwarding

5 Which type of NAT maps a single inside local address to a single inside global address?
dynamic
static
port address translation
overloading

6 Several key servers in an organization must be directly accessible from the Internet. What addressing policy should be implemented for these servers?
Use dynamic NAT to provide addresses for the servers.
Place all of the servers in their own Class C private subnet.
Use DHCP to assign addresses from the pool of Class B addresses.
Assign static internal addresses and public external addresses to each of the servers

7 What is a disadvantage of NAT?
There is no end-to-end addressing.
The router does not need to alter the checksum of the IPv4 packets.
The internal hosts have to use a single public IPv4 address for external communication.
The costs of readdressing hosts can be significant for a publicly addressed network.

8

Refer to the exhibit. What has to be done in order to complete the static NAT configuration on R1?
R1 should be configured with the command ip nat inside source static 209.165.200.1 192.168.11.11.
R1 should be configured with the command ip nat inside source static 209.165.200.200 192.168.11.11.
Interface S0/0/0 should be configured with the command ip nat outside.
Interface Fa0/0 should be configured with the command no ip nat inside.

9
Refer to the exhibit. R1 is configured for NAT as displayed. What is wrong with the configuration?
Access-list 1 is misconfigured.
NAT-POOL2 is not bound to ACL 1.
Interface Fa0/0 should be identified as an outside NAT interface.
The NAT pool is incorrect.

10 Which statement accurately describes dynamic NAT?
It always maps a private IP address to a public IP address.
It provides an automated mapping of inside local to inside global IP addresses.
It provides a mapping of internal host names to IP addresses.
It dynamically provides IP addressing to internal hosts.

11 A network administrator configures the border router with the command R1(config)# ip nat inside source list 4 pool corp. What is required to be configured in order for this particular command to be functional?
a NAT pool named corp that defines the starting and ending public IP addresses
an access list named corp that defines the private addresses that are affected by NAT
an access list numbered 4 that defines the starting and ending public IP addresses
ip nat outside to be enabled on the interface that connects to the LAN affected by the NAT
a VLAN named corp to be enabled and active and routed by R1

12 When dynamic NAT without overloading is being used, what happens if seven users attempt to access a public server on the Internet when only six addresses are available in the NAT pool?
No users can access the server.
The request to the server for the seventh user fails.
All users can access the server.
The first user gets disconnected when the seventh user makes the request.

13 A network engineer has configured a router with the command ip nat inside source list 4 pool corp overload. Why did the engineer use the overload option?
The company has more private IP addresses than available public IP addresses.
The company needs to have more public IP addresses available to be used on the Internet.
The company router must throttle or buffer traffic because the processing power of the router is not enough to handle the normal load of external-bound Internet traffic.
The company has a small number of servers that should be accessible by clients from the Internet.

14
Refer to the exhibit. What will be the effect of entering the command that is shown in the exhibit on R2 as part of the dynamic NAT configuration?
It will define a pool of addresses for translation.
It will identify an inside NAT interface.
It will bind NAT-POOL1 with ACL 1.
It will define the source ACL for the external interface.

15 Which configuration would be appropriate for a small business that has the public IP address of 209.165.200.225/30 assigned to the external interface on the router that connects to the Internet?
access-list 1 permit 10.0.0.0 0.255.255.255
ip nat inside source list 1 interface serial 0/0/0 overload
access-list 1 permit 10.0.0.0 0.255.255.255
ip nat pool comp 192.0.2.1 192.0.2.8 netmask 255.255.255.240
ip nat inside source list 1 pool comp
access-list 1 permit 10.0.0.0 0.255.255.255
ip nat pool comp 192.0.2.1 192.0.2.8 netmask 255.255.255.240
ip nat inside source list 1 pool comp overload
access-list 1 permit 10.0.0.0 0.255.255.255
ip nat pool comp 192.0.2.1 192.0.2.8 netmask 255.255.255.240
ip nat inside source list 1 pool comp overload
ip nat inside source static 10.0.0.5 209.165.200.225

16 What are two required steps to configure PAT? (Choose two.)
Define a pool of global addresses to be used for overload translation.
Define a standard access list denying the addresses that should be translated.
Define the range of ports to be used.
Identify the inside interface.
Define a standard access list that allow the outside global addresses to be used.

17
Refer to the exhibit. What is the purpose of the command marked with an arrow shown in the partial configuration output of a Cisco broadband router?
defines which addresses can be translated
defines which addresses are allowed into the router
defines which addresses are assigned to a NAT pool
defines which addresses are allowed out of the router

18 What is the purpose of port forwarding?
Port forwarding allows an external user to reach a service on a private IPv4 address that is located inside a LAN.
Port forwarding allows users to reach servers on the Internet that are not using standard port numbers.
Port forwarding allows an internal user to reach a service on a public IPv4 address that is located outside a LAN.
Port forwarding allows for translating inside local IP addresses to outside local addresses.

19 What is a characteristic of unique local addresses?
They allow sites to be combined without creating any address conflicts.
They are designed to improve the security of IPv6 networks.
Their implementation depends on ISPs providing the service.
They are defined in RFC 3927.

20
Refer to the exhibit. Based on the output that is shown, what type of NAT has been implemented?
dynamic NAT with a pool of two public IP addresses
PAT using an external interface
static NAT with one entry
static NAT with a NAT pool

21
Refer to the exhibit. The NAT configuration applied to the router is as follows:
ERtr(config)# access-list 1 permit 10.0.0.0 0.255.255.255
ERtr(config)# ip nat pool corp 209.165.201.6 209.165.201.30 netmask 255.255.255.224
ERtr(config)# ip nat inside source list 1 pool corp overload
ERtr(config)# ip nat inside source static 10.10.10.55 209.165.201.4
ERtr(config)# interface gigabitethernet 0/0
ERtr(config-if)# ip nat inside
ERtr(config-if)# interface serial 0/0/0
ERtr(config-if)# ip nat outside
Based on the configuration and the output shown, what can be determined about the NAT status within the organization?
Dynamic NAT is working, but static NAT is not.
Static NAT is working, but dynamic NAT is not.
NAT is working.
Not enough information is given to determine if both static and dynamic NAT are working. *
22
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
What problem is causing PC-A to be unable to communicate with the Internet?
The static route should not reference the interface, but the outside address instead.
This router should be configured to use static NAT instead of PAT.
The ip nat inside source command refers to the wrong interface.
The access list used in the NAT process is referencing the wrong subnet.
The NAT interfaces are not correctly assigned.

23. Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to an external server at the IP address 209.165.200.254 across a router R1 that is running dynamic NAT. (Not all options are used.)
Place the options in the following order: 
— not scored —
step 5 -> R1 replaces the address 192.168.10.10 with a translated inside global address.
step 2 -> R1 checks the NAT configuration to determine if this packet should be translated.
step 4 -> R1 selects an available global address from the dynamic address pool.
step 1 -> The host sends packets that request a connection to the server at the address 209.165.200.254.
step 3 -> If there is no translation entry for this IP address, R1 determines that the source address 192.168.10.10 must be translated.
24 
What are two of the required steps to configure PAT? (Choose two.)
Create a standard access list to define applications that should be translated.
Identify the inside interface.*
Define the range of source ports to be used.
Define the hello and interval timers to match the adjacent neighbor router.
Define a pool of global addresses to be used for overload translation.*
NEW QUESTIONS
25. How does NAT complicate the use of IPsec?
Network performance is degraded even more than with just NAT.
Header values are modified which causes issues with integrity checks.*
Troubleshooting is made impossible.
End-to-end IPv4 traceability is lost.
26. Which technology would be used on a router that is running both IPv4 and IPv6?
static NAT
dynamic NAT
dual stack*
NAT for IPv6
27. Which prefix is used for IPv6 ULAs?
2001:7F8::/29
FF02::1:FF00:0/104
2001:DB8:1:2::/64
FC00::/7 *
28. Fill in the blank. Do not use abbreviations.
NAT overload is also known as : __Port Address Translation__
Read more ...

CCNA 4 R&S: Connecting Networks Chapter 6 v5.02 + v5.03 Exam Answers 2016

Friday, August 19, 2016

CCNA 4 R&S: Connecting Networks Chapter 6 v5.02 + v5.03 Exam Answers 2016

You can download fresh questions. Daily updated. 

LAST UPDATE: TODAY 


1. What are two Layer 2 WAN technologies that can provide secure remote connections between corporate branch offices? (Choose two.)
LTE
Frame Relay*
leased lines*
QoS
IPsec
2. Which two OSI Layer 1 specifications does DOCSIS define for a cable Internet connection? (Choose two.)
a deterministic media access method
channel bandwidth*
modulation technique*
VPN tunneling requirements
the separation of the voice and data transmissions
3. Which medium is used for delivering data via DSL technology through PSTN?
fiber
copper*
radifrequency
wireless
4. A company is looking for the least expensive broadband solution that provides at least 10 Mb/s download speed. The company is located 5 miles from the nearest provider. Which broadband solution would be appropriate?
satellite
DSL
WiMax
cable*
5. What are twcharacteristics of a PPPoE configuration on a Cisccustomer router? (Choose two.)
The PPP configuration is on the dialer interface.*
An MTU size of 1492 bytes is configured on the Ethernet interface.
The Ethernet interface does not have an IP address.*
The customer router CHAP username and password are independent of what is configured on the ISP router.
The dialer pool command is applied tthe Ethernet interface tlink it tthe dialer interface.
6. Fill in the blank.
DOCSIS specifies the  “MAC”  sub-layer as a Layer 2 requirement that defines either a deterministic access method, TDMA, or S-CDMA.
7. Fill in the blank. Use only an acronym.
PPPoE”   creates a PPP tunnel through the DSL connection for the purpose of sending PPP frames.
8. What functionality is required on routers tprovide remote workers with VoIP and videoconferencing capabilities?
PPPoE
QoS*
VPN
IPsec
9. Which broadband wireless technology is based on the 802.11 standard?
CDMA
municipal Wi-Fi*
UMTS
WiMAX
10. What technology provides service providers the capability to use authentication, accounting, and link management features to customers over Ethernet networks?
QoS
PPPoE*
ISDN
DSL
11. Which standard specifies the channel frequencies and the deterministic access method of cable networks?
DOCSIS*
802.16
LTE
WIMAX
12. Which two network components does a teleworker require to connect remotely and securely from home to the corporate network? (Choose two.)
VPN client software or VPN-enabled router*
broadband Internet connection*
VPN server or concentrator
authentication server
multifunction security appliance
13. In which layer of the TCP/IP protocol model does IPsec apply security to network data?
application
transport
internet*
network
access
14. Which cable network communication technology is secure, extremely resistant to noise, and employs spread-spectrum technology?
CDMA
S-CDMA*
FDMA
TDMA
15. How is voice traffic affected when the customer uses ADSL technology?
No special equipment is needed to separate voice and data signals.
Voice traffic is interrupted if the ADSL service fails.
Voice signals are on a separate wire pair from ADSL signals.
ADSL signals can distortvoice transmissions.*
16. Which technology provides a secure connection between a SOHO and the headquarters office?
PPPoE
QoS
WiMax
VPN*
17. What are two characteristics of a PPPoE configuration on a Cisco customer router? (Choose two.)
The customer router CHAP username and password are independent of what is configured on the ISP router.
The PPP configuration is on the dialer interface.*
An MTU size of 1492 bytes is configured on the Ethernet interface.
The Ethernet interface does not have an IP address.*
The dialer pool command is applied to the Ethernet interface to link it to the dialer interface.
18. What advantage does DSL have compared to cable technology?
DSL upload and download speeds are always the same.
DSL is not a shared medium.*
DSL is faster.
DSL has no distance limitations.
19. What are two disadvantages of employing teleworkers in an organization? (Choose two.)
slower customer service response times
increased usage of sick or vacation days
increased difficulty of tracking task progress*
increase in office expenses
the need to implement a new management style*
20. Match each type of broadband wireless technology with the correct description. (Not all options are used.)
Place the options in the following order: 
define by the IEEE 802.16 standard -> WiMax 
variants include 2G, 3G, and 4G -> Cellular/Mobile 
ideal solution when no other wirelless access is available -> Satellite
– not scored –

21. Which DSL technology provides higher downstream bandwidth to the user than upstream bandwidth?
SDSL
TDMA
CDMA
ADSL*
22. Which networking technology will ensure reliable and secure remote access when a teleworker connects to a corporate network?
an encrypted VPN tunnel *
routers with QoS capability
broadband (cable or DSL) access to the corporate network
a VoIP and videoconferencing capable connection
23. Which broadband technology would be best for a user that needs remote access when traveling in mountains and at sea?
satellite *
Wi-Fi Mesh
mobile broadband
WiMax
24. Which type of long distance telecommunication technology provides point-to-point connections and cellular access?
WiMax*
satellite
mobile broadband
municipal Wi-Fi
25. What functionality is required on routers to provide remote workers with VoIP and videoconferencing capabilities?
QoS*
VPN
PPPoE
IPsec
26. A company is looking for the least expensive broadband solution that provides at least 10 Mb/s download speed. The company is located 5 miles from the nearest provider. Which broadband solution would be appropriate?
satellite
DSL
WiMax
cable*
27. What are two features of wavelengths in the electromagnetic spectrum? (Choose two.)
They are the rate at which current or voltage cycles occur.
They are calculated by the speed of propagation of the electromagnetic signal divided by its frequency in cycles per second.*
They are the distance from the peak of one radio wave to the peak of the next radio wave.*
They are the distance from the peak of one radio wave to the trough of the next radio wave.
They are calculated by the number of waves per second.
28. When PPPoE is configured on a customer router, which two commands must have the same value for the configuration to work? (Choose two.)
ppp chap hostname 2
pppoe-client dial-pool-number 2*
ppp chap password 2
interface dialer 2
dialer pool 2*
interface gigabitethernet 0/2
29. What mobile broadband communication Layer 2 technology uses a special coding scheme to assign each transmitter a specific code?
UMTS
TDMA
FDMA
CDMA*
30. Why is the MTU for a PPPoE DSL configuration reduced from 1500 bytes to 1492?
to enable CHAP authentication
to accommodate the PPPoE headers*
to reduce congestion on the DSL link
to establish a secure tunnel with less overhead
31. What two layers of the OSI model are defined by DOCSIS? (Choose two.)
Layer 1*
Layer 2*
Layer 3
Layer 4
Layer 5
Layer 6
Layer 7
Read more ...

CCNA 4 R&S: Connecting Networks Chapter 3 v5.02 + v5.03 Exam Answers 2016

Friday, August 19, 2016

CCNA 4 R&S: Connecting Networks Chapter 3 v5.02 + v5.03 Exam Answers 2016

You can download fresh questions. Daily updated. 

LAST UPDATE: TODAY 



1.. Which address is used in the Address field of a PPP frame?
a single byte of binary 10101010
a single byte of binary 11111111*
the IP address of the serial interface
a single byte of binary 00000000
2. How does PPP interface with different network layer protocols?
by specifying the protocol during link establishment through LCP
by encoding the information field in the PPP frame
by using separate NCPs*
by negotiating with the network layer handler
3.  Match the PPP option with the correct description. (Not all options are used.)
Place the options in the following order: 
Compression -> Increases the effective throughput on PPP connections by reducing the amount of data in the frame that must travel across the link.
Multilink -> Provides load balancing over the router interfaces.
Maximum Receive Unit -> The maximum size of the PPP frame
– not scored – 
Authentication Protocol -> The two choices are Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP)
4. Which command can be used to view the cable type that is attached to a serial interface?
Router(config)# show controllers*
Router(config)# show ip interface
Router(config)# show interfaces
Router(config)# show ip interface brief
5. In which situation would the use of PAP be preferable to the use of CHAP?
when plain text passwords are needed to simulate login at the remote host*
when router resources are limited
when multilink PPP is used
when a network administrator prefers it because of ease of configuration
6. Which protocol will terminate the PPP link after the exchange of data is complete?
IPCP
LCP*
IPXCP
NCP
7
Refer to the exhibit. Which statement describes the status of the PPP connection?
Both the link-establishment and network-layer phase completed successfully.*
Only the network-layer phase completed successfully.
Only the link-establishment phase completed successfully.
Neither the link-establishment phase nor the network-layer phase completed successfully.
8. Which is an advantage of using PPP on a serial link instead of HDLC?
option for session establishment
higher speed transmission
option for authentication*
fixed-size frames
9. Which three statements are true about PPP? (Choose three.)
PPP can use synchronous and asynchronous circuits.*
PPP carries packets from several network layer protocols in LCPs.
PPP can only be used between two Cisco devices.
PPP uses LCPs to agree on format options such as authentication, compression, and error detection.*
PPP uses LCPs to establish, configure, and test the data link connection.*
10. When configuring Multilink PPP, where is the IP address for the multilink bundle configured?
on a subinterface
on a physical serial interface
on a physical Ethernet interface
on a multilink interface*
11. Which field marks the beginning and end of an HDLC frame?
FCS
Flag*
Control
Data
12

Refer to the exhibit. Based on the debug command output that is shown, which statement is true of the operation of PPP.
Both PAP and CHAP authentication were attempted.
A PPP session was successfully established.*
CHAP authentication failed because of an unknown hostname.
The debug output is from router R2.
13. During a PPP session establishment phase, which two messages are sent by the requested party if the options are not acceptable? (Choose two.)
Configure-Reject*
Code-Reject
Discard-Request
Configure-Nak*
Protocol-Reject
14. A network administrator is evaluating authentication protocols for a PPP link. Which three factors might lead to the selection of CHAP over PAP as the authentication protocol? (Choose three.)
uses an unpredictable variable challenge value to prevent playback attacks*
uses a three-way authentication periodically during the session to reconfirm identities*
transmits login information in encrypted format*
control by the remote host of the frequency and timing of login events
establishes identities with a two-way handshake
makes authorized network administrator intervention a requirement to establish each session
15. Match the steps to the PPP CHAP authentication process sequence. (Not all options are used.)
Place the options in the following order: 
Step 3 -> calculate the MD5 hash
Step 2 -> calculate the ID and random number
Step 4 -> send challenge ID, hash, and username
Step 1 -> use LCP to negotiate the type of authentication
– not scored – 
Step 5 -> calculate the hash based on received information
Step 6 -> compare the received hash with the calculated hash
16. What are three components of PPP? (Choose three.)
LCP*
multilink
NCP*
HDLC-like framing*

compression
authentication
17
Refer to the exhibit. A network administrator is configuring the PPP link between the two routers. However, the PPP link cannot be established. Based on the partial output of the show running-config command, what is the cause of the problem?​
The passwords do not match.*
The usernames do not match.
The passwords should be longer than 8 characters.
The interface IP addresses are in different subnets.
18. Which PPP option can detect links that are in a looped-back condition?
Magic Number*
Callback
MRU
ACCM
19. Which three are types of LCP frames used with PPP? (Choose three.)
link-negotiation frames
link-acknowledgment frames
link-maintenance frames*
link-termination frames*
link-establishment frames*
link-control frames
20. At which layer of the OSI model does multiplexing take place?
Layer 3
Layer 4
Layer 2
Layer 1*
21. Match the phases of establishing a PPP session in the correct order. (Not all options are used.)
Place the options in the following order: 
Phase 3  -> negotiate with the network layer to configure L3 protocol
– not scored – 
Phase 1  -> establish the link and negotiate configuration options
Phase 2 -> determine the quality of the link
22. Which three physical layer interfaces support PPP? (Choose three.)
GigabitEthernet
asynchronous serial*
HSSI*
synchronous serial*

POTS
FastEthernet
23

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
Why is the serial link between router R1 and router R2 not operational?
The encapsulation in both routers does not match.
The passwords are different in both routers.
In each case the expected username is not the same as the remote router hostname.*
The authentication type is not the same in both routers.
24. Which serial 0/0/0 interface state will be shown if no serial cable is attached to the router, but everything else has been correctly configured and turned on?
Serial 0/0/0 is up, line protocol is down
Serial 0/0/0 is administratively down, line protocol is down
Serial 0/0/0 is up (disabled)
Serial 0/0/0 is up, line protocol is up
Serial 0/0/0 is down, line protocol is down*
Serial 0/0/0 is up (looped)
25. What PPP information will be displayed if a network engineer issues the show ppp multilink command on Cisco router?
the IP addresses of the link interfaces
the serial interfaces participating in the multilink*
the queuing type on the link
the link LCP and NCP status
26. Refer to the exhibit. What type of Layer 2 encapsulation will be used for connection D on the basis of this configuration on a newly installed router:
RtrA(config)# interface serial0/0/0
RtrA(config-if)# ip address 128.107.0.2 255.255.255.252
RtrA(config-if)# no shutdown
Ethernet
Frame Relay
HDLC*
PPP
27.  A network engineer is monitoring an essential, but poor quality, PPP WAN link that periodically shuts down. An examination of the interface configurations shows that the ppp quality 90 command has been issued. What action could the engineer take to reduce the frequency with which the link shuts down?
Issue the command ppp quality 70.*
Issue the command ppp quality 100.
Set the DCE interface to a lower clock rate.
Use the bandwidth command to increase the bandwidth of the link.
28. A network engineer is troubleshooting the loss of MPEG video viewing quality as MPEG video files cross a PPP WAN link. What could be causing this loss of quality?
Link Quality Monitoring was not configured correctly on each interface.
The compress command was used when PPP was configured on the interfaces.*
The clock rates configured on each serial interface do not match.
PAP authentication was misconfigured on the link interfaces.
Read more ...