Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
Cisco
Exam 4: Cisco Certified Network Associate (CCNA)
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 221
Multiple Choice
When deploying syslog, which severity level logs informational messages?
Question 222
Multiple Choice
When the active router in an HSRP group fails, what router assumes the role and forwards packets?
Question 223
Multiple Choice
What is the primary difference between AAA authentication and authorization?
Question 224
Multiple Choice
An engineer is configuring NAT to translate the source subnet of 10.10.0.0/24 to any one of three addresses: 192.168.3.1, 192.168.3.2, or 192.168.3.3. Which configuration should be used?
Question 225
Multiple Choice
Which type of address is the public IP address of a NAT device?
Question 226
Multiple Choice
Refer to the exhibit. Which two events occur on the interface, if packets from an unknown Source address arrive after the interface learns the maximum number of secure MAC address? (Choose two.)
Question 227
Multiple Choice
Which technology must be implemented to configure network device monitoring with the highest security?
Question 228
Multiple Choice
Refer to the exhibit. Which statement about the interface that generated the output is true?
Question 229
Multiple Choice
What is a function of TFTP in network operations?
Question 230
Multiple Choice
Which feature or protocol determines whether the QOS on the network is sufficient to support IP services?
Question 231
Multiple Choice
What mechanism carries multicast traffic between remote sites and supports encryption?
Question 232
Multiple Choice
What is the purpose of traffic shaping?
Question 233
Multiple Choice
Where does the configuration reside when a helper address is configured lo support DHCP?
Question 234
Multiple Choice
Refer to the exhibit. Which two statements about the interface that generated the output are true? (Choose two.)
Question 235
Multiple Choice
Which keyword in a NAT configuration enables the use of one outside IP address for multiple inside hosts?
Question 236
Multiple Choice
Which two QoS tools provide congestion management? (Choose two.)
Question 237
Multiple Choice
In QoS, which prioritization method is appropriate for interactive voice and video?
Question 238
Multiple Choice
A network administrator enabled port security on a switch interface connected to a printer. What is the next configuration action in order to allow the port to learn the MAC address of the printer and insert it into the table automatically?
Question 239
Multiple Choice
An organization secures its network with multi-factor authentication using an authenticator app on employee smartphones. How is the application secured in the case of a user's smartphone being lost or stolen?