1. Refer to the exhibit. The network administrator must complete the connection between the RTA of the XYZ Company and the service provider. To accomplish this task, which two devices could be…
Category: CCNA R&S
Routing and Switching
CCNA 640-802 Bible – Configure and Troubleshoot NAT
1. What is the function of the Cisco IOS command ip nat inside source static 10.1.1.5 172.35.16.5? A: It creates a global address pool for all outside NAT transactions. B: It establishes…
Bible – CCNA Study Material
1. CiscoPress Material AND Cisco Network Academy It could be argued that everything you need is available right here. These are the books that I used. I have not had the opportunity…
CCNA 640-802 Bible – Configure and Apply an ACLs to Limit Telnet and SSH
1. Unauthorized users have used Telnet to gain access to a company router. The network administrator wants to configure and apply an access list to allow Telnet access to the router, but…
Many Resources for CCNA study
Cisco Certified Network Associate (CCNA®) validates the ability to install, configure, operate, and troubleshoot medium-size route and switched networks, including implementation and verification of connections to remote sites in a WAN. CCNA…
CCNA 640-802 Bible – Configure and Apply ACLs Based on Network Filtering
1. Refer to the graphic. It has been decided that Workstation 1 should be denied access to Server1. Which of the following commands are required to prevent only Workstation 1 from accessing…
CCNA Single Exam Practice Questions
The following end-of-module practice questions are focused on a specific module taken from the current ICND1 and ICND2 curriculum. These practice questions do not reflect the actual question you will receive on…
CCNA 640-802 Bible – Describe the Purpose and Types of ACLs
1. What are the general recommendations regarding the placement of access control lists? (Choose two) A. Standard ACLs should be placed as close as possible to the source of traffic to be…
CCNA 640-802 Bible – Identify security threats to a network and describe general methods to mitigate those threats
1. What should be part of a comprehensive network security plan? A: Allow users to develop their own approach to network security. B: Physically secure network equipment from potential access by unauthorized…