Cisco Certified Network Associate (CCNA®) validates the ability to install, configure, operate, and troubleshoot medium-size route and switched networks, including implementation and verification of connections to remote sites in a WAN. CCNA…
Month: September 2009
CCNA Security (IINS) Online Practice
Use the following resources to help you prepare for your exam. These tools are meant to supplement your learning experience and exam preparation. Login to access these items. The following review questions…
News – Download the Pass4sure Free Exams
Pass4sure is releasing a free downloading now, available from Sep 7th, 2009 to Sep 14th, 2009. Any customer has the chance to download any two exams from the list at Pass4sure, Free…
CCNA 640-802 Bible – Configure and Apply ACLs Based on Network Filtering
1. Refer to the graphic. It has been decided that Workstation 1 should be denied access to Server1. Which of the following commands are required to prevent only Workstation 1 from accessing…
CCNA Single Exam Practice Questions
The following end-of-module practice questions are focused on a specific module taken from the current ICND1 and ICND2 curriculum. These practice questions do not reflect the actual question you will receive on…
This is what I did and studied to pass CCENT for those interested
To those interested, 2 Months ago I started studying for CCENT before I passed the exam and this is what I used and how I did it. 1. Cisco Press CCENT/CCNA ICND1…
Mastering Binary Math
Cisco certification candidates, from the CCNA to the CCIE, must master binary math. This includes basic conversions, such as binary-to-decimal and decimal-to-binary, as well as more advanced scenarios involving subnetting and VLSM….
How to Build Your CCNP Home Labs
The Cisco CCNP lab is one of the most difficult labs to build because it touches on so many different pieces of equipment. When you are building your Cisco CCNA lab, it…
CCNA 640-802 Bible – Describe the Purpose and Types of ACLs
1. What are the general recommendations regarding the placement of access control lists? (Choose two) A. Standard ACLs should be placed as close as possible to the source of traffic to be…