41⟩ How many hope count Rip or Rip2 can send updates?
15 hope count
“Cisco Certified Network Administrators guide for getting job in Networking department. This guide will help you to get preparation of CCNA Interview.”
15 hope count
As link down it removes from its routing table – Version = 12.4
Distance vector
Possible ways of data exchange in ccna are
Simplex
Half-duplex
Full-duplex
MD5 encrypted form and simple authentication in clear text form
A – 102
B – 116
C – 127
D – IP traffic sourced from 10.10.10.0/24 destined to 10.5.15.0/24 will use the VPN.
E – IP traffic sourced from 10.10.10.0/24 destined to 10.8.28.0/24 will use the VPN.
F – IP traffic sourced from 10.10.10.0/24 destined to 10.5.33.0/24 will use the VPN.
Answer: B E
Home
Chat Room
Forum
Contact
IPSEC related questions and their answers
* Question
Which IPSec rule is used for the Olympia branch and what does it define? (Choose two)
A – 102
B – 116
C – 127
D – IP traffic sourced from 10.10.10.0/24 destined to 10.5.15.0/24 will use the VPN.
E – IP traffic sourced from 10.10.10.0/24 destined to 10.8.28.0/24 will use the VPN.
F – IP traffic sourced from 10.10.10.0/24 destined to 10.5.33.0/24 will use the VPN.
Answer: B E
Explanation:
From the output above, we learn that the IPSec Rule is 116. Next click on “IPSec Rules” and select the Name/Number of 116 to view the rule applied to it. You will see a “permit” rule for traffic from 10.10.10.0/24 to 10.8.28.0/24 (notice that the picture shown the wildcard masks, which are inverse subnet masks)
Question
Which defined peer IP address an local subnet belong to Crete? (Choose two)
A – peer address 192.168.55.159
B – peer address 192.168.89.192
C – peer address 192.168.195.23
D – subnet 10.5.15.0/24
E – subnet 10.7.23.0/24
F – subnet 10.4.38.0/24
Answer: A D
A – ESP-3DES-SHA
B – ESP-3DES-SHA1
C – ESP-3DES-SHA2
D- ESP-3DES
E – ESP-SHA-HMAC
*Answer: D
Explanation:
In the site-to-site VPN branch we see something like this but in the Tranform Set sub-branch, we see
so the answer should be ESP-3DES-SHA2 or ESP-3DES?
To answer this question, we should review the concept:
“Data confidentiality is the use of encryption to scramble data as it travels across an insecure media”. Data confidentiality therefore means encryption.
“The transform set is a group of attributes that are exchanged together, which eliminates the need to coordinate and negotiate individual parameters”. In the picture above, we can see 3 parts of the transform-set ESP-3DES-SHA2:
IPsec protocol: ESP
IPsec encryption type: 3DES
IPsec authentication: SHA2
The question wants to ask which algorithm is used for providing data confidentiality (encryption), therefore the answer should be D – ESP-3DES.
A – Digital Certificate
B – Pre-Shared Key
C – Transport Mode
D – Tunnel Mode
E – GRE/IPSEC Transport Mode
F – GRE/IPSEC Tunnel Mode
Answer: B D
Host
Standard and Extended
TCP(TRANSMISSION CONTROL PROTOCOL)
EQUAL TO
23
80
i) Static
ii) NAT
iii) Dynamic NAT
iv) PAT (Port Address Translation)
It’s another name of PAT (Port Address Translation)
i) HDLC ( High Level Data Link Control )
ii) PPP (Point to Point Protocol)
i) DTE (Data Terminal Equipment
ii) DCE (Data Communication Equipment)
(1)DTE (DATA TERMINAL EQUIPMENT)
(2)DCE(DATA COMMUNICATION EQUIPMENT)
5 SECONDS